Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:13
Static task
static1
Behavioral task
behavioral1
Sample
3121dbc4df2edc503e040d1db86dcc3a3a0c11eb269be0799ac21e02efdd385f.exe
Resource
win10v2004-20241007-en
General
-
Target
3121dbc4df2edc503e040d1db86dcc3a3a0c11eb269be0799ac21e02efdd385f.exe
-
Size
659KB
-
MD5
2505a272c17c5fc9e7986bd241356b70
-
SHA1
d4aae4788a2dad435e721757df8f2b5d224844d2
-
SHA256
3121dbc4df2edc503e040d1db86dcc3a3a0c11eb269be0799ac21e02efdd385f
-
SHA512
bd068d310d5d3dd2d9f52c3ca299f0d5b2de8a656e5d7dafcdce8435ba20743d193b52a833dc6bbac62c7f4052b8db7faa00ece2dc128fbfe26ff6245c942034
-
SSDEEP
12288:OMrwy90R7Ck/dqJLkh9ohU5hGcQgczRMgaau/ncMWsj:qywCk/EJ7SfW9M9aukMWsj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1696-19-0x0000000002370000-0x000000000238A000-memory.dmp healer behavioral1/memory/1696-21-0x0000000002520000-0x0000000002538000-memory.dmp healer behavioral1/memory/1696-35-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-49-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-47-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-45-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-43-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-41-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-39-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-37-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-31-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-29-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-27-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-25-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-22-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-33-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/1696-23-0x0000000002520000-0x0000000002532000-memory.dmp healer -
Healer family
-
Processes:
pro0852.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0852.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4056-61-0x00000000023E0000-0x0000000002426000-memory.dmp family_redline behavioral1/memory/4056-62-0x0000000004A90000-0x0000000004AD4000-memory.dmp family_redline behavioral1/memory/4056-68-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-66-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-64-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-63-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-84-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-96-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-94-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-92-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-90-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-88-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-82-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-80-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-78-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-77-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-74-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-72-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-70-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4056-86-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un640214.exepro0852.exequ8637.exepid process 4484 un640214.exe 1696 pro0852.exe 4056 qu8637.exe -
Processes:
pro0852.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0852.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0852.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3121dbc4df2edc503e040d1db86dcc3a3a0c11eb269be0799ac21e02efdd385f.exeun640214.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3121dbc4df2edc503e040d1db86dcc3a3a0c11eb269be0799ac21e02efdd385f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un640214.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3104 1696 WerFault.exe pro0852.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3121dbc4df2edc503e040d1db86dcc3a3a0c11eb269be0799ac21e02efdd385f.exeun640214.exepro0852.exequ8637.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3121dbc4df2edc503e040d1db86dcc3a3a0c11eb269be0799ac21e02efdd385f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un640214.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0852.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8637.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0852.exepid process 1696 pro0852.exe 1696 pro0852.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0852.exequ8637.exedescription pid process Token: SeDebugPrivilege 1696 pro0852.exe Token: SeDebugPrivilege 4056 qu8637.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
3121dbc4df2edc503e040d1db86dcc3a3a0c11eb269be0799ac21e02efdd385f.exeun640214.exedescription pid process target process PID 488 wrote to memory of 4484 488 3121dbc4df2edc503e040d1db86dcc3a3a0c11eb269be0799ac21e02efdd385f.exe un640214.exe PID 488 wrote to memory of 4484 488 3121dbc4df2edc503e040d1db86dcc3a3a0c11eb269be0799ac21e02efdd385f.exe un640214.exe PID 488 wrote to memory of 4484 488 3121dbc4df2edc503e040d1db86dcc3a3a0c11eb269be0799ac21e02efdd385f.exe un640214.exe PID 4484 wrote to memory of 1696 4484 un640214.exe pro0852.exe PID 4484 wrote to memory of 1696 4484 un640214.exe pro0852.exe PID 4484 wrote to memory of 1696 4484 un640214.exe pro0852.exe PID 4484 wrote to memory of 4056 4484 un640214.exe qu8637.exe PID 4484 wrote to memory of 4056 4484 un640214.exe qu8637.exe PID 4484 wrote to memory of 4056 4484 un640214.exe qu8637.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3121dbc4df2edc503e040d1db86dcc3a3a0c11eb269be0799ac21e02efdd385f.exe"C:\Users\Admin\AppData\Local\Temp\3121dbc4df2edc503e040d1db86dcc3a3a0c11eb269be0799ac21e02efdd385f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un640214.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un640214.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0852.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0852.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1696 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 10884⤵
- Program crash
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8637.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8637.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1696 -ip 16961⤵PID:4080
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5ef5b29acebdc6211987147f01aeaf6c8
SHA18ceb3d06465b8c22fbbfd8066ca38fc455751d0e
SHA256b3976b028d7f32368facfdc777b580c518eaf20eff7b974c30f604aa2c23f4de
SHA512092119d236ea19d9932f28d47a28f6563a5f42a6eb89caefe6edd725a63f1d702375fc10009fe2388602424ec64444318a3286a060eacfa2a43f99828c8204b6
-
Filesize
236KB
MD5fb8292a3fbc000def1bb475838514518
SHA18ba87627964a0952c94822665628584fafce98fe
SHA256d1ccedd7c13d73bfa4edb9f55517b1e4f15bee8b49ee90f384371bd642dd0645
SHA512c11e039814f516a66b9ea14d50f98fd3ef6c6362cfee8b1b118c6a2029021bdd430931c6f55e275ac3aa84626ba92cc3020d11daa13c69696d6639399a2f55bb
-
Filesize
294KB
MD50002a0ff4050129dadc5d1f3d8496779
SHA14efd7e6e84f90ce4ffcb612fc4edb306c0e156e1
SHA256f0e5b7963b57343baf35f2912774cc6bc3352855432bbf878df65860f6cb3521
SHA51224a002703d104f74048c4a96b4cdb39d15cc48b8878c9403ed0f5853399669e68b1d355b9bfdc86da3ef2bf39128da10257904c89da1efd7c9703525d0ec476f