Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669.exe
Resource
win10v2004-20241007-en
General
-
Target
f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669.exe
-
Size
658KB
-
MD5
c6637cad71072dcd58d169d88f9f3302
-
SHA1
1fc79eac8edf17092be4e78601efeb4d2ff80b7f
-
SHA256
f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669
-
SHA512
89a037a21bea5180607242e50dd1a9877f0a1d1694d04d054e6f6c09593e1099378a5bae077162bbda471857c1d84a9169785a5dd4ba4936756bf9292746b125
-
SSDEEP
12288:GMrMy90mI7y2w0x9WoDQIFSsntln1tonwborBmLt8QC6OmQ447zWKB68vl2uXvDb:uyahScbFBntt1mnhBmhK1m54mKkuXvP
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2752-19-0x00000000022F0000-0x000000000230A000-memory.dmp healer behavioral1/memory/2752-21-0x0000000002740000-0x0000000002758000-memory.dmp healer behavioral1/memory/2752-43-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-49-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-47-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-45-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-41-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-39-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-37-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-35-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-33-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-31-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-29-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-27-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-25-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-23-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/2752-22-0x0000000002740000-0x0000000002752000-memory.dmp healer -
Healer family
-
Processes:
pro9581.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9581.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9581.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/864-61-0x00000000025D0000-0x0000000002616000-memory.dmp family_redline behavioral1/memory/864-62-0x0000000002690000-0x00000000026D4000-memory.dmp family_redline behavioral1/memory/864-68-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-76-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-96-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-94-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-92-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-88-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-86-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-85-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-82-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-80-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-78-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-74-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-72-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-70-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-90-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-66-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-64-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/864-63-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un417903.exepro9581.exequ2843.exepid process 408 un417903.exe 2752 pro9581.exe 864 qu2843.exe -
Processes:
pro9581.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9581.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669.exeun417903.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un417903.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2656 2752 WerFault.exe pro9581.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un417903.exepro9581.exequ2843.exef7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un417903.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9581.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2843.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9581.exepid process 2752 pro9581.exe 2752 pro9581.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9581.exequ2843.exedescription pid process Token: SeDebugPrivilege 2752 pro9581.exe Token: SeDebugPrivilege 864 qu2843.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669.exeun417903.exedescription pid process target process PID 2756 wrote to memory of 408 2756 f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669.exe un417903.exe PID 2756 wrote to memory of 408 2756 f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669.exe un417903.exe PID 2756 wrote to memory of 408 2756 f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669.exe un417903.exe PID 408 wrote to memory of 2752 408 un417903.exe pro9581.exe PID 408 wrote to memory of 2752 408 un417903.exe pro9581.exe PID 408 wrote to memory of 2752 408 un417903.exe pro9581.exe PID 408 wrote to memory of 864 408 un417903.exe qu2843.exe PID 408 wrote to memory of 864 408 un417903.exe qu2843.exe PID 408 wrote to memory of 864 408 un417903.exe qu2843.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669.exe"C:\Users\Admin\AppData\Local\Temp\f7e791e18d73b82ff4311ed0e42631f1eae064adfa3885281b1580db2b02b669.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un417903.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un417903.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9581.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9581.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 10964⤵
- Program crash
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2843.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2843.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2752 -ip 27521⤵PID:2308
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5668f1ffd60d2bb09121847873740c00a
SHA100bc5dde4e962c8aa1e50a04f9df119d0e834020
SHA25685f89c496cdc2779e518f6aed204738e86f73ed1d324120b207c3eae20815525
SHA5121ab11a1829a933622b6729309156902a55b168f9ca468f2ae85857d625286bdf14770383891dd0a62129a76276caf8dcc5e56177e1b4839f780e0ed083ff1bf8
-
Filesize
235KB
MD5e5dfaf1ee07a1721f7ccdfc8f30cd52c
SHA13b234d4d402583eeb778c7a9dd837bfeb1cc180a
SHA256a563eec6ce0985fb0fbd7983daaa3590d276458c32e436d1fb555382326df6f8
SHA512dee4f88d0e9bfebbac5756d7039c26ab2ef1f234a1404f004a430940d51e9b53a998bd8c955aa688e303d2e021011aa58c70d746a6a4314a8dec830e69253672
-
Filesize
294KB
MD58c35d8d2cf0ee2ac22f7add1a32c32db
SHA1547a7ecf034008f29fdc822dcea863df75f7dc13
SHA25690b2523f3fd82a5154820650aeb11573e45b5df00d4691e1c4651898328071c7
SHA512bf488f396af47adecec4318b6cd991d36398ea136b3618047f9999b263b0afa0f68ec747886383e1e82233df401ff41920ea21a60f9dbc3d2a0f4e32df7c03be