Analysis
-
max time kernel
142s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:59
Static task
static1
Behavioral task
behavioral1
Sample
b686d55d4f8d4473a67dfbb05439a320d00573c9943bac4a97740b378454faa4.exe
Resource
win10v2004-20241007-en
General
-
Target
b686d55d4f8d4473a67dfbb05439a320d00573c9943bac4a97740b378454faa4.exe
-
Size
1007KB
-
MD5
8b152ad461b7c46fc2066ce20f1d9edb
-
SHA1
1876f1f0dfc4b420e5dff5a1da99094dddeddcd5
-
SHA256
b686d55d4f8d4473a67dfbb05439a320d00573c9943bac4a97740b378454faa4
-
SHA512
2ec5747c8c8e2ab78d7108f5d1605cb64d2272b896341be4592b14540949ea41fa96cc40a06516af7d600d8c32ed9462e7016bde22340981655aab189abc923b
-
SSDEEP
24576:uychvRFYX2oKM5TAVpl5xKiqwoHKjYsN:9EvROXpKm0TbKiQqjY
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu697674.exe healer behavioral1/memory/1900-28-0x0000000000DD0000-0x0000000000DDA000-memory.dmp healer behavioral1/memory/840-34-0x00000000026A0000-0x00000000026BA000-memory.dmp healer behavioral1/memory/840-36-0x0000000004D80000-0x0000000004D98000-memory.dmp healer behavioral1/memory/840-37-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-44-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-64-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-62-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-60-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-58-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-56-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-54-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-52-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-48-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-46-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-42-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-40-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-38-0x0000000004D80000-0x0000000004D92000-memory.dmp healer behavioral1/memory/840-50-0x0000000004D80000-0x0000000004D92000-memory.dmp healer -
Healer family
-
Processes:
cor3865.exebu697674.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor3865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor3865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bu697674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bu697674.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor3865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor3865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor3865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor3865.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bu697674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bu697674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bu697674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bu697674.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/836-72-0x00000000027E0000-0x0000000002826000-memory.dmp family_redline behavioral1/memory/836-73-0x00000000053C0000-0x0000000005404000-memory.dmp family_redline behavioral1/memory/836-77-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-87-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-107-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-105-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-103-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-101-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-99-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-97-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-93-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-91-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-90-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-85-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-83-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-81-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-79-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-95-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-75-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/836-74-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
Processes:
kina9145.exekina8165.exekina9477.exebu697674.execor3865.exedNZ57s95.exepid process 2276 kina9145.exe 4080 kina8165.exe 3752 kina9477.exe 1900 bu697674.exe 840 cor3865.exe 836 dNZ57s95.exe -
Processes:
bu697674.execor3865.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bu697674.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor3865.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor3865.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
b686d55d4f8d4473a67dfbb05439a320d00573c9943bac4a97740b378454faa4.exekina9145.exekina8165.exekina9477.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b686d55d4f8d4473a67dfbb05439a320d00573c9943bac4a97740b378454faa4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina9145.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kina8165.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kina9477.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1472 840 WerFault.exe cor3865.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cor3865.exedNZ57s95.exeb686d55d4f8d4473a67dfbb05439a320d00573c9943bac4a97740b378454faa4.exekina9145.exekina8165.exekina9477.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cor3865.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dNZ57s95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b686d55d4f8d4473a67dfbb05439a320d00573c9943bac4a97740b378454faa4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina9145.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina8165.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina9477.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
