Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exe
Resource
win10v2004-20241007-en
General
-
Target
1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exe
-
Size
659KB
-
MD5
a0849e77b41c61c577173c4dd4710f04
-
SHA1
607f5f4ad01842f3cfd2977f0baa0276a1cc0cba
-
SHA256
1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510
-
SHA512
3287c52c881518161800413689ff2d13e280a6ac3d6d66480d1d22cbcb33cbf7e09afa308d4aca23d48f43258c12ad42094b4d89d18498a14c19a5a7b41f8c59
-
SSDEEP
12288:mMrZy90iPWKWrdrHmZbX9ohUChGc2501RIguPr6N3u:rybPWKQdjmZE9fU0LItPrKu
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3904-19-0x0000000002390000-0x00000000023AA000-memory.dmp healer behavioral1/memory/3904-21-0x0000000002700000-0x0000000002718000-memory.dmp healer behavioral1/memory/3904-22-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-49-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-47-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-45-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-43-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-41-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-40-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-37-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-35-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-33-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-32-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-29-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-27-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-25-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/3904-23-0x0000000002700000-0x0000000002712000-memory.dmp healer -
Healer family
-
Processes:
pro9136.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9136.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9136.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1604-60-0x0000000002410000-0x0000000002456000-memory.dmp family_redline behavioral1/memory/1604-61-0x0000000004AF0000-0x0000000004B34000-memory.dmp family_redline behavioral1/memory/1604-67-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-83-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-95-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-93-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-91-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-89-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-87-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-81-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-79-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-77-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-76-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-74-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-71-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-70-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-85-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-65-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-63-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1604-62-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un796925.exepro9136.exequ6008.exepid process 4640 un796925.exe 3904 pro9136.exe 1604 qu6008.exe -
Processes:
pro9136.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9136.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9136.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exeun796925.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un796925.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4396 3904 WerFault.exe pro9136.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un796925.exepro9136.exequ6008.exe1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un796925.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9136.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9136.exepid process 3904 pro9136.exe 3904 pro9136.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9136.exequ6008.exedescription pid process Token: SeDebugPrivilege 3904 pro9136.exe Token: SeDebugPrivilege 1604 qu6008.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exeun796925.exedescription pid process target process PID 2244 wrote to memory of 4640 2244 1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exe un796925.exe PID 2244 wrote to memory of 4640 2244 1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exe un796925.exe PID 2244 wrote to memory of 4640 2244 1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exe un796925.exe PID 4640 wrote to memory of 3904 4640 un796925.exe pro9136.exe PID 4640 wrote to memory of 3904 4640 un796925.exe pro9136.exe PID 4640 wrote to memory of 3904 4640 un796925.exe pro9136.exe PID 4640 wrote to memory of 1604 4640 un796925.exe qu6008.exe PID 4640 wrote to memory of 1604 4640 un796925.exe qu6008.exe PID 4640 wrote to memory of 1604 4640 un796925.exe qu6008.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exe"C:\Users\Admin\AppData\Local\Temp\1124ae46f5e19272433b07825b9d515f3bbae219867568afeb29a07547220510.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un796925.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un796925.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9136.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9136.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3904 -s 10964⤵
- Program crash
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6008.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6008.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3904 -ip 39041⤵PID:4364
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD53e6619b2229cce972abeaa4b8a08a852
SHA1a9b4c755c5b7e254888da1fd6d9c0bfc455525bd
SHA25613c1a8511f0fd6a5906459e8c84edb0f4230466b79a344c6619dfe243eb350b7
SHA512c4cc7ec07e05e7997e9b3c6669bdcc471b45f873ef68b08491e4ad3b8bea03dbf207df87fa1ad975355d8f7f17dfd66faa0ede25de5d9b5e607369a045bb289f
-
Filesize
236KB
MD54605dd99b8ba8fca76360c5768092454
SHA13505c0aa7e6dbda4026a449f4954a44b42e3b15b
SHA25673f4a4ff09ec3cc07459873f06d2a6d2bcc9da4805cb6b38677313d9553e680a
SHA512fd0df53440e500bac297b72d449f2d564a27913c1996cdb908d4dbcd5522676e91939d9bdc0309add0e37f335476b15571dc8c174ddf69f8ed69754cde43b1cd
-
Filesize
294KB
MD5ddcc1b5fbf63ee3ba78362086f3062bb
SHA19392e43dfa4f5f52c355cce0e46af76b493a57a7
SHA256910f1b453722ec17bea20f3f8ea3db27a6ab5c41faf4cc61d03617e73e715dbb
SHA5122823c509edbaa82608649e7ccb98c84745327ffcca42927ba4fbb15df5898b69c7da446f48349b77b7d5f3541036d70539ccb5be59009414b83a90c4d2479587