Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
72dd2ba6c1e0997322c758d8a2ca0e3084165e4ee4b6db793fff5d55e72fbcb3.exe
Resource
win10v2004-20241007-en
General
-
Target
72dd2ba6c1e0997322c758d8a2ca0e3084165e4ee4b6db793fff5d55e72fbcb3.exe
-
Size
926KB
-
MD5
0c9c28857fa4e47ffe8f0cf8d7574a68
-
SHA1
e22c779a13236a0d357b774a957da6f74355880b
-
SHA256
72dd2ba6c1e0997322c758d8a2ca0e3084165e4ee4b6db793fff5d55e72fbcb3
-
SHA512
608859efab089d4d49b08f961ab9fec713bb89d75f1bb630db3cbc223c87903b39af6641bf69da371912f33230a4d611289a8ada18825905b94428b1cd3f1f62
-
SSDEEP
12288:PMr4y90erbE0LDPsCiqc9RgFiJrPMdCOHxs5mOT3ud+TuAQ0ctUyKFWs2qxIRV7u:zyZrLsqc9cqqCORsdu+KA0vKFgXRVfq
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1080-25-0x0000000002250000-0x000000000226A000-memory.dmp healer behavioral1/memory/1080-27-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/1080-53-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-55-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-51-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-28-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1080-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pr022340.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr022340.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr022340.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr022340.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr022340.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr022340.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr022340.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1788-67-0x0000000004A50000-0x0000000004A96000-memory.dmp family_redline behavioral1/memory/1788-68-0x0000000004AD0000-0x0000000004B14000-memory.dmp family_redline behavioral1/memory/1788-76-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-74-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-72-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-70-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-69-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-80-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-78-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-102-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-84-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-82-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-100-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-98-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-96-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-94-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-92-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-90-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-88-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/1788-86-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
un294940.exeun139796.exepr022340.exequ758537.exepid process 3568 un294940.exe 2792 un139796.exe 1080 pr022340.exe 1788 qu758537.exe -
Processes:
pr022340.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr022340.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr022340.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
un139796.exe72dd2ba6c1e0997322c758d8a2ca0e3084165e4ee4b6db793fff5d55e72fbcb3.exeun294940.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un139796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 72dd2ba6c1e0997322c758d8a2ca0e3084165e4ee4b6db793fff5d55e72fbcb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un294940.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1688 1080 WerFault.exe pr022340.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
72dd2ba6c1e0997322c758d8a2ca0e3084165e4ee4b6db793fff5d55e72fbcb3.exeun294940.exeun139796.exepr022340.exequ758537.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72dd2ba6c1e0997322c758d8a2ca0e3084165e4ee4b6db793fff5d55e72fbcb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un294940.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un139796.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr022340.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu758537.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr022340.exepid process 1080 pr022340.exe 1080 pr022340.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr022340.exequ758537.exedescription pid process Token: SeDebugPrivilege 1080 pr022340.exe Token: SeDebugPrivilege 1788 qu758537.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
72dd2ba6c1e0997322c758d8a2ca0e3084165e4ee4b6db793fff5d55e72fbcb3.exeun294940.exeun139796.exedescription pid process target process PID 3452 wrote to memory of 3568 3452 72dd2ba6c1e0997322c758d8a2ca0e3084165e4ee4b6db793fff5d55e72fbcb3.exe un294940.exe PID 3452 wrote to memory of 3568 3452 72dd2ba6c1e0997322c758d8a2ca0e3084165e4ee4b6db793fff5d55e72fbcb3.exe un294940.exe PID 3452 wrote to memory of 3568 3452 72dd2ba6c1e0997322c758d8a2ca0e3084165e4ee4b6db793fff5d55e72fbcb3.exe un294940.exe PID 3568 wrote to memory of 2792 3568 un294940.exe un139796.exe PID 3568 wrote to memory of 2792 3568 un294940.exe un139796.exe PID 3568 wrote to memory of 2792 3568 un294940.exe un139796.exe PID 2792 wrote to memory of 1080 2792 un139796.exe pr022340.exe PID 2792 wrote to memory of 1080 2792 un139796.exe pr022340.exe PID 2792 wrote to memory of 1080 2792 un139796.exe pr022340.exe PID 2792 wrote to memory of 1788 2792 un139796.exe qu758537.exe PID 2792 wrote to memory of 1788 2792 un139796.exe qu758537.exe PID 2792 wrote to memory of 1788 2792 un139796.exe qu758537.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72dd2ba6c1e0997322c758d8a2ca0e3084165e4ee4b6db793fff5d55e72fbcb3.exe"C:\Users\Admin\AppData\Local\Temp\72dd2ba6c1e0997322c758d8a2ca0e3084165e4ee4b6db793fff5d55e72fbcb3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un294940.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un294940.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un139796.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un139796.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr022340.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr022340.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1080 -s 10045⤵
- Program crash
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu758537.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu758537.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1080 -ip 10801⤵PID:4408
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661KB
MD53bf0e9a47fbc1fb94675258b0faaf60d
SHA1550339c382b4172f8f3c92a63ad2f69b9010425a
SHA2563b9e881e4b0ac5bb699948fc6f9bb57d9a4e2b9f39ba1bb79dd71a774057e15f
SHA5128878e6982c0e86fe28a1d3d167f16f19940a03a07ccc9f8e9eb45d4dbda57512c69ddb3bdc4088bc62c9946bf28a40a5247badc85fcf597dc5585dfc5771b8b5
-
Filesize
519KB
MD51773c2cd6cfc999ba3477406a8d99ddc
SHA1f16603814d4bd0ab9b166b27e1b230f05a113df7
SHA256167bae852da2237e09ac8c273cfcb92aa2751d115cff1dd869a2af7a6dc68534
SHA512557ebbbbc387b09af5fd0daa18a234ec4f48fa8533afff17fe8d18a5c2398745e060f6c6ef154e8ee112ccb6906861478980b0c4f0dc907604730da252be3f68
-
Filesize
239KB
MD5ee36b180ba70628e7eb27cebc510cc52
SHA12c3f7ee0fceb76a43641bbfaf3c9715c8262d853
SHA2567adba7db347c2ac6298f64cb138863c5a9478efcf1d3d7a7e807dfe2db9e6850
SHA5125ea295d49d4c3ff658fdc2f5d1ede9e0ef93b173ef9bb61d7e9a7cfd6b86433882de39a3a1fcb0a8b5c1ef649ef8d38dd2887d827c1535a82b660efa91cc3190
-
Filesize
298KB
MD51bffbd74c0255dc0de8e4e44ae68fbac
SHA17dc0adeec05b70aeac7772363e9ec024a77385b1
SHA2569458b01ecbf0970833a6bb3e1e5d8d6a63a10c2e7b9ad292ceb7bc39edc02458
SHA512e22b9f1d68ba9a06b7556575455a592d8ea9d17a25fb179697bcd04cf7625fc892841220de885bee8db2647557d2177ad59b4d5188084fee83935c33a076b0bf