bu697674.execor3865.exepid process 1900 bu697674.exe 1900 bu697674.exe 840 cor3865.exe 840 cor3865.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bu697674.execor3865.exedNZ57s95.exedescription pid process Token: SeDebugPrivilege 1900 bu697674.exe Token: SeDebugPrivilege 840 cor3865.exe Token: SeDebugPrivilege 836 dNZ57s95.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
b686d55d4f8d4473a67dfbb05439a320d00573c9943bac4a97740b378454faa4.exekina9145.exekina8165.exekina9477.exedescription pid process target process PID 376 wrote to memory of 2276 376 b686d55d4f8d4473a67dfbb05439a320d00573c9943bac4a97740b378454faa4.exe kina9145.exe PID 376 wrote to memory of 2276 376 b686d55d4f8d4473a67dfbb05439a320d00573c9943bac4a97740b378454faa4.exe kina9145.exe PID 376 wrote to memory of 2276 376 b686d55d4f8d4473a67dfbb05439a320d00573c9943bac4a97740b378454faa4.exe kina9145.exe PID 2276 wrote to memory of 4080 2276 kina9145.exe kina8165.exe PID 2276 wrote to memory of 4080 2276 kina9145.exe kina8165.exe PID 2276 wrote to memory of 4080 2276 kina9145.exe kina8165.exe PID 4080 wrote to memory of 3752 4080 kina8165.exe kina9477.exe PID 4080 wrote to memory of 3752 4080 kina8165.exe kina9477.exe PID 4080 wrote to memory of 3752 4080 kina8165.exe kina9477.exe PID 3752 wrote to memory of 1900 3752 kina9477.exe bu697674.exe PID 3752 wrote to memory of 1900 3752 kina9477.exe bu697674.exe PID 3752 wrote to memory of 840 3752 kina9477.exe cor3865.exe PID 3752 wrote to memory of 840 3752 kina9477.exe cor3865.exe PID 3752 wrote to memory of 840 3752 kina9477.exe cor3865.exe PID 4080 wrote to memory of 836 4080 kina8165.exe dNZ57s95.exe PID 4080 wrote to memory of 836 4080 kina8165.exe dNZ57s95.exe PID 4080 wrote to memory of 836 4080 kina8165.exe dNZ57s95.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b686d55d4f8d4473a67dfbb05439a320d00573c9943bac4a97740b378454faa4.exe"C:\Users\Admin\AppData\Local\Temp\b686d55d4f8d4473a67dfbb05439a320d00573c9943bac4a97740b378454faa4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina9145.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina9145.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8165.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kina8165.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina9477.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kina9477.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu697674.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bu697674.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3865.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor3865.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 10806⤵
- Program crash
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dNZ57s95.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dNZ57s95.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 840 -ip 8401⤵PID:3608
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
823KB
MD5ed64423fbf5ea5696fa9ffb475127b05
SHA1c3c9cdab33d24df40011b98274d60ebd9b562c2c
SHA256b0a2c64bf2695940b0c827f8b5c4da8255f9dedfb9a8a28a742656d3da61ac28
SHA5123460d09f62bee4f96c081aedbfc023cf5b463e023bfcb61fa2f0993ca836ed50b6cdaf73a4a396c68d64b9a877e1bfd76c87caaddb847519a2db4909e413053d
-
Filesize
681KB
MD585d3eca46d83dc4bc422462893a8a950
SHA198b48fed09000343ea498045a7082754515b6bd4
SHA256c7e8000d108ccb6e192e808e977e78d160dcc388bebc07bac1af4844ff8a3a0f
SHA512a2bf10af06abf073a2317dbda412d40e96152977a0670fa5e51145365a688f32aa5159432ace6cf2ab8f1778c83ec2a7eb86b32e062000eeabc85b4e474344c3
-
Filesize
352KB
MD502de5b25667fb260f53ed4aaea6fca26
SHA1a2548e9d50f375e1f5bfec2849657c609830e432
SHA25693dd1932cbf0d197fd3e3f91019a90c1962dec331accdb99f9c8d31b46bf0780
SHA51299ffd956ed2328089c5a2d30f6733f4a44764636ead2d856c9935338e41f6919b610c921ec220fbf02e25cd8248a364dd8bb9c34923f4acfbaefa488ae5ce488
-
Filesize
338KB
MD50133f48ef472afdbe9ef0d755964e934
SHA1c221603c032c739ee20781f81b0964ea671828b3
SHA25696bceff9ffd5bbfb2afdcd06a020d17bb2413600d4460f0045b35f549edae0fc
SHA5124c0a269dfc80eadd2e5a8f341750b4d816f013fd0be59c4812252eeecac787e7b2f2c879e57d4336c1ce6ff241c2e28a1a3bf45db36bcfd661c6d04286a34d6c
-
Filesize
13KB
MD5bdaf1569de98cd41683c44a11fbfd79f
SHA1c6111996f14ac096caa1eee0c498263fd2849d28
SHA256f37692c9afa17d2a82961767b9106ab84b64b0cf150b3a688f35c815feb8bff0
SHA512ffd7e7ae16ec5fedb55304d29e23a0935560a6b1d0dc93119b4c962efa95f7b8e0ebfe59b3fb753de3f544c979697959f9f38e3a889a5e61f9dd1b7c682a5233
-
Filesize
294KB
MD5bb59a1c7e47e6f02ab247dd3eeb94906
SHA151f19ba29af814c15bcf10f2f388b205fef1c7ff
SHA256afee1ac709e42c7edfe03e88af406e438fa03190eb294fe178ab34df28488c8d
SHA512959709a6572550faea29ca910759eb4377aab196622e795efe5dbc566b72f3f183dc6e336765f7375dcbc93325241ac55f797b3f18afef1cf29404455883d84e