Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 07:49
Static task
static1
Behavioral task
behavioral1
Sample
3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe
Resource
win10v2004-20241007-en
General
-
Target
3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe
-
Size
688KB
-
MD5
7491278e5cb82d94a818950c4b18294b
-
SHA1
4e024d75ac9824a0f9174653012433c0a905dfb0
-
SHA256
3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159
-
SHA512
677489c9a70d58d36ade3ca2933753011d42866f781407f2f6fca83f678859374daa145d7886bd882e5edb04e4f23b7158055f4be4db899a9788e4c04a40bfc4
-
SSDEEP
12288:iMrOy90vTp+AttQEZ5w8Yhym65hLuL8Fx6EjKhJNGrwb4lBmJkvSFmofig+r/6u+:oyGxttQEZsItfaYFjKhJmg4XmJkumoaW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2340-19-0x0000000004D80000-0x0000000004D9A000-memory.dmp healer behavioral1/memory/2340-21-0x00000000053A0000-0x00000000053B8000-memory.dmp healer behavioral1/memory/2340-33-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-49-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-47-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-45-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-43-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-41-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-39-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-37-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-35-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-31-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-29-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-27-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-25-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-23-0x00000000053A0000-0x00000000053B2000-memory.dmp healer behavioral1/memory/2340-22-0x00000000053A0000-0x00000000053B2000-memory.dmp healer -
Healer family
-
Processes:
pro2144.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2144.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2144.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2144.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4660-60-0x0000000005E60000-0x0000000005EA6000-memory.dmp family_redline behavioral1/memory/4660-61-0x0000000006610000-0x0000000006654000-memory.dmp family_redline behavioral1/memory/4660-63-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-69-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-95-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-93-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-91-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-89-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-87-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-85-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-83-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-81-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-79-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-77-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-75-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-73-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-67-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-65-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-71-0x0000000006610000-0x000000000664F000-memory.dmp family_redline behavioral1/memory/4660-62-0x0000000006610000-0x000000000664F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un646162.exepro2144.exequ1715.exepid process 2168 un646162.exe 2340 pro2144.exe 4660 qu1715.exe -
Processes:
pro2144.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2144.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2144.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exeun646162.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un646162.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3872 2340 WerFault.exe pro2144.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exeun646162.exepro2144.exequ1715.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un646162.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2144.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1715.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro2144.exepid process 2340 pro2144.exe 2340 pro2144.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro2144.exequ1715.exedescription pid process Token: SeDebugPrivilege 2340 pro2144.exe Token: SeDebugPrivilege 4660 qu1715.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exeun646162.exedescription pid process target process PID 4168 wrote to memory of 2168 4168 3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe un646162.exe PID 4168 wrote to memory of 2168 4168 3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe un646162.exe PID 4168 wrote to memory of 2168 4168 3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe un646162.exe PID 2168 wrote to memory of 2340 2168 un646162.exe pro2144.exe PID 2168 wrote to memory of 2340 2168 un646162.exe pro2144.exe PID 2168 wrote to memory of 2340 2168 un646162.exe pro2144.exe PID 2168 wrote to memory of 4660 2168 un646162.exe qu1715.exe PID 2168 wrote to memory of 4660 2168 un646162.exe qu1715.exe PID 2168 wrote to memory of 4660 2168 un646162.exe qu1715.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe"C:\Users\Admin\AppData\Local\Temp\3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646162.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646162.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2144.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2144.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 10844⤵
- Program crash
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1715.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1715.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4660
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2340 -ip 23401⤵PID:1308
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5747cf1ef037a228f2185faa2ce0f46d3
SHA1eb1c0a7d268dd6163675b00a56ccaa501edbc46b
SHA2569c9fb2e48d6b25a15ef8c00bbdb41e3991c004c32e1982f0e8a9630bf2099dbb
SHA512e541fa36e1cea8c70dcb0d93467c02a972d10cee97be34cfd9c83f65368b3f1dc1006db757b92590f71d29e1f3fdfe6fa29fd62b37fcee0a0cb1ccbe59b144ad
-
Filesize
291KB
MD5f241c6d27958f6efd421b3915353f3ff
SHA1cc150d82eff71a69a96c0cc8d481c12903d71368
SHA2567d9446bea7316260f525527cf0f2ab0cbfc65886343cc8de2f74230302b618e4
SHA512f8af71217d3a80e9ddee19ff7e8e37b15157200f43776261d3b1be9f43e25056f93c731d1ecccd9e01d1e407f6c2c733387f8f2e155bd6855506f0e357dae1fb
-
Filesize
345KB
MD5292af942982b0fb15085f347a6ad31e3
SHA1fa27fecd2ef81ab106f994769354de6269caab85
SHA25672b8af586ff8e63d3dc1d755bd344a68209dee0e9db451755eeafa0690d661e2
SHA51227994f7b764f41aaf321db0e1e21d58ca25981d46fa167768b94206eb4edf7c349c3e348fb1c63ccc369fef25add3f233c5f5d70bb7b96425ee4c0ba7c8b430c