Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 13:01
Static task
static1
Behavioral task
behavioral1
Sample
298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe
Resource
win10v2004-20241007-en
General
-
Target
298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe
-
Size
689KB
-
MD5
7b2da37d630c7e072bcacd89e6d38c63
-
SHA1
618f6972240ed84e788d309bcd9173ee9485f645
-
SHA256
298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a
-
SHA512
2442cceef0810cab9c0c8904789169634ff5124a059a52d4d40c05494c9849f24727b6367427531dbfa805ecd7f137a38767e58a4887476f2bd37f72088f7e73
-
SSDEEP
12288:wMrgy90xH6DYmgiDqjie+y765hLudX0MSKI3VLuVZsK6L+uCv1FprfigQV0go18K:AyTi77mfad0LZ3VLu7sDL7C3pragBOVs
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4924-19-0x0000000002470000-0x000000000248A000-memory.dmp healer behavioral1/memory/4924-21-0x0000000004CA0000-0x0000000004CB8000-memory.dmp healer behavioral1/memory/4924-41-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-49-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-47-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-45-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-43-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-40-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-37-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-35-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-34-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-31-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-29-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-27-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-25-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-23-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer behavioral1/memory/4924-22-0x0000000004CA0000-0x0000000004CB2000-memory.dmp healer -
Healer family
-
Processes:
pro7813.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7813.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7813.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4964-61-0x00000000037E0000-0x0000000003826000-memory.dmp family_redline behavioral1/memory/4964-62-0x0000000003AB0000-0x0000000003AF4000-memory.dmp family_redline behavioral1/memory/4964-64-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-76-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-96-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-94-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-92-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-90-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-88-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-86-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-84-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-80-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-78-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-74-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-72-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-70-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-68-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-66-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-82-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline behavioral1/memory/4964-63-0x0000000003AB0000-0x0000000003AEF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un067402.exepro7813.exequ6853.exepid process 4076 un067402.exe 4924 pro7813.exe 4964 qu6853.exe -
Processes:
pro7813.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7813.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7813.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un067402.exe298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un067402.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3124 4924 WerFault.exe pro7813.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exeun067402.exepro7813.exequ6853.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un067402.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7813.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6853.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7813.exepid process 4924 pro7813.exe 4924 pro7813.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7813.exequ6853.exedescription pid process Token: SeDebugPrivilege 4924 pro7813.exe Token: SeDebugPrivilege 4964 qu6853.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exeun067402.exedescription pid process target process PID 4000 wrote to memory of 4076 4000 298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe un067402.exe PID 4000 wrote to memory of 4076 4000 298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe un067402.exe PID 4000 wrote to memory of 4076 4000 298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe un067402.exe PID 4076 wrote to memory of 4924 4076 un067402.exe pro7813.exe PID 4076 wrote to memory of 4924 4076 un067402.exe pro7813.exe PID 4076 wrote to memory of 4924 4076 un067402.exe pro7813.exe PID 4076 wrote to memory of 4964 4076 un067402.exe qu6853.exe PID 4076 wrote to memory of 4964 4076 un067402.exe qu6853.exe PID 4076 wrote to memory of 4964 4076 un067402.exe qu6853.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe"C:\Users\Admin\AppData\Local\Temp\298d2ca2e1130159934819c5f7d52d4c9e0d95a3700ef26a17596a721ffe189a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067402.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067402.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7813.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7813.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 10804⤵
- Program crash
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6853.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6853.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4924 -ip 49241⤵PID:5040
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5915df67d4a72b0dd614dadf3a5d46507
SHA16d7bb85fbf8d3b41409bb84ae4901b2cd393735a
SHA2563fda9d6d396ac78c21f3434e22309c27e1dcb587bf59f2d5330f54a753d01a5c
SHA512371065f665aa6f1f327157e0dbd05ec89748ea43ad9a15c9ac6051a6377edeef3a86c5580fa02b28810da9620e5f672b1a3634b8289211970093246d9040b7c0
-
Filesize
291KB
MD5f571028467614fa9e2ebe5646b6b06e9
SHA100110f71ce17d96e1cd7b48347798aa91f496545
SHA2562c2efbe725dd7ceaf634cda4d0fee97b0de8ab43ffb4494b72571947409a64c0
SHA512d7419fe9f0db97b5c5ae1242159119c760a8a6dfcbf5719589a81fb11d201827cacd8873d0c6671675f2e8c949776135c90206ebcc17bd87b0035cb8f673af68
-
Filesize
345KB
MD578f4306add6aeb63a8aca3d2ee76440a
SHA1fc11d656f5fd9cedfca4e61055bb707fca94f0ea
SHA256c69075cd66fa5f58ea0d91bd021a88c4b84472450c153c3e0018c543cf4fd874
SHA5125b4107ad73c72c6333b5977b683a6ae8abaf22e7c6c65e418f3e8fd81a64b46b8506263ffc67904fd399390630a373d6f1c92ce47366f9bd91312c225c3011d1