Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:30
Static task
static1
Behavioral task
behavioral1
Sample
eef16b5671a33e0e510a44897e2bb5557fef6717f5789b981b7a820c97053270.exe
Resource
win10v2004-20241007-en
General
-
Target
eef16b5671a33e0e510a44897e2bb5557fef6717f5789b981b7a820c97053270.exe
-
Size
659KB
-
MD5
b84c6570ca368ab921c38930086eed44
-
SHA1
e8e97c6d99f527838ab73291d806d7ab5c155c0e
-
SHA256
eef16b5671a33e0e510a44897e2bb5557fef6717f5789b981b7a820c97053270
-
SHA512
2612e226ac0f98d31aecb671afbf367d937290c6bd39459c3a7db47e57ab07c91c972c93119fdabebbf588ff46c49939e8942aae245ec8167e8ef674eec5f9a8
-
SSDEEP
12288:OMrey90gDy45aNuncSgjz6GW86odPxKyqjna6:8yT4MncSJNoJgf
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3752-19-0x0000000002540000-0x000000000255A000-memory.dmp healer behavioral1/memory/3752-21-0x0000000004DB0000-0x0000000004DC8000-memory.dmp healer behavioral1/memory/3752-23-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-49-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-47-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-45-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-43-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-41-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-39-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-36-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-37-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-33-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-32-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-30-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-27-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-25-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3752-22-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer -
Healer family
-
Processes:
pro6319.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6319.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6319.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3644-61-0x0000000002600000-0x0000000002646000-memory.dmp family_redline behavioral1/memory/3644-62-0x0000000004E80000-0x0000000004EC4000-memory.dmp family_redline behavioral1/memory/3644-86-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-84-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-82-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-80-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-78-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-76-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-74-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-72-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-70-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-68-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-66-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-96-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-64-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-63-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-88-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-90-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-94-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/3644-92-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un829424.exepro6319.exequ9189.exepid process 1576 un829424.exe 3752 pro6319.exe 3644 qu9189.exe -
Processes:
pro6319.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6319.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
eef16b5671a33e0e510a44897e2bb5557fef6717f5789b981b7a820c97053270.exeun829424.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eef16b5671a33e0e510a44897e2bb5557fef6717f5789b981b7a820c97053270.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un829424.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5056 3752 WerFault.exe pro6319.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro6319.exequ9189.exeeef16b5671a33e0e510a44897e2bb5557fef6717f5789b981b7a820c97053270.exeun829424.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6319.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9189.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eef16b5671a33e0e510a44897e2bb5557fef6717f5789b981b7a820c97053270.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un829424.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6319.exepid process 3752 pro6319.exe 3752 pro6319.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6319.exequ9189.exedescription pid process Token: SeDebugPrivilege 3752 pro6319.exe Token: SeDebugPrivilege 3644 qu9189.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
eef16b5671a33e0e510a44897e2bb5557fef6717f5789b981b7a820c97053270.exeun829424.exedescription pid process target process PID 3520 wrote to memory of 1576 3520 eef16b5671a33e0e510a44897e2bb5557fef6717f5789b981b7a820c97053270.exe un829424.exe PID 3520 wrote to memory of 1576 3520 eef16b5671a33e0e510a44897e2bb5557fef6717f5789b981b7a820c97053270.exe un829424.exe PID 3520 wrote to memory of 1576 3520 eef16b5671a33e0e510a44897e2bb5557fef6717f5789b981b7a820c97053270.exe un829424.exe PID 1576 wrote to memory of 3752 1576 un829424.exe pro6319.exe PID 1576 wrote to memory of 3752 1576 un829424.exe pro6319.exe PID 1576 wrote to memory of 3752 1576 un829424.exe pro6319.exe PID 1576 wrote to memory of 3644 1576 un829424.exe qu9189.exe PID 1576 wrote to memory of 3644 1576 un829424.exe qu9189.exe PID 1576 wrote to memory of 3644 1576 un829424.exe qu9189.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eef16b5671a33e0e510a44897e2bb5557fef6717f5789b981b7a820c97053270.exe"C:\Users\Admin\AppData\Local\Temp\eef16b5671a33e0e510a44897e2bb5557fef6717f5789b981b7a820c97053270.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un829424.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un829424.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6319.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6319.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 10804⤵
- Program crash
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9189.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9189.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3752 -ip 37521⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD577db2021aed7c235b12ecea7b96259dd
SHA1d1f574cabd1428138a79a03236424459c99a0cb1
SHA256c001acbaa63e40b10efd25e931a6ae16a96b0172cfc56b051533e22e7a5ebc57
SHA51212c541dcaa0c7dbcf668afc3a2495553f2ba47e599aab05e08bcef5a037815c16ad3145c333bb54a9a10a6e78fc1392eb36cef246ca8e1ca1fbd3e3f7f2a9380
-
Filesize
376KB
MD5e0162a725e85d702a6b35794e44fdecc
SHA1d509a4c3ffe628b0860aff9888f12fbe36df8aae
SHA2569305bababd659e90f42f204a88abf97128df765a1813d17c58c487000884789c
SHA512705ec489f167e986bbed703315cd902552facdd21b14b196b79e54cdef1c945be26cb29d294c72fadf1433d026cc1d1a7aa2d5abec4ef84247bfcb51b308bef0
-
Filesize
434KB
MD51ce6900dd49ca04faf24349ca0f2a01e
SHA173cce70cb50fbefd11b6b588a4f0c8dc308d80cd
SHA256773527d13bfa4d284a1b46aac26da48cc3b80021f8b080b14acecdbee0e7ea26
SHA512bd2f03097f5fd6f50e942baef00ddb67fcb1ca6c8ab9684818dfde6f19b62ff90461e7e3e0deeca904179aa1fe0d54c58b44cc9e4332ad36460366d121b4a0ad