Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92.exe
Resource
win10v2004-20241007-en
General
-
Target
24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92.exe
-
Size
658KB
-
MD5
95fd1e5da6f4fa14fea0f19ecb276fcb
-
SHA1
1deb3b15b7ac28a3455e4a9ed2d06da5d56106f8
-
SHA256
24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92
-
SHA512
cdc8bf564e90bb0bc018d8afbf04b35d58e6c85c6df481c52ddafd32ee24363d5621dbda68e4627cef96790f4a204a0b42c796e31734d535be55f965935e57e3
-
SSDEEP
12288:2Mrky90eaTTJ/SR3/ab8FYLu6fwN3YgouYd+a7sPAdw/p9:my3KQx/ab8F4TS3YgoH7sY2j
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3260-17-0x0000000004D30000-0x0000000004D4A000-memory.dmp healer behavioral1/memory/3260-20-0x0000000007250000-0x0000000007268000-memory.dmp healer behavioral1/memory/3260-21-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-48-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-46-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-45-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-42-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-40-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-39-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-37-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-34-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-32-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-31-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-29-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-27-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-24-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3260-22-0x0000000007250000-0x0000000007262000-memory.dmp healer -
Healer family
-
Processes:
pro9957.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9957.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1336-61-0x0000000004C30000-0x0000000004C76000-memory.dmp family_redline behavioral1/memory/1336-62-0x0000000007730000-0x0000000007774000-memory.dmp family_redline behavioral1/memory/1336-70-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-76-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-96-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-94-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-92-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-90-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-86-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-84-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-82-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-80-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-78-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-74-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-72-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-88-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-68-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-66-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-64-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1336-63-0x0000000007730000-0x000000000776F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un795470.exepro9957.exequ8337.exepid process 2960 un795470.exe 3260 pro9957.exe 1336 qu8337.exe -
Processes:
pro9957.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9957.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92.exeun795470.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un795470.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 880 3260 WerFault.exe pro9957.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92.exeun795470.exepro9957.exequ8337.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un795470.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9957.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8337.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9957.exepid process 3260 pro9957.exe 3260 pro9957.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9957.exequ8337.exedescription pid process Token: SeDebugPrivilege 3260 pro9957.exe Token: SeDebugPrivilege 1336 qu8337.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92.exeun795470.exedescription pid process target process PID 2784 wrote to memory of 2960 2784 24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92.exe un795470.exe PID 2784 wrote to memory of 2960 2784 24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92.exe un795470.exe PID 2784 wrote to memory of 2960 2784 24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92.exe un795470.exe PID 2960 wrote to memory of 3260 2960 un795470.exe pro9957.exe PID 2960 wrote to memory of 3260 2960 un795470.exe pro9957.exe PID 2960 wrote to memory of 3260 2960 un795470.exe pro9957.exe PID 2960 wrote to memory of 1336 2960 un795470.exe qu8337.exe PID 2960 wrote to memory of 1336 2960 un795470.exe qu8337.exe PID 2960 wrote to memory of 1336 2960 un795470.exe qu8337.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92.exe"C:\Users\Admin\AppData\Local\Temp\24ddcfae4fc86df6a4c0b2adfc484292057a20782756bdec27bb1861b0125d92.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un795470.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un795470.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9957.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9957.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 10884⤵
- Program crash
PID:880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8337.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8337.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3260 -ip 32601⤵PID:3336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD58eb29f8e37cb852de9d824a53898cf32
SHA17a1207c45fe6f22462deb591d6abfcf76b4ff29e
SHA256eb378cb32155e02b0389b9e3a5da37a57917ad045dcefede9836d9508d9f414c
SHA512407b888010888ec9f5ebb0523f700c761a9d4bb908d6a0d5563a95b9f4bcb7bd89969c489fb50fcbd85850c7b8cab6c7bba43b2bb432e1e27302b967f26c85e6
-
Filesize
275KB
MD58f9c8bc85e2a1296130665fe942cdf8f
SHA1f96ab9cea6d3db507f5df6f13c6fe22c2c2ca836
SHA25653b4414e2477cb029f8164c69f02a352206baf272721b7d32da30315f91f80a8
SHA5121b3ff33636a955ddb4e80beecc649c1fb102fcdc3491ae82ff4327faa08499395402ccad256703a936a35f0ca13e6fca9821b314cdd7ce8efbf467775ed62d37
-
Filesize
333KB
MD534b546c967356ee2932326fbe9c878d3
SHA175016f21016fc333493f44b93670e079bec9530d
SHA256d02284d77c9971ab98c6dc93e5857d2603d196f6ec97f6f4b4101e436c3f880c
SHA51220ef110f835c9e9751ded38f8ac5d6b431b7209830d2ce40260a14f4ff8e3a7444533c15201b888d0abff998683d0357c2ada4bff127d122f2096518d4699efc