Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 15:19
Static task
static1
Behavioral task
behavioral1
Sample
4ab95c023ee3c92e0b748262892084d61bb52aa63c2269a3a173eedd4dcfac82.exe
Resource
win10v2004-20241007-en
General
-
Target
4ab95c023ee3c92e0b748262892084d61bb52aa63c2269a3a173eedd4dcfac82.exe
-
Size
667KB
-
MD5
543636f4f9f95ce2eab472f98161021e
-
SHA1
b80a3d4d878d82dcae1030d42f93c38c06698542
-
SHA256
4ab95c023ee3c92e0b748262892084d61bb52aa63c2269a3a173eedd4dcfac82
-
SHA512
067e6770106fbe248613a93d7ac161b9e29357b784ceda9e75bc01336fa30a9ce09e0013de80bbb5f395f23ae42beea150dfc3cd0aa8235ebac73c5ebee46d58
-
SSDEEP
12288:YMrTy90eBDu00pTsLhu1dm7mK2ZziYM1RzrUbJH/w3nfCKS:7ydEpTsMdfK2ITXzrEfwqKS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1468-19-0x00000000029A0000-0x00000000029BA000-memory.dmp healer behavioral1/memory/1468-21-0x0000000002A00000-0x0000000002A18000-memory.dmp healer behavioral1/memory/1468-39-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-49-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-48-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-45-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-43-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-41-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-37-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-35-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-33-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-31-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-29-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-27-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-25-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-23-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/1468-22-0x0000000002A00000-0x0000000002A12000-memory.dmp healer -
Healer family
-
Processes:
pro2453.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2453.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3924-60-0x00000000028A0000-0x00000000028E6000-memory.dmp family_redline behavioral1/memory/3924-61-0x00000000053B0000-0x00000000053F4000-memory.dmp family_redline behavioral1/memory/3924-95-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-93-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-91-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-89-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-87-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-85-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-83-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-81-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-79-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-77-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-75-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-73-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-71-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-69-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-67-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-65-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-63-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/3924-62-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un309175.exepro2453.exequ3664.exepid process 3660 un309175.exe 1468 pro2453.exe 3924 qu3664.exe -
Processes:
pro2453.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2453.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2453.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4ab95c023ee3c92e0b748262892084d61bb52aa63c2269a3a173eedd4dcfac82.exeun309175.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4ab95c023ee3c92e0b748262892084d61bb52aa63c2269a3a173eedd4dcfac82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un309175.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1040 1468 WerFault.exe pro2453.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4ab95c023ee3c92e0b748262892084d61bb52aa63c2269a3a173eedd4dcfac82.exeun309175.exepro2453.exequ3664.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ab95c023ee3c92e0b748262892084d61bb52aa63c2269a3a173eedd4dcfac82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un309175.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2453.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3664.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro2453.exepid process 1468 pro2453.exe 1468 pro2453.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro2453.exequ3664.exedescription pid process Token: SeDebugPrivilege 1468 pro2453.exe Token: SeDebugPrivilege 3924 qu3664.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4ab95c023ee3c92e0b748262892084d61bb52aa63c2269a3a173eedd4dcfac82.exeun309175.exedescription pid process target process PID 3556 wrote to memory of 3660 3556 4ab95c023ee3c92e0b748262892084d61bb52aa63c2269a3a173eedd4dcfac82.exe un309175.exe PID 3556 wrote to memory of 3660 3556 4ab95c023ee3c92e0b748262892084d61bb52aa63c2269a3a173eedd4dcfac82.exe un309175.exe PID 3556 wrote to memory of 3660 3556 4ab95c023ee3c92e0b748262892084d61bb52aa63c2269a3a173eedd4dcfac82.exe un309175.exe PID 3660 wrote to memory of 1468 3660 un309175.exe pro2453.exe PID 3660 wrote to memory of 1468 3660 un309175.exe pro2453.exe PID 3660 wrote to memory of 1468 3660 un309175.exe pro2453.exe PID 3660 wrote to memory of 3924 3660 un309175.exe qu3664.exe PID 3660 wrote to memory of 3924 3660 un309175.exe qu3664.exe PID 3660 wrote to memory of 3924 3660 un309175.exe qu3664.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ab95c023ee3c92e0b748262892084d61bb52aa63c2269a3a173eedd4dcfac82.exe"C:\Users\Admin\AppData\Local\Temp\4ab95c023ee3c92e0b748262892084d61bb52aa63c2269a3a173eedd4dcfac82.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un309175.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un309175.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2453.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2453.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 10844⤵
- Program crash
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3664.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3664.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1468 -ip 14681⤵PID:4676
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
525KB
MD50b9183302ae69ff7cffd91fdd6c91138
SHA1a47006217119779ff0ae820f86cb22b39ecb6494
SHA256d7b30af5d709bbe8792afa86d61b0f9da14b576553972223fb2d919824f76f6d
SHA51266c26b0c064ed6bc307154bf54aef943e7c7c298fc562198333d4c3265e970ec44b048532105b0af99cef8cf850d82738ac6f27eee983229da9f9d95e53b60ca
-
Filesize
294KB
MD5d23a50dcbf317160a03dfd03650a92a1
SHA1ce1e7e8458642ec0980a4df6bd4a7d82caf5e30c
SHA256b800c8ff547760bb6fa4d49e5510924fea3590d47bce48e547149ee003963014
SHA5126424dd5a3148bce7482c614bc08d2c0e91abba637b0a8e907be6d9fdc56e4d9fbfb48d15cbcd816cbeb5f91e323631c84aa93836ff3a640a62309df113320a2d
-
Filesize
352KB
MD551ddd928c3c0e47ba400612a0b52f2a8
SHA127d38ec98b7db8296420d4d13ee2f0ddff5f1f05
SHA256296c3434c0ba4df594957f3493c21fe9e429521966f9f14d9c2c6cf5273f4827
SHA512751a330f103836cae3c7eeacad7de5526d21111deef20db7e5fcc5b6041c1b48116e0ebd882eefd9acf8dc48b9bdd57ff867ad4c777ae49a48704cc924488d82