Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:21
Static task
static1
Behavioral task
behavioral1
Sample
9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31.exe
Resource
win10v2004-20241007-en
General
-
Target
9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31.exe
-
Size
659KB
-
MD5
0b33bce84f3ec390908f178adba51848
-
SHA1
bcbe03ca375e1a0e162888d2842afb8afe488269
-
SHA256
9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31
-
SHA512
f1229c65a0a41e15bc83022e32694a3a9b67ab9f0e0b859aa04a05ce3c64014a0d2fdf4464b2fcb2d69f7527064211d25822583d948b45c2300699681392c46c
-
SSDEEP
12288:gMrey90sz6R45RK788ETnrPvgCJgLIBdD+XwQKjdQoqBiyn0LIx+N5:uyRz6RT4pnHJII/M4JQDz0LIc5
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3524-18-0x0000000004AE0000-0x0000000004AFA000-memory.dmp healer behavioral1/memory/3524-20-0x0000000004CC0000-0x0000000004CD8000-memory.dmp healer behavioral1/memory/3524-48-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-46-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-44-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-42-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-40-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-38-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-36-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-34-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-32-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-30-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-28-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-26-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-24-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-22-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/3524-21-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer -
Healer family
-
Processes:
pro8319.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8319.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8319.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4768-60-0x0000000004AB0000-0x0000000004AF6000-memory.dmp family_redline behavioral1/memory/4768-61-0x0000000007210000-0x0000000007254000-memory.dmp family_redline behavioral1/memory/4768-62-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-63-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-95-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-93-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-91-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-89-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-87-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-85-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-81-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-79-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-77-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-75-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-73-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-71-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-69-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-67-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-65-0x0000000007210000-0x000000000724F000-memory.dmp family_redline behavioral1/memory/4768-83-0x0000000007210000-0x000000000724F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un494463.exepro8319.exequ0709.exepid process 1304 un494463.exe 3524 pro8319.exe 4768 qu0709.exe -
Processes:
pro8319.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8319.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8319.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un494463.exe9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un494463.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1396 3524 WerFault.exe pro8319.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro8319.exequ0709.exe9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31.exeun494463.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8319.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un494463.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8319.exepid process 3524 pro8319.exe 3524 pro8319.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8319.exequ0709.exedescription pid process Token: SeDebugPrivilege 3524 pro8319.exe Token: SeDebugPrivilege 4768 qu0709.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31.exeun494463.exedescription pid process target process PID 4576 wrote to memory of 1304 4576 9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31.exe un494463.exe PID 4576 wrote to memory of 1304 4576 9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31.exe un494463.exe PID 4576 wrote to memory of 1304 4576 9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31.exe un494463.exe PID 1304 wrote to memory of 3524 1304 un494463.exe pro8319.exe PID 1304 wrote to memory of 3524 1304 un494463.exe pro8319.exe PID 1304 wrote to memory of 3524 1304 un494463.exe pro8319.exe PID 1304 wrote to memory of 4768 1304 un494463.exe qu0709.exe PID 1304 wrote to memory of 4768 1304 un494463.exe qu0709.exe PID 1304 wrote to memory of 4768 1304 un494463.exe qu0709.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31.exe"C:\Users\Admin\AppData\Local\Temp\9e4775f8c810882cc58db35fdc5273f225d560b83ab31ed9ce788456ea53ec31.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un494463.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un494463.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8319.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8319.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3524 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 10884⤵
- Program crash
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0709.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0709.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3524 -ip 35241⤵PID:1468
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5368f48f4173976399c7070c55ba68f07
SHA1ef9f79d03225f8bebebf9d1d89d5aa8bb051f6ac
SHA256ff69c3397fefa94ed9eaa9400f3b8eb375f4145a7220d208c85024d5451d5603
SHA5123c5c3e0501ef5edd5ad36761bb9b460f1648b90d01f638ffbc971c27a7fed135c2621f93cd3d08a2ad5c95c0afd678eaeee1938ae0200393070f60513d3572e3
-
Filesize
295KB
MD5d36c52c7f14a233d3ebbbc577d253a8d
SHA19f545cc932983d100d384e3a427fbd060bb221e5
SHA2567c3d45de8479018d5b781fdf55899f37450761bfae11c4da9bf7465c86fb9bfb
SHA512cee0b6ddd5d9424cd074f60020ecb8a2fbe7396989ed83d40721dc0ecfd4776fe354b313d91e0c62e6c3c839e4dbad8b80cc7ddedcbd842db6af882efff281af
-
Filesize
354KB
MD5ebf84cdf14cfe6dc90493803f8d3b588
SHA189cae170fad18086dc7f55f6b9e76e58f64e1e4e
SHA256d0f59d2e8a45c25f58821e6f0b0ed2467b10279a646fd1d09d6a944820959ed4
SHA51226235aff1a253c7adcdce29fca438cf34e851a84e8eaaaeb134d642385ce8bb2948f7975bc38754312f87ebb9e8c0d8e94e98b4782d7874314f8b58beed285d9