Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 13:31
Static task
static1
Behavioral task
behavioral1
Sample
b029809ecd09329da7042f939d7acc20cfa777ad88f6ad2a9e666690544f00f0.exe
Resource
win10v2004-20241007-en
General
-
Target
b029809ecd09329da7042f939d7acc20cfa777ad88f6ad2a9e666690544f00f0.exe
-
Size
666KB
-
MD5
43997bf5d432c2a7f3295974f30d248d
-
SHA1
863cdce02c8b80b293535a8cc3f6ede182a6bd4e
-
SHA256
b029809ecd09329da7042f939d7acc20cfa777ad88f6ad2a9e666690544f00f0
-
SHA512
15a86d7c9300b971e845d2bcedd8945c4883383eea6b2e1c00ebb438a9fe958902638bacd48d97e22cb1ae604edff3ca8fa90cd8c8ebabeffe76b8665cf7f1eb
-
SSDEEP
12288:QMrmy90q0eRoQJJ3wM54KWk2Q02KbuGcT2zbay5tla4tfNcbqbkRF5d5pKo:my30enzAMqd4n2zbH5tI4BNcuAl5pKo
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1672-19-0x0000000002590000-0x00000000025AA000-memory.dmp healer behavioral1/memory/1672-21-0x0000000002890000-0x00000000028A8000-memory.dmp healer behavioral1/memory/1672-33-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-49-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-48-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-45-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-43-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-41-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-39-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-37-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-35-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-31-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-29-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-27-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-25-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-22-0x0000000002890000-0x00000000028A2000-memory.dmp healer behavioral1/memory/1672-23-0x0000000002890000-0x00000000028A2000-memory.dmp healer -
Healer family
-
Processes:
pro6889.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6889.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1608-61-0x00000000025C0000-0x0000000002606000-memory.dmp family_redline behavioral1/memory/1608-62-0x0000000002920000-0x0000000002964000-memory.dmp family_redline behavioral1/memory/1608-72-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-80-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-97-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-94-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-92-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-90-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-86-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-84-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-82-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-78-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-76-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-74-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-70-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-68-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-88-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-66-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-64-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/1608-63-0x0000000002920000-0x000000000295F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un599527.exepro6889.exequ8011.exepid process 4996 un599527.exe 1672 pro6889.exe 1608 qu8011.exe -
Processes:
pro6889.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6889.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un599527.exeb029809ecd09329da7042f939d7acc20cfa777ad88f6ad2a9e666690544f00f0.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un599527.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b029809ecd09329da7042f939d7acc20cfa777ad88f6ad2a9e666690544f00f0.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2168 1672 WerFault.exe pro6889.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b029809ecd09329da7042f939d7acc20cfa777ad88f6ad2a9e666690544f00f0.exeun599527.exepro6889.exequ8011.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b029809ecd09329da7042f939d7acc20cfa777ad88f6ad2a9e666690544f00f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un599527.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6889.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8011.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6889.exepid process 1672 pro6889.exe 1672 pro6889.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6889.exequ8011.exedescription pid process Token: SeDebugPrivilege 1672 pro6889.exe Token: SeDebugPrivilege 1608 qu8011.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b029809ecd09329da7042f939d7acc20cfa777ad88f6ad2a9e666690544f00f0.exeun599527.exedescription pid process target process PID 3568 wrote to memory of 4996 3568 b029809ecd09329da7042f939d7acc20cfa777ad88f6ad2a9e666690544f00f0.exe un599527.exe PID 3568 wrote to memory of 4996 3568 b029809ecd09329da7042f939d7acc20cfa777ad88f6ad2a9e666690544f00f0.exe un599527.exe PID 3568 wrote to memory of 4996 3568 b029809ecd09329da7042f939d7acc20cfa777ad88f6ad2a9e666690544f00f0.exe un599527.exe PID 4996 wrote to memory of 1672 4996 un599527.exe pro6889.exe PID 4996 wrote to memory of 1672 4996 un599527.exe pro6889.exe PID 4996 wrote to memory of 1672 4996 un599527.exe pro6889.exe PID 4996 wrote to memory of 1608 4996 un599527.exe qu8011.exe PID 4996 wrote to memory of 1608 4996 un599527.exe qu8011.exe PID 4996 wrote to memory of 1608 4996 un599527.exe qu8011.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b029809ecd09329da7042f939d7acc20cfa777ad88f6ad2a9e666690544f00f0.exe"C:\Users\Admin\AppData\Local\Temp\b029809ecd09329da7042f939d7acc20cfa777ad88f6ad2a9e666690544f00f0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un599527.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un599527.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6889.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6889.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 10884⤵
- Program crash
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8011.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8011.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1672 -ip 16721⤵PID:4940
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD547bd1b1bf2be2be0105135cbc4be03c9
SHA13416ebdac67329d72c3860bca64dd070cd6979ee
SHA256490469a14ae97202ba7fdcbc2ad2c7608bd8ff7098b9939d19ab566d70b7c249
SHA5124fbe8722e851caf5b6362bb60bba2b9868961c52a1db51dbd492f384b75c2ce6d82e5cae4c8328bd5dfe5889bfdcf7af7abdc11d45720d780eff172985354fa1
-
Filesize
294KB
MD54de85e40a7938364e743ddea294de8bf
SHA1799d8ab19e345ca5201898b5ec1e15cec22d5c64
SHA256b1d19d2f03e697f2d0ef55dcf05d156267b3bee4d194c934c89c9c211991de10
SHA512ca760a78e440a9cba8c714d176883c48d7b80135ccdbe26065f5ea2f71dfc3e56bf5c4fc8b2e94170ecb9cf5b745c8182d07912dfcdffa0c23645572436c9e24
-
Filesize
353KB
MD53e94fb69525e55e8425316ff74be6e85
SHA176bf82e8cab708f63c45eeca989db7d08959b1a4
SHA256fe89fe2f9388d84e0bc034a78a46331ac7735dc97ba0ec603747ab0cdccc4ce9
SHA512a90cdad50f71559bcf11dc07c91392b0eeff5ceb928c2a40c8ffe2b8ddf6cfdebf7a8883d6db0182935ad86434afab100085adbb6e5822601688ff163ecf304a