Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
be40bd38a010569bb25392086603d8532a122b3524329fa7cfc3847608121409.exe
Resource
win10v2004-20241007-en
General
-
Target
be40bd38a010569bb25392086603d8532a122b3524329fa7cfc3847608121409.exe
-
Size
658KB
-
MD5
ff94419357466f8045224402b3f21b8d
-
SHA1
e31a057bba757f62a64d68e9b0f59e30348087f5
-
SHA256
be40bd38a010569bb25392086603d8532a122b3524329fa7cfc3847608121409
-
SHA512
6de502288e49284175327cd2cca6085e951d92330bc3f5f3c3891464c7fa398e14d2eaa3af5e4adc6cd727f19edf97eeb2718b6b44b2092d56c7383b3344fe5a
-
SSDEEP
12288:2Mrey90b2oqHT5hW+p1aUaW3xyuW+CDQ3SCqUM8+EoZxPF1npC0xvF:kyxX1l/yP5Un+EozhF
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1980-18-0x0000000004970000-0x000000000498A000-memory.dmp healer behavioral1/memory/1980-20-0x0000000004BC0000-0x0000000004BD8000-memory.dmp healer behavioral1/memory/1980-21-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-46-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-48-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-44-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-42-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-40-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-38-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-36-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-34-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-32-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-30-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-28-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-26-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-24-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/1980-22-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer -
Healer family
-
Processes:
pro8650.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8650.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8650.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4980-60-0x0000000004AF0000-0x0000000004B36000-memory.dmp family_redline behavioral1/memory/4980-61-0x00000000071A0000-0x00000000071E4000-memory.dmp family_redline behavioral1/memory/4980-65-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-95-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-93-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-91-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-89-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-87-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-85-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-83-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-81-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-79-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-77-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-75-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-73-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-71-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-67-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-63-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-62-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/4980-69-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un842820.exepro8650.exequ7787.exepid process 3280 un842820.exe 1980 pro8650.exe 4980 qu7787.exe -
Processes:
pro8650.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8650.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8650.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
be40bd38a010569bb25392086603d8532a122b3524329fa7cfc3847608121409.exeun842820.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" be40bd38a010569bb25392086603d8532a122b3524329fa7cfc3847608121409.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un842820.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1592 1980 WerFault.exe pro8650.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
be40bd38a010569bb25392086603d8532a122b3524329fa7cfc3847608121409.exeun842820.exepro8650.exequ7787.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be40bd38a010569bb25392086603d8532a122b3524329fa7cfc3847608121409.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un842820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8650.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7787.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8650.exepid process 1980 pro8650.exe 1980 pro8650.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8650.exequ7787.exedescription pid process Token: SeDebugPrivilege 1980 pro8650.exe Token: SeDebugPrivilege 4980 qu7787.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
be40bd38a010569bb25392086603d8532a122b3524329fa7cfc3847608121409.exeun842820.exedescription pid process target process PID 4272 wrote to memory of 3280 4272 be40bd38a010569bb25392086603d8532a122b3524329fa7cfc3847608121409.exe un842820.exe PID 4272 wrote to memory of 3280 4272 be40bd38a010569bb25392086603d8532a122b3524329fa7cfc3847608121409.exe un842820.exe PID 4272 wrote to memory of 3280 4272 be40bd38a010569bb25392086603d8532a122b3524329fa7cfc3847608121409.exe un842820.exe PID 3280 wrote to memory of 1980 3280 un842820.exe pro8650.exe PID 3280 wrote to memory of 1980 3280 un842820.exe pro8650.exe PID 3280 wrote to memory of 1980 3280 un842820.exe pro8650.exe PID 3280 wrote to memory of 4980 3280 un842820.exe qu7787.exe PID 3280 wrote to memory of 4980 3280 un842820.exe qu7787.exe PID 3280 wrote to memory of 4980 3280 un842820.exe qu7787.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be40bd38a010569bb25392086603d8532a122b3524329fa7cfc3847608121409.exe"C:\Users\Admin\AppData\Local\Temp\be40bd38a010569bb25392086603d8532a122b3524329fa7cfc3847608121409.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un842820.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un842820.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8650.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8650.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 10524⤵
- Program crash
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7787.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7787.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1980 -ip 19801⤵PID:2460
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5a0dfd2a7ff7c3c7bc12de32dc101fa97
SHA1ce45ed881d9e3220dcb5b26f727a75351f55f9dd
SHA256ac1d7ccc44968579bdac909d5689003ea1ca27a975fa999d4ca03dc70dafa7ea
SHA512ba15dcf28907bb614193081b5dc961d773deae74c56473de0f12125ab1344698b4ca2dd419f781f0a90e42d9e24e88d61ea2c2e3ed21f53940225b3f09747d8b
-
Filesize
295KB
MD51f2f1351198670846e77c24893795cdf
SHA18e33437d4a3b14c1bb15e367da430fc34fd845a3
SHA2560eb169d8cf6245dbecb1ffd33788a9d148dc1601de3d198c0102d34aa54f4ac8
SHA512c275c0d08b2975a1e7c1d0fbc72f50947d2a3506650fec5deea8e1d4646d225d1e2828a920df640d6246efaf5dc7fce8dba139f08d6611566993ab21171443da
-
Filesize
354KB
MD56d62268d011933ca22bda1d81ce18abc
SHA12c3b0893a3fa9fefad09b5d65dbc3e3047f80eba
SHA25659956c35280186f46fa79818bfba805d778abd7e451d13bb7509cbb6bd901249
SHA5129aed3af2f4b05c871c965417167392679fb792e605320e00083e5e34dd484b13580bfe423f4e8a4e16299af893acaec5f3e7bd62685257ef9bd43d78f57d17da