Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
08b4ade0c15b637efe2352819fd69a58718e38b912934a00941290f60077b7d8.exe
Resource
win10v2004-20241007-en
General
-
Target
08b4ade0c15b637efe2352819fd69a58718e38b912934a00941290f60077b7d8.exe
-
Size
1012KB
-
MD5
4e8e01e44d3c29a12d918ade243d9d6d
-
SHA1
8f800ce828c451e2a00add633792cf2dbcfc9afd
-
SHA256
08b4ade0c15b637efe2352819fd69a58718e38b912934a00941290f60077b7d8
-
SHA512
3bf5eed09ada18bbfa29e54c0f2b2903e4569052a811d989fc03a90a3b7757e476d84ecd7999397c505ea8cdccb49b9e0c1e814c10044046796505afdb983ec4
-
SSDEEP
12288:lMrWy90FyeG5n4HtLieXfUPw8z7ExrWfvai/QmrV4FND4CyGmRlouZSrK2ExaH2/:Xyl54yPFzpH1YmrVynqM0/qWI73U
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2325.exe healer behavioral1/memory/228-28-0x0000000000F00000-0x0000000000F0A000-memory.dmp healer behavioral1/memory/1156-34-0x00000000021C0000-0x00000000021DA000-memory.dmp healer behavioral1/memory/1156-36-0x0000000002200000-0x0000000002218000-memory.dmp healer behavioral1/memory/1156-64-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-60-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-58-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-56-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-54-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-52-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-50-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-48-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-46-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-44-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-42-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-40-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-38-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-37-0x0000000002200000-0x0000000002212000-memory.dmp healer behavioral1/memory/1156-62-0x0000000002200000-0x0000000002212000-memory.dmp healer -
Healer family
-
Processes:
tz2325.exev2582Di.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz2325.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v2582Di.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v2582Di.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz2325.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v2582Di.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v2582Di.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v2582Di.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v2582Di.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1696-72-0x0000000002580000-0x00000000025C6000-memory.dmp family_redline behavioral1/memory/1696-73-0x0000000005090000-0x00000000050D4000-memory.dmp family_redline behavioral1/memory/1696-77-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-87-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-107-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-105-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-103-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-101-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-99-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-95-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-93-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-91-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-89-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-85-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-83-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-81-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-79-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-97-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-75-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/1696-74-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
Processes:
zap4447.exezap2858.exezap3328.exetz2325.exev2582Di.exew94FF42.exepid process 4488 zap4447.exe 3856 zap2858.exe 3800 zap3328.exe 228 tz2325.exe 1156 v2582Di.exe 1696 w94FF42.exe -
Processes:
tz2325.exev2582Di.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz2325.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v2582Di.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v2582Di.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
08b4ade0c15b637efe2352819fd69a58718e38b912934a00941290f60077b7d8.exezap4447.exezap2858.exezap3328.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08b4ade0c15b637efe2352819fd69a58718e38b912934a00941290f60077b7d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap4447.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap2858.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap3328.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2804 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4584 1156 WerFault.exe v2582Di.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
