Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 12:19
Static task
static1
Behavioral task
behavioral1
Sample
4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exe
Resource
win10v2004-20241007-en
General
-
Target
4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exe
-
Size
689KB
-
MD5
54c249b90808ac4b4f4ece502024cea7
-
SHA1
16cf05ae44cf770352157247e0d6334683886116
-
SHA256
4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6
-
SHA512
356ab3060a975e5ac4c717dc5a77ecdbb7ab912e18bd004e72dae80278efe380b610145c5458a1f72de6ec50a568dfe870d888eb4c33bce30f5561e2d2cdd660
-
SSDEEP
12288:UMruy90esd9R3dyWWcks+1iBaavpN1X8Yju5mUJXgkMHOVZeJo:ayFsd9p5s3Bavp5u4+gkMHBJo
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4376-19-0x0000000002880000-0x000000000289A000-memory.dmp healer behavioral1/memory/4376-21-0x0000000004EE0000-0x0000000004EF8000-memory.dmp healer behavioral1/memory/4376-41-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-49-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-47-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-45-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-43-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-37-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-35-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-33-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-31-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-29-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-27-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-25-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-23-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-22-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4376-39-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer -
Healer family
-
Processes:
pro3827.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3827.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3827.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3827.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3827.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3827.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3827.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4540-60-0x0000000002870000-0x00000000028B6000-memory.dmp family_redline behavioral1/memory/4540-61-0x0000000004E30000-0x0000000004E74000-memory.dmp family_redline behavioral1/memory/4540-65-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-75-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-96-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-93-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-91-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-89-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-87-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-85-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-83-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-81-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-77-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-74-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-71-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-69-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-67-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-79-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-63-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4540-62-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un385418.exepro3827.exequ6186.exepid process 2532 un385418.exe 4376 pro3827.exe 4540 qu6186.exe -
Processes:
pro3827.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3827.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3827.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un385418.exe4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un385418.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1392 4376 WerFault.exe pro3827.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un385418.exepro3827.exequ6186.exe4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un385418.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3827.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6186.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro3827.exepid process 4376 pro3827.exe 4376 pro3827.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro3827.exequ6186.exedescription pid process Token: SeDebugPrivilege 4376 pro3827.exe Token: SeDebugPrivilege 4540 qu6186.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exeun385418.exedescription pid process target process PID 3124 wrote to memory of 2532 3124 4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exe un385418.exe PID 3124 wrote to memory of 2532 3124 4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exe un385418.exe PID 3124 wrote to memory of 2532 3124 4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exe un385418.exe PID 2532 wrote to memory of 4376 2532 un385418.exe pro3827.exe PID 2532 wrote to memory of 4376 2532 un385418.exe pro3827.exe PID 2532 wrote to memory of 4376 2532 un385418.exe pro3827.exe PID 2532 wrote to memory of 4540 2532 un385418.exe qu6186.exe PID 2532 wrote to memory of 4540 2532 un385418.exe qu6186.exe PID 2532 wrote to memory of 4540 2532 un385418.exe qu6186.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exe"C:\Users\Admin\AppData\Local\Temp\4799ce6d33b4310282f7616d4c3a3a3d6421e05df7cb0366458aabba3a9e87c6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385418.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385418.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3827.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3827.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 10804⤵
- Program crash
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6186.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6186.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4376 -ip 43761⤵PID:4184
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
535KB
MD59f40449edac5ad418f9ab73d4d363cc7
SHA19e7898358893d9023dab93257d33c5befcdc4c63
SHA25616f0d7a7e5e7d05d18d56b7a3b26200dfd329f5be57b86fb9ec6d95e73a46a94
SHA5124dc7e5d325fcedd21cd805ec9c2e9a3233cb5021a7cb916b5fe2e392d83bb789fd04526888b210db877ddf6736a5436053740e956a015bdc5099bf56741bae81
-
Filesize
311KB
MD56e89c69c505e5c22008985f9d8fefd36
SHA19936c068d616f247ccb06cdfc77f261a83c3ded5
SHA25664a71b03a9fd5a5c432d733a7d031eb80463e7d0a7600443935ee414ff773902
SHA51293a982cdb4dc3f0ac186b10987a7a7bf8a14d9c07d5420ef487fff086d378dca15e6705f6236494f3bfad109d762ee55772a4964c3c0f8083f6ac72ea6e222b9
-
Filesize
370KB
MD5c1e926a9f985ca44574497405244d1d9
SHA13e555fc82c3d411b8759a976ef382723ddf5c3d9
SHA25640e10c7e0c0fd70fe752ddf8f1d1c9bc80e572dae446b833dfd285ea1c22fad4
SHA512df2009d14fbba34c2626a83a00f4ffc5da4a6bb38a788e70efd206baa78e6d1af977b4b64f93d08b5784363cf4b8ff5b35d04174746f84db9c376f64af707217