Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe
Resource
win10v2004-20241007-en
General
-
Target
7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe
-
Size
700KB
-
MD5
418b8e3f9d85270634310c58bd9d3511
-
SHA1
d275d89cdfafdb24f5c7e8f89ba955a8091cba6d
-
SHA256
7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8
-
SHA512
1f522dd3a23caacd0a668af3e863848ca2cda9c6c8008ef231a24f1088c90cf027046da17b4fccadec75d0ad0d9f865ea1e1b912fa824d95a112bfc4ca8f1fc3
-
SSDEEP
12288:TMr6y90smrMtFrlwFtI9DoNcAEAkNljlVQYPMSSfzUi34ZZv+eec:9yAQPpqPE3jlaYj+GPGeec
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2776-19-0x00000000027E0000-0x00000000027FA000-memory.dmp healer behavioral1/memory/2776-21-0x0000000002990000-0x00000000029A8000-memory.dmp healer behavioral1/memory/2776-36-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-49-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-47-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-45-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-43-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-41-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-39-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-37-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-33-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-31-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-29-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-27-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-25-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-23-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/2776-22-0x0000000002990000-0x00000000029A2000-memory.dmp healer -
Healer family
-
Processes:
pro6414.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6414.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3148-61-0x0000000004B50000-0x0000000004B96000-memory.dmp family_redline behavioral1/memory/3148-62-0x00000000052C0000-0x0000000005304000-memory.dmp family_redline behavioral1/memory/3148-76-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-74-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-96-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-94-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-92-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-90-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-88-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-86-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-84-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-82-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-80-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-78-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-72-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-70-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-68-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-66-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-64-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline behavioral1/memory/3148-63-0x00000000052C0000-0x00000000052FF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un668813.exepro6414.exequ5748.exepid process 992 un668813.exe 2776 pro6414.exe 3148 qu5748.exe -
Processes:
pro6414.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6414.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6414.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exeun668813.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un668813.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3464 2776 WerFault.exe pro6414.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro6414.exequ5748.exe7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exeun668813.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6414.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5748.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un668813.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6414.exepid process 2776 pro6414.exe 2776 pro6414.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6414.exequ5748.exedescription pid process Token: SeDebugPrivilege 2776 pro6414.exe Token: SeDebugPrivilege 3148 qu5748.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exeun668813.exedescription pid process target process PID 3396 wrote to memory of 992 3396 7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe un668813.exe PID 3396 wrote to memory of 992 3396 7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe un668813.exe PID 3396 wrote to memory of 992 3396 7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe un668813.exe PID 992 wrote to memory of 2776 992 un668813.exe pro6414.exe PID 992 wrote to memory of 2776 992 un668813.exe pro6414.exe PID 992 wrote to memory of 2776 992 un668813.exe pro6414.exe PID 992 wrote to memory of 3148 992 un668813.exe qu5748.exe PID 992 wrote to memory of 3148 992 un668813.exe qu5748.exe PID 992 wrote to memory of 3148 992 un668813.exe qu5748.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe"C:\Users\Admin\AppData\Local\Temp\7ba37a68454e3af21b1d6ff0947f02dffbb63d6d045e710d554ea65f7231f8b8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un668813.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un668813.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6414.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6414.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 10844⤵
- Program crash
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5748.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5748.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2776 -ip 27761⤵PID:3772
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5878246e11fbcd03ddeb376a24b420d43
SHA16d9dd68d62d580bb863cb0426c3ec51abdcc861c
SHA25697e3c4c4611fe0ba8b5a4cf5e62e230463916e5bd49787a2d9cbd52b011d12a0
SHA5121951b6bfa79a1d7a8ac076eaadeb2f4308137f5eb97841bf0bb421fffbe72054606b7c1219a6ed2295924e832edb4bb0dfc69cff87a9c67cba3d1237f5c2485f
-
Filesize
307KB
MD5bbe8b6e023650f086d1e3016a8f4a804
SHA1562740dc81c3b0022ed2b7331773d078652f3075
SHA2567758466edc522af8fb12badceb183c7446272c174821129a6129de9f275e63fb
SHA51233970df8755feae3eb7f36539bb70176da4b0c7c4be5e11d4dc1e40ffa1266b782ea88b0dd9d4b209602464daf79299e03bd900359e15b44f3b9afc48a31c9da
-
Filesize
365KB
MD5b43f5819bbc4936a9b23cbde7b1c47a0
SHA131d6b73d3aff39220413259a309af8571c4e3b47
SHA2560b7291550f1be4011ddead9a54319cc660e580fa6606468b3b0f376c62836019
SHA512bb972dcf4e0fd4ab01d89e3c20d61dd4acdaebb31ade234352c69e5d99efff6a35b6d6b7402d98288699a39abbf9ad90d4f77764318d451b076823d58983bb98