Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 07:55
Static task
static1
Behavioral task
behavioral1
Sample
733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe
Resource
win10v2004-20241007-en
General
-
Target
733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe
-
Size
658KB
-
MD5
c0e8d44559834eae09f1274dd38c8b22
-
SHA1
d93281f69b601d526276c221f72ea8aa27289c0b
-
SHA256
733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7
-
SHA512
fba132a94cab28a466f596b5d61d62618d9161cc2a62ea25e5f773678e6e1cfc9e49d30dbd48576b5546e544ff96c209ed66af999264c498cab0779032c84c70
-
SSDEEP
12288:cMrky90X+pXJPa43VZWVI81Af1gKHNdYo04s44I+3t//SSL/4:gyCIfWVeGKHzYo04oT3N/Sw4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4760-18-0x0000000002E00000-0x0000000002E1A000-memory.dmp healer behavioral1/memory/4760-20-0x0000000004A50000-0x0000000004A68000-memory.dmp healer behavioral1/memory/4760-26-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-48-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-46-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-44-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-42-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-40-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-38-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-36-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-34-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-32-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-30-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-28-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-24-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-21-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4760-22-0x0000000004A50000-0x0000000004A62000-memory.dmp healer -
Healer family
-
Processes:
pro0398.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0398.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0398.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2844-60-0x0000000004BB0000-0x0000000004BF6000-memory.dmp family_redline behavioral1/memory/2844-61-0x00000000071D0000-0x0000000007214000-memory.dmp family_redline behavioral1/memory/2844-83-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-93-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-95-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-91-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-89-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-87-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-85-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-81-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-79-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-77-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-75-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-73-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-71-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-69-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-67-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-65-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-63-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/2844-62-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un052974.exepro0398.exequ5463.exepid process 400 un052974.exe 4760 pro0398.exe 2844 qu5463.exe -
Processes:
pro0398.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0398.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0398.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exeun052974.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un052974.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2432 4760 WerFault.exe pro0398.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro0398.exequ5463.exe733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exeun052974.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0398.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un052974.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0398.exepid process 4760 pro0398.exe 4760 pro0398.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0398.exequ5463.exedescription pid process Token: SeDebugPrivilege 4760 pro0398.exe Token: SeDebugPrivilege 2844 qu5463.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exeun052974.exedescription pid process target process PID 1256 wrote to memory of 400 1256 733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe un052974.exe PID 1256 wrote to memory of 400 1256 733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe un052974.exe PID 1256 wrote to memory of 400 1256 733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe un052974.exe PID 400 wrote to memory of 4760 400 un052974.exe pro0398.exe PID 400 wrote to memory of 4760 400 un052974.exe pro0398.exe PID 400 wrote to memory of 4760 400 un052974.exe pro0398.exe PID 400 wrote to memory of 2844 400 un052974.exe qu5463.exe PID 400 wrote to memory of 2844 400 un052974.exe qu5463.exe PID 400 wrote to memory of 2844 400 un052974.exe qu5463.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe"C:\Users\Admin\AppData\Local\Temp\733aa18e9a2a660a44e06fff3bf377b1b40862d3c31813c3b746bf434c3f3fa7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un052974.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0398.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0398.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 10884⤵
- Program crash
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5463.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5463.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4760 -ip 47601⤵PID:668
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5c239ad6d65dc07a48c10a62566a7f8b9
SHA11362f0b830603fdae33b8c4f54714d59762348ed
SHA256cef3ffb2bee2713b44bd99590a134d3b4963e677160f0e33fd9c6d2b269a3a30
SHA51269e12d02e7beed1cd2688767ba9bb0c09c085b9f0c8ebe121484f8198333512635bbc03c0053ff131b1cb172fbbe586eb0154d5ee4e84c0c11ae8f016ad4b7b0
-
Filesize
284KB
MD552f1e2be256fbb4aeec7ea776c413009
SHA156adcc42e0bac18e7d5cd6b4dbc4fcf356d116c9
SHA2561aca61b56cbcaeb031637958229de4729a90ecce17f7d7e8c6ecfe8826fcdaf7
SHA512569b5d82cf7db375dfdd699822a3ae112038cec03ae4340982a2cfd57cf0cfbe21135ca274733142e0cc71459e999e984e8e65e24ddb04f819ce941dcd957d8e
-
Filesize
342KB
MD5999d9244a71a56d5970399a229742f54
SHA11ef3773f637578c71063816f4ef25940f3f62dce
SHA256f50e4a87b9edcbdf5bea07e4891fd1204dd116fca585914b186e4ec0d4f74c24
SHA512c5ff39ca6812853cec54d667f904214da2afa56c94c1bb0595a8c4c4286fccfa9993cd17e67b5605121b5873fc6b4838aab58249a1e8c187fa65c28d7986f5e9