Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
a25f0ad50bb0c735dc26a41e59160e3d1810027fec498160ad0d60f9e9c28825.exe
Resource
win10v2004-20241007-en
General
-
Target
a25f0ad50bb0c735dc26a41e59160e3d1810027fec498160ad0d60f9e9c28825.exe
-
Size
659KB
-
MD5
edae2aafd7b3e2c03c6d708eaa2da9aa
-
SHA1
a93d96f3c788562e63e922c8203e11cdf7ed8f9b
-
SHA256
a25f0ad50bb0c735dc26a41e59160e3d1810027fec498160ad0d60f9e9c28825
-
SHA512
46e9ec753b8c97871446da2b69aa1fd6ed1aef0ecccf0c84d63f345b7beecb3ad34a6736a99a6a19acaff0f0e1fb9b321df2026bebc150fe2958342839a3e73a
-
SSDEEP
12288:YMr0y90OGCYDWE115zhdugbtLAihx6h2gk32l9D4NxCyx9s8hA:cy6D9Nogbt8Ob32nIfx5hA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2944-19-0x0000000002720000-0x000000000273A000-memory.dmp healer behavioral1/memory/2944-21-0x0000000002AA0000-0x0000000002AB8000-memory.dmp healer behavioral1/memory/2944-43-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-49-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-47-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-45-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-41-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-39-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-38-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-35-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-33-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-31-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-29-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-27-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-26-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-23-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/2944-22-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer -
Healer family
-
Processes:
pro7049.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7049.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7049.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7049.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4904-60-0x00000000027D0000-0x0000000002816000-memory.dmp family_redline behavioral1/memory/4904-61-0x0000000004E70000-0x0000000004EB4000-memory.dmp family_redline behavioral1/memory/4904-73-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-77-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-95-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-93-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-91-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-87-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-85-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-83-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-81-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-79-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-75-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-71-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-69-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-89-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-67-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-65-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-63-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/4904-62-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un134252.exepro7049.exequ6478.exepid process 244 un134252.exe 2944 pro7049.exe 4904 qu6478.exe -
Processes:
pro7049.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7049.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7049.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a25f0ad50bb0c735dc26a41e59160e3d1810027fec498160ad0d60f9e9c28825.exeun134252.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a25f0ad50bb0c735dc26a41e59160e3d1810027fec498160ad0d60f9e9c28825.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un134252.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1496 2944 WerFault.exe pro7049.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a25f0ad50bb0c735dc26a41e59160e3d1810027fec498160ad0d60f9e9c28825.exeun134252.exepro7049.exequ6478.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a25f0ad50bb0c735dc26a41e59160e3d1810027fec498160ad0d60f9e9c28825.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un134252.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7049.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6478.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7049.exepid process 2944 pro7049.exe 2944 pro7049.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7049.exequ6478.exedescription pid process Token: SeDebugPrivilege 2944 pro7049.exe Token: SeDebugPrivilege 4904 qu6478.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a25f0ad50bb0c735dc26a41e59160e3d1810027fec498160ad0d60f9e9c28825.exeun134252.exedescription pid process target process PID 632 wrote to memory of 244 632 a25f0ad50bb0c735dc26a41e59160e3d1810027fec498160ad0d60f9e9c28825.exe un134252.exe PID 632 wrote to memory of 244 632 a25f0ad50bb0c735dc26a41e59160e3d1810027fec498160ad0d60f9e9c28825.exe un134252.exe PID 632 wrote to memory of 244 632 a25f0ad50bb0c735dc26a41e59160e3d1810027fec498160ad0d60f9e9c28825.exe un134252.exe PID 244 wrote to memory of 2944 244 un134252.exe pro7049.exe PID 244 wrote to memory of 2944 244 un134252.exe pro7049.exe PID 244 wrote to memory of 2944 244 un134252.exe pro7049.exe PID 244 wrote to memory of 4904 244 un134252.exe qu6478.exe PID 244 wrote to memory of 4904 244 un134252.exe qu6478.exe PID 244 wrote to memory of 4904 244 un134252.exe qu6478.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a25f0ad50bb0c735dc26a41e59160e3d1810027fec498160ad0d60f9e9c28825.exe"C:\Users\Admin\AppData\Local\Temp\a25f0ad50bb0c735dc26a41e59160e3d1810027fec498160ad0d60f9e9c28825.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un134252.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un134252.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7049.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7049.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 10044⤵
- Program crash
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6478.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6478.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2944 -ip 29441⤵PID:348
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD582d57a81e2c58b3a587f090a78cfe3e4
SHA1d84fc708e02d896f40fb64e9de2287b56302ac57
SHA2561137a123c8c6e4b34d6a83159c3ba87145674b46466a5fe6b5969057841f2a8f
SHA5129dd4b543b0224c832fc31d23c620d1479878b77dc6c6a229838faf8fcbb093694627ace61ebce6c375b256ba00ee088a73c4416c3a0239265b077dd2d7687bb3
-
Filesize
376KB
MD5b07ced63b5007975c507e0c7203ebd61
SHA1a24c1dfb6f31d9bcc25ebc625e400beee0457c87
SHA256177490bbd6683b30286c0d3ad087fbf712c0023892e4e39f9414ae5e12d67d73
SHA512dbfec9ec48769f6ac646fd4b4f9037dc56b622ad3813ac717017dbe1e226fc9c1875dca5558fc24c7a93b1532d827d2ff89b7103050ba8401ef5640cf52e146b
-
Filesize
434KB
MD5c154c991ed078692e4d95e70aed3a23c
SHA181ef28c118f38960b7568bb422c18ee6be3b1092
SHA256c581187c641e9175d10dc2a95942d3a60c68cfe084728133f524449041ee5a74
SHA5123752d787717349c7896b35a8c417e4a47c3b37b3ecd10381fe74dcf2784c4671520fa748a34aa8f2804152caee5c100d795bec8216310e7417f8e241988ac00f