Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 10:00
Static task
static1
Behavioral task
behavioral1
Sample
e4e0ff9d10f33e913fcf37fdccf80c6c14e2eaa3d9c6951e7c47e7f7c1d8d358.exe
Resource
win10v2004-20241007-en
General
-
Target
e4e0ff9d10f33e913fcf37fdccf80c6c14e2eaa3d9c6951e7c47e7f7c1d8d358.exe
-
Size
667KB
-
MD5
722491343c2f3f7b0c26a795cc167abb
-
SHA1
2bdbbc2a3295a20329358e863fb04836c9916d9a
-
SHA256
e4e0ff9d10f33e913fcf37fdccf80c6c14e2eaa3d9c6951e7c47e7f7c1d8d358
-
SHA512
1e5a151f8c1ee73825984d193cf6792f8128596fe936733f6e446cd04fd124d10c99ece3b76c80aa92fa7118e2d39e3d79bd2fa3b1faa58b23e57a6e89803de3
-
SSDEEP
12288:0MrIy90dtJYHvQtfizkL/2qDy0gMztmNZgoTOthNebnVa4LNkT:MywtqPot/2qiMztmTOvNec4G
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3512-19-0x0000000002780000-0x000000000279A000-memory.dmp healer behavioral1/memory/3512-21-0x0000000002960000-0x0000000002978000-memory.dmp healer behavioral1/memory/3512-43-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-49-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-47-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-45-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-39-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-37-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-35-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-33-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-31-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-29-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-27-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-23-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-22-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-41-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/3512-25-0x0000000002960000-0x0000000002972000-memory.dmp healer -
Healer family
-
Processes:
pro9555.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9555.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9555.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1616-61-0x00000000025E0000-0x0000000002626000-memory.dmp family_redline behavioral1/memory/1616-62-0x00000000029C0000-0x0000000002A04000-memory.dmp family_redline behavioral1/memory/1616-72-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-76-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-96-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-94-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-92-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-90-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-86-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-84-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-82-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-80-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-78-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-74-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-70-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-88-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-68-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-66-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-64-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline behavioral1/memory/1616-63-0x00000000029C0000-0x00000000029FF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un963214.exepro9555.exequ7573.exepid process 4840 un963214.exe 3512 pro9555.exe 1616 qu7573.exe -
Processes:
pro9555.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9555.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9555.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e4e0ff9d10f33e913fcf37fdccf80c6c14e2eaa3d9c6951e7c47e7f7c1d8d358.exeun963214.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e4e0ff9d10f33e913fcf37fdccf80c6c14e2eaa3d9c6951e7c47e7f7c1d8d358.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un963214.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4052 3512 WerFault.exe pro9555.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e4e0ff9d10f33e913fcf37fdccf80c6c14e2eaa3d9c6951e7c47e7f7c1d8d358.exeun963214.exepro9555.exequ7573.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4e0ff9d10f33e913fcf37fdccf80c6c14e2eaa3d9c6951e7c47e7f7c1d8d358.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un963214.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9555.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7573.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9555.exepid process 3512 pro9555.exe 3512 pro9555.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9555.exequ7573.exedescription pid process Token: SeDebugPrivilege 3512 pro9555.exe Token: SeDebugPrivilege 1616 qu7573.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
e4e0ff9d10f33e913fcf37fdccf80c6c14e2eaa3d9c6951e7c47e7f7c1d8d358.exeun963214.exedescription pid process target process PID 3908 wrote to memory of 4840 3908 e4e0ff9d10f33e913fcf37fdccf80c6c14e2eaa3d9c6951e7c47e7f7c1d8d358.exe un963214.exe PID 3908 wrote to memory of 4840 3908 e4e0ff9d10f33e913fcf37fdccf80c6c14e2eaa3d9c6951e7c47e7f7c1d8d358.exe un963214.exe PID 3908 wrote to memory of 4840 3908 e4e0ff9d10f33e913fcf37fdccf80c6c14e2eaa3d9c6951e7c47e7f7c1d8d358.exe un963214.exe PID 4840 wrote to memory of 3512 4840 un963214.exe pro9555.exe PID 4840 wrote to memory of 3512 4840 un963214.exe pro9555.exe PID 4840 wrote to memory of 3512 4840 un963214.exe pro9555.exe PID 4840 wrote to memory of 1616 4840 un963214.exe qu7573.exe PID 4840 wrote to memory of 1616 4840 un963214.exe qu7573.exe PID 4840 wrote to memory of 1616 4840 un963214.exe qu7573.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4e0ff9d10f33e913fcf37fdccf80c6c14e2eaa3d9c6951e7c47e7f7c1d8d358.exe"C:\Users\Admin\AppData\Local\Temp\e4e0ff9d10f33e913fcf37fdccf80c6c14e2eaa3d9c6951e7c47e7f7c1d8d358.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963214.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un963214.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9555.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9555.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 11044⤵
- Program crash
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7573.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7573.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3512 -ip 35121⤵PID:3776
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
525KB
MD5f682ae0dafcd015a044f846b763b6860
SHA1d450e6f4d85f52543660badc537fc0795b13bba9
SHA256442e329318f021386c1cd945eba2eb17e6b5649532cf50fe55d82cc56dd0a9ea
SHA512c8e41c47dacbd3a214789c55e90723624b8b428c04d9db3cf2e0bd20f1abbb39f4116ca2e4f98abfc9fa7294b891f2511285c83a44e27ba3377a269e2b8d20dd
-
Filesize
294KB
MD500a24b4b8cab0eeb002817ba6fb23df6
SHA10c29263db2bd6cec9aa6b12626a6996af2231675
SHA256b87f55902cf321e7388c8174970f366ba50b29638a0c6f44f5e47b16eb045ddb
SHA512e146364a29c00fa74eb9d78e2036ee637858ed9359086d0829e103d2171778bb85df2603358e1cacb82efdee55212ac0635fc9728e37587df9b8aa147f7c53e9
-
Filesize
353KB
MD5cf02e41d858bfb0b9e247dce72cc5f22
SHA1e293aaf9ec7ff6ec6a9c9e62cfd73a7f645f29a1
SHA25684250ce2194a1cb64b733ec913097f9f8ebd4495cfdae4d5bc9e69cfffc4f6ab
SHA51275f49277b1b23bc6c54652cf223bab97a0af62132edd293ad3963985ea2875f9c5b31ba62726963a83a20f2c4fcb62e77010ace17856f4a6a20811c22f72a9b4