Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe
Resource
win10v2004-20241007-en
General
-
Target
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe
-
Size
695KB
-
MD5
dcfc28fb6f8f3e8d0fd6b60545dd604e
-
SHA1
3985172c5d4aa1c144ffa99368e8bd094288e7bf
-
SHA256
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb
-
SHA512
f25deace2208265e6c217bb9a314ce280843adba7e83cf95e98799a877e6d8d1cad9c5226e8a1a80e1e05315cdc595ad3bb22d3a7bc82bd980657042ee0bc3f4
-
SSDEEP
12288:aMrLy90CFi3I0YtKI4/iurTP0tg2OD0ojQ6uNvT59nh7jQs6XIhZ70H:RyHFiDtP0itwojVuNvbh7jQsaG70H
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/772-19-0x00000000022A0000-0x00000000022BA000-memory.dmp healer behavioral1/memory/772-21-0x0000000002750000-0x0000000002768000-memory.dmp healer behavioral1/memory/772-29-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-49-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-47-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-45-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-43-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-41-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-39-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-37-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-35-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-33-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-31-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-27-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-25-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-23-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/772-22-0x0000000002750000-0x0000000002762000-memory.dmp healer -
Healer family
-
Processes:
pro0231.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0231.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0231.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4560-60-0x0000000002670000-0x00000000026B6000-memory.dmp family_redline behavioral1/memory/4560-61-0x0000000004D20000-0x0000000004D64000-memory.dmp family_redline behavioral1/memory/4560-89-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-95-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-93-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-91-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-87-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-85-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-83-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-81-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-79-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-77-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-73-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-71-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-69-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-65-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-63-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-62-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-75-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline behavioral1/memory/4560-67-0x0000000004D20000-0x0000000004D5F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un355045.exepro0231.exequ5626.exepid process 428 un355045.exe 772 pro0231.exe 4560 qu5626.exe -
Processes:
pro0231.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0231.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0231.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un355045.exe316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un355045.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4692 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3972 772 WerFault.exe pro0231.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exeun355045.exepro0231.exequ5626.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un355045.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0231.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5626.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0231.exepid process 772 pro0231.exe 772 pro0231.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0231.exequ5626.exedescription pid process Token: SeDebugPrivilege 772 pro0231.exe Token: SeDebugPrivilege 4560 qu5626.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exeun355045.exedescription pid process target process PID 648 wrote to memory of 428 648 316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe un355045.exe PID 648 wrote to memory of 428 648 316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe un355045.exe PID 648 wrote to memory of 428 648 316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe un355045.exe PID 428 wrote to memory of 772 428 un355045.exe pro0231.exe PID 428 wrote to memory of 772 428 un355045.exe pro0231.exe PID 428 wrote to memory of 772 428 un355045.exe pro0231.exe PID 428 wrote to memory of 4560 428 un355045.exe qu5626.exe PID 428 wrote to memory of 4560 428 un355045.exe qu5626.exe PID 428 wrote to memory of 4560 428 un355045.exe qu5626.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe"C:\Users\Admin\AppData\Local\Temp\316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355045.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355045.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0231.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0231.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 10044⤵
- Program crash
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5626.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5626.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 772 -ip 7721⤵PID:736
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4692
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD5c7e284580d93e8707b6cd78a4bab78ca
SHA1bc3dc3551c1254fb72052460e9666dd19158dc2e
SHA25653d642370160d6b211b81049b519350ab34b4cb6787c775f234c8b8766dd9393
SHA51230bf1b4a352c7670f9e1b2c42d60ee11b886ce2dafedee917e7e3b24eea59adb55686e5d5d448f4efd6d46cf7db860262db6b12bfc74700939a981549bef474a
-
Filesize
308KB
MD5d78dc186cf592a55403a2c34647fc445
SHA18f6868a8073e6f6e8c231cd39e63f584c4504e81
SHA25609b4a21d682364d837e3ad3f0daba03b7c1ca1f291b4fcec815cf075551f6634
SHA512585a2ea86aa72f86bf7b4d89538456c9ce882db3715a17408adc47b2cdcf68a47f8e39f483b88fa82df45678519bd7dfa92ce857f182fd9b2f2c6c7dcdff261e
-
Filesize
366KB
MD54e705d1b17525c67f3680e6e87d9905b
SHA10f0eb73a5d93a15b9762f78c54da3abcf580ca0b
SHA256b9d1ab0b4c48a07717e87b7bce1d00f557575c145ea0d525eca3773f746d7876
SHA512b43dad5e1b4944c9a211b9eb9a7d5dc1de269c28a00062b942b6b7b0d9fd0838184c47692ad267db499b22c8bca85d1134e899c64a341f643dbbbbc13f5f7fa9