Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:51
Static task
static1
Behavioral task
behavioral1
Sample
e97fafb7df019251ed7e0f6fd2ad2d5cd42f5f5f3dc34218779a5decfbc08072.exe
Resource
win10v2004-20241007-en
General
-
Target
e97fafb7df019251ed7e0f6fd2ad2d5cd42f5f5f3dc34218779a5decfbc08072.exe
-
Size
673KB
-
MD5
9ae18257385180d441e70f4f3a52d1ac
-
SHA1
5dd9784fe526d1d95943766131e52f8eb8225abd
-
SHA256
e97fafb7df019251ed7e0f6fd2ad2d5cd42f5f5f3dc34218779a5decfbc08072
-
SHA512
9b52eeb9facaf6c16e54c51a57b8c54c4732f4708de792646792d4b10cfc7cf344b2df6282a7406d77bbc8f56f0dde56f539ead8efd67a94588288714d41abe7
-
SSDEEP
12288:lMrwy90u1oEN7e/2hrHUM6HgiQmdV4OvONDbuWBkqNaBZKRySs:pyd1oEVe/MzWHgSdVPvAuet1s
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2216-19-0x0000000002460000-0x000000000247A000-memory.dmp healer behavioral1/memory/2216-21-0x0000000004A50000-0x0000000004A68000-memory.dmp healer behavioral1/memory/2216-49-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-47-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-45-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-44-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-41-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-39-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-37-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-35-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-33-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-31-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-29-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-27-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-25-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-23-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/2216-22-0x0000000004A50000-0x0000000004A62000-memory.dmp healer -
Healer family
-
Processes:
pro4986.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4986.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4986.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2068-61-0x0000000002470000-0x00000000024B6000-memory.dmp family_redline behavioral1/memory/2068-62-0x0000000004AC0000-0x0000000004B04000-memory.dmp family_redline behavioral1/memory/2068-66-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-64-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-63-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-74-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-94-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-92-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-90-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-88-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-86-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-84-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-82-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-78-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-76-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-72-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-70-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-68-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-96-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/2068-80-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un492830.exepro4986.exequ3111.exepid process 3640 un492830.exe 2216 pro4986.exe 2068 qu3111.exe -
Processes:
pro4986.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4986.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4986.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e97fafb7df019251ed7e0f6fd2ad2d5cd42f5f5f3dc34218779a5decfbc08072.exeun492830.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e97fafb7df019251ed7e0f6fd2ad2d5cd42f5f5f3dc34218779a5decfbc08072.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un492830.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4928 2216 WerFault.exe pro4986.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e97fafb7df019251ed7e0f6fd2ad2d5cd42f5f5f3dc34218779a5decfbc08072.exeun492830.exepro4986.exequ3111.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e97fafb7df019251ed7e0f6fd2ad2d5cd42f5f5f3dc34218779a5decfbc08072.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un492830.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4986.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3111.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4986.exepid process 2216 pro4986.exe 2216 pro4986.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4986.exequ3111.exedescription pid process Token: SeDebugPrivilege 2216 pro4986.exe Token: SeDebugPrivilege 2068 qu3111.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
e97fafb7df019251ed7e0f6fd2ad2d5cd42f5f5f3dc34218779a5decfbc08072.exeun492830.exedescription pid process target process PID 2528 wrote to memory of 3640 2528 e97fafb7df019251ed7e0f6fd2ad2d5cd42f5f5f3dc34218779a5decfbc08072.exe un492830.exe PID 2528 wrote to memory of 3640 2528 e97fafb7df019251ed7e0f6fd2ad2d5cd42f5f5f3dc34218779a5decfbc08072.exe un492830.exe PID 2528 wrote to memory of 3640 2528 e97fafb7df019251ed7e0f6fd2ad2d5cd42f5f5f3dc34218779a5decfbc08072.exe un492830.exe PID 3640 wrote to memory of 2216 3640 un492830.exe pro4986.exe PID 3640 wrote to memory of 2216 3640 un492830.exe pro4986.exe PID 3640 wrote to memory of 2216 3640 un492830.exe pro4986.exe PID 3640 wrote to memory of 2068 3640 un492830.exe qu3111.exe PID 3640 wrote to memory of 2068 3640 un492830.exe qu3111.exe PID 3640 wrote to memory of 2068 3640 un492830.exe qu3111.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e97fafb7df019251ed7e0f6fd2ad2d5cd42f5f5f3dc34218779a5decfbc08072.exe"C:\Users\Admin\AppData\Local\Temp\e97fafb7df019251ed7e0f6fd2ad2d5cd42f5f5f3dc34218779a5decfbc08072.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un492830.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un492830.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4986.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4986.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 10804⤵
- Program crash
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3111.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3111.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2216 -ip 22161⤵PID:4224
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD54f7caa67012ca4fe2d35df24fbeac6fa
SHA12c8b78421759d5ad4dfb52521a083e59236341b2
SHA2569e348baa3ac321e633489249e7fff30d9953a80ae2ae275edfb246969ff73303
SHA512a311395c721edd003957600a1855b5ddfaf8fb3152d64e74177dccb1cd0ae6734efe9f198c60c99d30cbc0eede25b0dd3e2f1b2e9634417149684febb2d504d8
-
Filesize
260KB
MD50a3a97eaa4695ec4916b613451f816a4
SHA1767f6dc36891145e7bd035a5a80d7b2e16325a47
SHA2562119ce05e606087149d9ee1119ac809f3ceef7152ff529f381ddc0642b1b9d4f
SHA5128ff669db6a55376828b454db9722b50abe18cdb13eea56fe42549a8b5db4bd1179d702d44cb7cc16cd5eed60a9d061fe550485a65ee076de589dfe7c9826b4eb
-
Filesize
319KB
MD575feaf7eae3ae5f157f73dedc2bdf760
SHA15b13ecc32a5861278b34a392d50e89b8463bb648
SHA2561ab5ce1554b33bd57fb88424fb9edaf4b1e5a1ad2208c2112b1b568b34f12646
SHA5121119535c1f2888e7619025c08eedadae59446ecf5ddf37af545ccc0b6f615a8dce735e5f3469738c2ad124abddb27354416dcc41e058097c1457021605fd94c5