Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
379af74831aa98249b74675114d46155c8c8823a3bba6dbb79cba2ff0766b983.exe
Resource
win10v2004-20241007-en
General
-
Target
379af74831aa98249b74675114d46155c8c8823a3bba6dbb79cba2ff0766b983.exe
-
Size
666KB
-
MD5
ebc37ce9198dd2bc6ec1d718d2bba393
-
SHA1
02c9c651ec71da09a2d2f9e7c9d16fb335811824
-
SHA256
379af74831aa98249b74675114d46155c8c8823a3bba6dbb79cba2ff0766b983
-
SHA512
7ee13fee4f0effe9e506db40811bde6817e11c4e0c4dbbcf39e28ea6f28ffb94c848d03b829b716ac997db26f7da08347a7104abffb901e6b1898e7e08db9d57
-
SSDEEP
12288:sMrWy90DiHYyE59VK/FnAHYUwFPZTZDb94Mu10VOv/cpHqNYF6cntrNkbG4Bm/a1:qykiHYyeXqFAHY9ZFa38aE5qNK6KFNkl
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4684-19-0x0000000002790000-0x00000000027AA000-memory.dmp healer behavioral1/memory/4684-21-0x0000000002890000-0x00000000028A8000-memory.dmp healer behavioral1/memory/4684-49-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-47-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-46-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-43-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-41-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-39-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-37-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-35-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-33-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-31-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-29-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-27-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-25-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-23-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/4684-22-0x0000000002890000-0x00000000028A2000-memory.dmp healer -
Healer family
-
Processes:
pro7111.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7111.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4280-60-0x00000000026E0000-0x0000000002726000-memory.dmp family_redline behavioral1/memory/4280-61-0x0000000004E00000-0x0000000004E44000-memory.dmp family_redline behavioral1/memory/4280-83-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-87-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-95-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-91-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-89-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-86-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-81-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-79-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-77-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-75-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-73-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-71-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-69-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-93-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-67-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-65-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-63-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4280-62-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un387579.exepro7111.exequ1168.exepid process 4544 un387579.exe 4684 pro7111.exe 4280 qu1168.exe -
Processes:
pro7111.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7111.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7111.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
379af74831aa98249b74675114d46155c8c8823a3bba6dbb79cba2ff0766b983.exeun387579.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 379af74831aa98249b74675114d46155c8c8823a3bba6dbb79cba2ff0766b983.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un387579.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5112 4684 WerFault.exe pro7111.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
379af74831aa98249b74675114d46155c8c8823a3bba6dbb79cba2ff0766b983.exeun387579.exepro7111.exequ1168.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 379af74831aa98249b74675114d46155c8c8823a3bba6dbb79cba2ff0766b983.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un387579.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1168.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7111.exepid process 4684 pro7111.exe 4684 pro7111.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7111.exequ1168.exedescription pid process Token: SeDebugPrivilege 4684 pro7111.exe Token: SeDebugPrivilege 4280 qu1168.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
379af74831aa98249b74675114d46155c8c8823a3bba6dbb79cba2ff0766b983.exeun387579.exedescription pid process target process PID 2360 wrote to memory of 4544 2360 379af74831aa98249b74675114d46155c8c8823a3bba6dbb79cba2ff0766b983.exe un387579.exe PID 2360 wrote to memory of 4544 2360 379af74831aa98249b74675114d46155c8c8823a3bba6dbb79cba2ff0766b983.exe un387579.exe PID 2360 wrote to memory of 4544 2360 379af74831aa98249b74675114d46155c8c8823a3bba6dbb79cba2ff0766b983.exe un387579.exe PID 4544 wrote to memory of 4684 4544 un387579.exe pro7111.exe PID 4544 wrote to memory of 4684 4544 un387579.exe pro7111.exe PID 4544 wrote to memory of 4684 4544 un387579.exe pro7111.exe PID 4544 wrote to memory of 4280 4544 un387579.exe qu1168.exe PID 4544 wrote to memory of 4280 4544 un387579.exe qu1168.exe PID 4544 wrote to memory of 4280 4544 un387579.exe qu1168.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\379af74831aa98249b74675114d46155c8c8823a3bba6dbb79cba2ff0766b983.exe"C:\Users\Admin\AppData\Local\Temp\379af74831aa98249b74675114d46155c8c8823a3bba6dbb79cba2ff0766b983.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un387579.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un387579.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7111.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7111.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4684 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 10884⤵
- Program crash
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1168.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1168.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4684 -ip 46841⤵PID:4900
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD535e8c913933caf89a4f0a24794df7113
SHA1986e9213cf723c94fcac102ecb85659aab5ef4fb
SHA2560bf7f91ceea87018987ff9559d4d8e2962047cd786c971f5400ba88af7bf8ae5
SHA512185dc3d20ad617ab8095614272097c3de4ef524fb57c1bf123e35faf308cad704fb95ebd74b4b94faa41b14fe526db37dab8cfc51a58c99be7190c849da37684
-
Filesize
294KB
MD5daa32c67de9b576de602c3fad683cb6d
SHA1503ec560b4b79e7ddb3e484a82d57ed10542a6f5
SHA256344f65e2db65ff34435f9acbeb574723b7ede294809f00ca025d640a9aa9ad18
SHA512b879c43fb73768ab9134a4db0fa0319782c83843dad5d3579f28438bcb0b6db8ad7626e836bcca803c006ef1445a536555889bba9f6f4045db1c823b251cc726
-
Filesize
353KB
MD5c9c107fa2ce38bfcb6ac481af43d9fe9
SHA10cbd0c2d977d5a397c6246f2b1e76f0628bdb7c0
SHA25606e932747e51ea60b735e01f02cc03ea2d8168d5cea2044a5ae5330a473d947a
SHA512300a5af4cabfdfc410036176a8a1675811f361bfc020209ab5c0fc184a03447bddd3af88920f270622e787843b2e2b0b3fa1c566a301d903fb5854e5cb74ea46