Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 07:48
Static task
static1
Behavioral task
behavioral1
Sample
bf442eba248b7548961d6214d66297ecc1da1db224080be41120598dcb3667d2.exe
Resource
win10v2004-20241007-en
General
-
Target
bf442eba248b7548961d6214d66297ecc1da1db224080be41120598dcb3667d2.exe
-
Size
658KB
-
MD5
b17f54cf1254af5e2f43b6aded0de99f
-
SHA1
1248bc857c2801ada6f3f03a1807de38942e5a53
-
SHA256
bf442eba248b7548961d6214d66297ecc1da1db224080be41120598dcb3667d2
-
SHA512
da3b845b809235ace9baa35b141f00e14db1bd23665abb342d9230b3015bd1e64f40477936505e1723795390ff0290e13d20bc28afd2f71bf3db0d5d3a6ab199
-
SSDEEP
12288:qMrAy90YgRaFZNtvw34N+Tn44ItV4ciZRc3:2yVwo434N+Tnt0yc3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3168-18-0x00000000047F0000-0x000000000480A000-memory.dmp healer behavioral1/memory/3168-20-0x0000000004AD0000-0x0000000004AE8000-memory.dmp healer behavioral1/memory/3168-21-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-48-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-46-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-42-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-40-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-38-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-36-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-34-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-32-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-30-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-28-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-26-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-24-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-45-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer behavioral1/memory/3168-22-0x0000000004AD0000-0x0000000004AE2000-memory.dmp healer -
Healer family
-
Processes:
pro5469.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5469.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5469.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/964-60-0x0000000004C40000-0x0000000004C86000-memory.dmp family_redline behavioral1/memory/964-61-0x0000000007170000-0x00000000071B4000-memory.dmp family_redline behavioral1/memory/964-63-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-73-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-95-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-93-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-91-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-89-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-87-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-85-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-83-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-81-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-79-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-75-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-71-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-69-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-67-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-65-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-77-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/964-62-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un288484.exepro5469.exequ9710.exepid process 2788 un288484.exe 3168 pro5469.exe 964 qu9710.exe -
Processes:
pro5469.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5469.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5469.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bf442eba248b7548961d6214d66297ecc1da1db224080be41120598dcb3667d2.exeun288484.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bf442eba248b7548961d6214d66297ecc1da1db224080be41120598dcb3667d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un288484.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4972 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 436 3168 WerFault.exe pro5469.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro5469.exequ9710.exebf442eba248b7548961d6214d66297ecc1da1db224080be41120598dcb3667d2.exeun288484.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5469.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9710.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bf442eba248b7548961d6214d66297ecc1da1db224080be41120598dcb3667d2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un288484.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5469.exepid process 3168 pro5469.exe 3168 pro5469.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5469.exequ9710.exedescription pid process Token: SeDebugPrivilege 3168 pro5469.exe Token: SeDebugPrivilege 964 qu9710.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
bf442eba248b7548961d6214d66297ecc1da1db224080be41120598dcb3667d2.exeun288484.exedescription pid process target process PID 3320 wrote to memory of 2788 3320 bf442eba248b7548961d6214d66297ecc1da1db224080be41120598dcb3667d2.exe un288484.exe PID 3320 wrote to memory of 2788 3320 bf442eba248b7548961d6214d66297ecc1da1db224080be41120598dcb3667d2.exe un288484.exe PID 3320 wrote to memory of 2788 3320 bf442eba248b7548961d6214d66297ecc1da1db224080be41120598dcb3667d2.exe un288484.exe PID 2788 wrote to memory of 3168 2788 un288484.exe pro5469.exe PID 2788 wrote to memory of 3168 2788 un288484.exe pro5469.exe PID 2788 wrote to memory of 3168 2788 un288484.exe pro5469.exe PID 2788 wrote to memory of 964 2788 un288484.exe qu9710.exe PID 2788 wrote to memory of 964 2788 un288484.exe qu9710.exe PID 2788 wrote to memory of 964 2788 un288484.exe qu9710.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf442eba248b7548961d6214d66297ecc1da1db224080be41120598dcb3667d2.exe"C:\Users\Admin\AppData\Local\Temp\bf442eba248b7548961d6214d66297ecc1da1db224080be41120598dcb3667d2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un288484.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un288484.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5469.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5469.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3168 -s 10884⤵
- Program crash
PID:436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9710.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9710.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3168 -ip 31681⤵PID:2872
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4972
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5c3ec91274ad4a13cea150b2a97e9ef46
SHA125dcc13e190c9da18ce124083998775a02cc364f
SHA2564d267a297b2e25deb1e9540ba9e829d7e0cfd6b5eae7e838d12435ac74f06c68
SHA512d0d9c1f4d600248f20bfb5d82311ef5fb469936f4d72607d9d997e5b57561f0dc844f6d575044e593ae403a6e2888b20b8d4b9a69a0ed70c9b59203cacfdea9a
-
Filesize
284KB
MD54927e1041c3fed4bc05e2d46d695b570
SHA1069bd61566c71cbaf20ed6af4af946f351cd78fb
SHA2565b94f34ab73079f4df469e48586fbba4a35f9f46d1be393b5130608da65f7a3e
SHA512a3f058533bf7dca08255258f5ebe5efe363ce89440034a1ae10f84654dfc35bf123d3577f62a83b88d6931fb730f06fe67d502528a62aa3a6b9a245aa64ad00c
-
Filesize
342KB
MD5430d00176829426f41ec7933aae9be76
SHA1946eccad4d78cf8eaf106482919645e916145112
SHA2563bdaaa17c6824b3cc49554d8d2f09e32c681bf564be775bd777e19d53dba4ae2
SHA5127c19b63e4011c67e94870fbfef7e69e5f2bc633947cab952eda5ea7cd58bc1f90b2b4002c099af19169e2d3ad689663f4f3c19e1e6b1fc328fc06f87211bd79f