Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:55
Static task
static1
Behavioral task
behavioral1
Sample
63abb6e17a3598f5d26d080105f6987b5262e658e6ab6cc3745ded4e10e4cc78.exe
Resource
win10v2004-20241007-en
General
-
Target
63abb6e17a3598f5d26d080105f6987b5262e658e6ab6cc3745ded4e10e4cc78.exe
-
Size
677KB
-
MD5
6529310597c656731d14e8036a4cf675
-
SHA1
60608894a795c393c341757d338851c3e31255c9
-
SHA256
63abb6e17a3598f5d26d080105f6987b5262e658e6ab6cc3745ded4e10e4cc78
-
SHA512
498f159dd6c66b0472784a54228e85de2ab4dcd720dd0af65a8a24db09b7689f8ef54ac1269728a615b0a46d34307b548480747d385e9af8e7af0cb10058aed0
-
SSDEEP
12288:9Mr2y90oQ1iCBFs05NUvAMz/DHXxh3rYGwADMmBvztroktwDsdDaNjxk2T19v:vyJCBWqU4Mz1Nnw+MmBL6zCMTT15
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2440-19-0x00000000025A0000-0x00000000025BA000-memory.dmp healer behavioral1/memory/2440-21-0x0000000002950000-0x0000000002968000-memory.dmp healer behavioral1/memory/2440-47-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-49-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-45-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-43-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-41-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-39-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-37-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-35-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-33-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-31-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-29-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-27-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-25-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-23-0x0000000002950000-0x0000000002962000-memory.dmp healer behavioral1/memory/2440-22-0x0000000002950000-0x0000000002962000-memory.dmp healer -
Healer family
-
Processes:
pro9316.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9316.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4668-61-0x0000000002800000-0x0000000002846000-memory.dmp family_redline behavioral1/memory/4668-62-0x0000000005430000-0x0000000005474000-memory.dmp family_redline behavioral1/memory/4668-66-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-76-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-96-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-94-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-92-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-90-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-88-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-86-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-84-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-80-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-78-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-74-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-72-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-70-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-68-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-82-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-64-0x0000000005430000-0x000000000546F000-memory.dmp family_redline behavioral1/memory/4668-63-0x0000000005430000-0x000000000546F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un234664.exepro9316.exequ2621.exepid process 4040 un234664.exe 2440 pro9316.exe 4668 qu2621.exe -
Processes:
pro9316.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9316.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9316.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
63abb6e17a3598f5d26d080105f6987b5262e658e6ab6cc3745ded4e10e4cc78.exeun234664.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63abb6e17a3598f5d26d080105f6987b5262e658e6ab6cc3745ded4e10e4cc78.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un234664.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3280 2440 WerFault.exe pro9316.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un234664.exepro9316.exequ2621.exe63abb6e17a3598f5d26d080105f6987b5262e658e6ab6cc3745ded4e10e4cc78.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un234664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9316.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2621.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63abb6e17a3598f5d26d080105f6987b5262e658e6ab6cc3745ded4e10e4cc78.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9316.exepid process 2440 pro9316.exe 2440 pro9316.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9316.exequ2621.exedescription pid process Token: SeDebugPrivilege 2440 pro9316.exe Token: SeDebugPrivilege 4668 qu2621.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
63abb6e17a3598f5d26d080105f6987b5262e658e6ab6cc3745ded4e10e4cc78.exeun234664.exedescription pid process target process PID 3432 wrote to memory of 4040 3432 63abb6e17a3598f5d26d080105f6987b5262e658e6ab6cc3745ded4e10e4cc78.exe un234664.exe PID 3432 wrote to memory of 4040 3432 63abb6e17a3598f5d26d080105f6987b5262e658e6ab6cc3745ded4e10e4cc78.exe un234664.exe PID 3432 wrote to memory of 4040 3432 63abb6e17a3598f5d26d080105f6987b5262e658e6ab6cc3745ded4e10e4cc78.exe un234664.exe PID 4040 wrote to memory of 2440 4040 un234664.exe pro9316.exe PID 4040 wrote to memory of 2440 4040 un234664.exe pro9316.exe PID 4040 wrote to memory of 2440 4040 un234664.exe pro9316.exe PID 4040 wrote to memory of 4668 4040 un234664.exe qu2621.exe PID 4040 wrote to memory of 4668 4040 un234664.exe qu2621.exe PID 4040 wrote to memory of 4668 4040 un234664.exe qu2621.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63abb6e17a3598f5d26d080105f6987b5262e658e6ab6cc3745ded4e10e4cc78.exe"C:\Users\Admin\AppData\Local\Temp\63abb6e17a3598f5d26d080105f6987b5262e658e6ab6cc3745ded4e10e4cc78.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un234664.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un234664.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9316.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9316.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 10884⤵
- Program crash
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2621.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2621.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2440 -ip 24401⤵PID:432
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD5e303ea388e067eb1c9b32c90c791750c
SHA180cbba0f5c02b67af219a61665f0b51b28c4b27a
SHA256be2d0ce750b7e20f64e787583f03504ebf51891647059bc53c77c18224e48610
SHA512cd61e1584eca568d54cc95b946236e96de8b41d88c99dd2ad63fd53ebfaf300656d8d59dca22f570412382fde389cc07b1f4fc8955a2683eded561ed2b9334d8
-
Filesize
289KB
MD53572657533732b24278f99190cbcf215
SHA1a19bd74b41f8566f04c548d94783e33e373c7bd9
SHA2569a0097c4372b8e6675335ced76fc79cf69944a48b1e122450ac0fe7d9569f970
SHA51281d84e2d33f442edaef68da97ef47a2814188678778fabb999ec8e3b84d1ca5285b1be3f3371707993fb7d66a9731a0ed00fc5798a2ef6fbfcb545eba6039564
-
Filesize
348KB
MD51b2c33d1f2d197b04563c05bba8dc937
SHA13736e8eaf25a8a00f2084eecc97576959cbba38b
SHA256dd018e0a84c9bddb7576ab0701382ada14a3fcda50b6db20d63e9c6d881be716
SHA5123099baaa38b5a257e78e1fa4b74233031a128b5b5c4ef48697c142e6c4a6a2755319daa2ada501d05b469995f0eaa7c4dd9045854d6aabc6371d89a8376c10c6