Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:59
Static task
static1
Behavioral task
behavioral1
Sample
a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365.exe
Resource
win10v2004-20241007-en
General
-
Target
a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365.exe
-
Size
668KB
-
MD5
387e1296304f1abd8525970aa8d402c1
-
SHA1
28b60283a3cb47757304dffaf607837c7839a7a8
-
SHA256
a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365
-
SHA512
b3a2db0ce13cc27036a2b8cd578020ec29eca72846a547682d23375f158ef822c9519e195bc0f276412c317632c6549a86b1bd08d855175da9ed555086f447f7
-
SSDEEP
12288:KMr9y90rD8JBvvZoZ+hDRx8oIS+47Y2XTOp3DYHy9PKxylyohM/0ONq0ov:7ypTWZ+9A4+SYfp38uixylpMsO3ov
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/816-19-0x00000000027A0000-0x00000000027BA000-memory.dmp healer behavioral1/memory/816-21-0x0000000002AA0000-0x0000000002AB8000-memory.dmp healer behavioral1/memory/816-23-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-49-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-47-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-46-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-43-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-41-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-39-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-37-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-35-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-33-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-31-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-29-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-27-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-25-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer behavioral1/memory/816-22-0x0000000002AA0000-0x0000000002AB2000-memory.dmp healer -
Healer family
-
Processes:
pro6065.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6065.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6065.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3016-61-0x0000000002770000-0x00000000027B6000-memory.dmp family_redline behavioral1/memory/3016-62-0x0000000004DF0000-0x0000000004E34000-memory.dmp family_redline behavioral1/memory/3016-64-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-63-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-90-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-94-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-92-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-88-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-86-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-85-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-82-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-80-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-78-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-76-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-74-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-72-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-70-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-68-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-66-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/3016-96-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un890611.exepro6065.exequ2935.exepid process 2876 un890611.exe 816 pro6065.exe 3016 qu2935.exe -
Processes:
pro6065.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6065.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365.exeun890611.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un890611.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3900 816 WerFault.exe pro6065.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365.exeun890611.exepro6065.exequ2935.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un890611.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6065.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2935.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6065.exepid process 816 pro6065.exe 816 pro6065.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6065.exequ2935.exedescription pid process Token: SeDebugPrivilege 816 pro6065.exe Token: SeDebugPrivilege 3016 qu2935.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365.exeun890611.exedescription pid process target process PID 3972 wrote to memory of 2876 3972 a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365.exe un890611.exe PID 3972 wrote to memory of 2876 3972 a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365.exe un890611.exe PID 3972 wrote to memory of 2876 3972 a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365.exe un890611.exe PID 2876 wrote to memory of 816 2876 un890611.exe pro6065.exe PID 2876 wrote to memory of 816 2876 un890611.exe pro6065.exe PID 2876 wrote to memory of 816 2876 un890611.exe pro6065.exe PID 2876 wrote to memory of 3016 2876 un890611.exe qu2935.exe PID 2876 wrote to memory of 3016 2876 un890611.exe qu2935.exe PID 2876 wrote to memory of 3016 2876 un890611.exe qu2935.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365.exe"C:\Users\Admin\AppData\Local\Temp\a1f467b7815531bc7762620035421b768c01c0e724604e1043212b2202c79365.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un890611.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un890611.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6065.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6065.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 10804⤵
- Program crash
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2935.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2935.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 816 -ip 8161⤵PID:1632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
525KB
MD5f74307f72a3c01619f8ced485ffd6286
SHA10cb3eab278bb619ec0d6bd527f906250f8d60e30
SHA2568a45979b6c07c1ca96a47179b92a3b11d2d2b9c3e86c8f01596f2f78bb813279
SHA5129749452cbc42ccba2c598adc57ca3e405d0b7a224debf15563a3cb97403d8c6be921ae94b8ad534ed5a0dcb9a45e6f128419c00fefaad0fe5c2af1bc3ab25e6d
-
Filesize
295KB
MD5c1862da3dcab652a4c1fcb5556360948
SHA17ba9319a9fe48f69e77cb29c21ae70eccec452f3
SHA25611d14aeba0b1768ed001c82a05488b94c30f93f56116985750c8fc5746ce9c8f
SHA5124a1a4633295f9bf7b18c08c81dc93d218757dfaee7dbeed4c782886446dc9771e7507e8093125e9c8fc68f0758ba85392dcd5eb255b34ac60590fe1a6f632c34
-
Filesize
353KB
MD58ea63fe8f45bfb388cb7272d54447f5e
SHA1df84299ed232a4e1ca3b51536aa02d8f0a5f99fd
SHA256198851498136dbf40fa6dc67e720c73fa7e824ef89ebae29550b2e418e1099ba
SHA5121749e22cfc2ebc28ef79409dc77735965b3e7b6f268ab569bb40a64d33fea704891af098ffc192f947aa417d6148dc40fb7e4e545f7e6536ab981874fddccf6a