08b4ade0c15b637efe2352819fd69a58718e38b912934a00941290f60077b7d8.exezap4447.exezap2858.exezap3328.exev2582Di.exew94FF42.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08b4ade0c15b637efe2352819fd69a58718e38b912934a00941290f60077b7d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap4447.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap2858.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap3328.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2582Di.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w94FF42.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
tz2325.exev2582Di.exepid process 228 tz2325.exe 228 tz2325.exe 1156 v2582Di.exe 1156 v2582Di.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tz2325.exev2582Di.exew94FF42.exedescription pid process Token: SeDebugPrivilege 228 tz2325.exe Token: SeDebugPrivilege 1156 v2582Di.exe Token: SeDebugPrivilege 1696 w94FF42.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
08b4ade0c15b637efe2352819fd69a58718e38b912934a00941290f60077b7d8.exezap4447.exezap2858.exezap3328.exedescription pid process target process PID 1868 wrote to memory of 4488 1868 08b4ade0c15b637efe2352819fd69a58718e38b912934a00941290f60077b7d8.exe zap4447.exe PID 1868 wrote to memory of 4488 1868 08b4ade0c15b637efe2352819fd69a58718e38b912934a00941290f60077b7d8.exe zap4447.exe PID 1868 wrote to memory of 4488 1868 08b4ade0c15b637efe2352819fd69a58718e38b912934a00941290f60077b7d8.exe zap4447.exe PID 4488 wrote to memory of 3856 4488 zap4447.exe zap2858.exe PID 4488 wrote to memory of 3856 4488 zap4447.exe zap2858.exe PID 4488 wrote to memory of 3856 4488 zap4447.exe zap2858.exe PID 3856 wrote to memory of 3800 3856 zap2858.exe zap3328.exe PID 3856 wrote to memory of 3800 3856 zap2858.exe zap3328.exe PID 3856 wrote to memory of 3800 3856 zap2858.exe zap3328.exe PID 3800 wrote to memory of 228 3800 zap3328.exe tz2325.exe PID 3800 wrote to memory of 228 3800 zap3328.exe tz2325.exe PID 3800 wrote to memory of 1156 3800 zap3328.exe v2582Di.exe PID 3800 wrote to memory of 1156 3800 zap3328.exe v2582Di.exe PID 3800 wrote to memory of 1156 3800 zap3328.exe v2582Di.exe PID 3856 wrote to memory of 1696 3856 zap2858.exe w94FF42.exe PID 3856 wrote to memory of 1696 3856 zap2858.exe w94FF42.exe PID 3856 wrote to memory of 1696 3856 zap2858.exe w94FF42.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08b4ade0c15b637efe2352819fd69a58718e38b912934a00941290f60077b7d8.exe"C:\Users\Admin\AppData\Local\Temp\08b4ade0c15b637efe2352819fd69a58718e38b912934a00941290f60077b7d8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4447.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4447.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2858.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap2858.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3328.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap3328.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2325.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz2325.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2582Di.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v2582Di.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 10806⤵
- Program crash
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w94FF42.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w94FF42.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1156 -ip 11561⤵PID:3264
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2804
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD5d7e741d5828a1ac01bbaf660c7950109
SHA142b4ab8ca9084a602cf1200c4bb6e6ad91d5d466
SHA2563e66cfbf7f732d1be0a47d94df4f0623c77b05f8b2b489ca5d206b2a99ce93b0
SHA51208bb62122a61ae1cab6833fb93b97a61ba79c3cf415633b9a71a38aeb77fe4ff4058d5fd9352f93e904c70e22f9b046d57de081714cd9b8ae8b327bd34940014
-
Filesize
685KB
MD5cb62d2fcf8882fbc2120b553c2744623
SHA190f535f90e94ef283ad215f0b836127b59aeaa05
SHA25661dda1aa56dacfa760c93d62eeadb358d8c18ae95f22542cb8652eaaa6d8e1b0
SHA5121bb4f2eb03868f19d1ff8ed7e4ed85d5fb7421d549a4c18cd0aa6ccfeb487d132000a1daad3f107f98ad9604486647fb9c3c18a0ac99527f5391035d15306617
-
Filesize
345KB
MD5af7478da17822c77c998efd915fadf70
SHA103c685fcb0740e71be477e3407aca2ebdc2d0e02
SHA25636aab255690f460f3a7adb4ad7c994963616093ab415e561dc7c04ae7d09afc5
SHA51277afbd94c7fd26b5898739b57fad4d8cfce9b5cf1d2f612a471efd144c2db4ab6490f234f8f5bcd2d0600b45683403d157288f5fbe0690aba36761dc0aba0e06
-
Filesize
333KB
MD5d195a40deed853c35150b136bb38684e
SHA19ef5b89f3023b448c931c27249ef607c4aaf544d
SHA25657069ef796432dc95452e02461c27d1ede4e7ae9d19ad9582515ee97bbda79c7
SHA5122f6d5eb94c1661c030240c86e44db94a657a104d7e03ba8f3dc3a6b346810881567123fba492d46e5b16da4cc58ac659fde9f7addbfc0606b7d43b65119626a9
-
Filesize
12KB
MD568a791cfcf6f87ec61ab9d5d49f64666
SHA13580704201c7e59ded2b4bd040c93ec83bb1a743
SHA2561c26b5842479bc89bfb6a49e2b1e09af34f59c7793ba70a52a429ccc9522da00
SHA51207bf5002ec37179758908bae4218dd5c3e2c33909fe50f664afe29ac46f5945b3b4e28f8c2dc7148e11e24f2235340c8cf52ff040c0c06b193ca36f7f2370c20
-
Filesize
263KB
MD552b103a52af69a12c5d23429fd9ba808
SHA1bca1dd31bc4b8fa266abc770752c029af3a17e5e
SHA25621c025bd714ce9017dc063398db344502f717068adc0d7d0674576ff18215a04
SHA5127d78baeba55d511ae403162098f16e8642d320455b55ee67d5f727cdcfb6184c7dd094b1d1711f177a7c183cb29fb8f5251b849756bb99ede185cc5bc50de577