Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
2807c7d26c4db7d5b7f37fd9e87c66c77fab2eb3bb4d088be35a6f22e716e5e2.exe
Resource
win10v2004-20241007-en
General
-
Target
2807c7d26c4db7d5b7f37fd9e87c66c77fab2eb3bb4d088be35a6f22e716e5e2.exe
-
Size
673KB
-
MD5
a552b426c3bfed0d36f28a768b4293d6
-
SHA1
0572ccdb755902a0b75406481599cccb15486d86
-
SHA256
2807c7d26c4db7d5b7f37fd9e87c66c77fab2eb3bb4d088be35a6f22e716e5e2
-
SHA512
a3717736d03522667b998876380fe420962659e18a0b9c8e3b86c3defa1abcf19a0dedf15ec4969e2826eb3faf0604eca9f016cc43df7bc5bef762e54965a120
-
SSDEEP
12288:7MrEy90waQKdtq8G7HTy8XEgh06IbuWakQ6k7vpC:jyT8G7HT9Xlh06AuhoaC
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/5068-19-0x0000000002460000-0x000000000247A000-memory.dmp healer behavioral1/memory/5068-21-0x00000000024F0000-0x0000000002508000-memory.dmp healer behavioral1/memory/5068-49-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-48-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-45-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-43-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-41-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-39-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-37-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-35-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-33-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-31-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-29-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-27-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-25-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-23-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/5068-22-0x00000000024F0000-0x0000000002502000-memory.dmp healer -
Healer family
-
Processes:
pro5679.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5679.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4288-60-0x0000000002380000-0x00000000023C6000-memory.dmp family_redline behavioral1/memory/4288-61-0x0000000002530000-0x0000000002574000-memory.dmp family_redline behavioral1/memory/4288-67-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-75-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-73-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-71-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-69-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-93-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-85-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-65-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-63-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-62-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-95-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-91-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-89-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-88-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-83-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-81-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-79-0x0000000002530000-0x000000000256F000-memory.dmp family_redline behavioral1/memory/4288-77-0x0000000002530000-0x000000000256F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un924814.exepro5679.exequ7500.exepid process 5008 un924814.exe 5068 pro5679.exe 4288 qu7500.exe -
Processes:
pro5679.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5679.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2807c7d26c4db7d5b7f37fd9e87c66c77fab2eb3bb4d088be35a6f22e716e5e2.exeun924814.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2807c7d26c4db7d5b7f37fd9e87c66c77fab2eb3bb4d088be35a6f22e716e5e2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un924814.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4944 5068 WerFault.exe pro5679.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2807c7d26c4db7d5b7f37fd9e87c66c77fab2eb3bb4d088be35a6f22e716e5e2.exeun924814.exepro5679.exequ7500.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2807c7d26c4db7d5b7f37fd9e87c66c77fab2eb3bb4d088be35a6f22e716e5e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un924814.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5679.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7500.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5679.exepid process 5068 pro5679.exe 5068 pro5679.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5679.exequ7500.exedescription pid process Token: SeDebugPrivilege 5068 pro5679.exe Token: SeDebugPrivilege 4288 qu7500.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
2807c7d26c4db7d5b7f37fd9e87c66c77fab2eb3bb4d088be35a6f22e716e5e2.exeun924814.exedescription pid process target process PID 3560 wrote to memory of 5008 3560 2807c7d26c4db7d5b7f37fd9e87c66c77fab2eb3bb4d088be35a6f22e716e5e2.exe un924814.exe PID 3560 wrote to memory of 5008 3560 2807c7d26c4db7d5b7f37fd9e87c66c77fab2eb3bb4d088be35a6f22e716e5e2.exe un924814.exe PID 3560 wrote to memory of 5008 3560 2807c7d26c4db7d5b7f37fd9e87c66c77fab2eb3bb4d088be35a6f22e716e5e2.exe un924814.exe PID 5008 wrote to memory of 5068 5008 un924814.exe pro5679.exe PID 5008 wrote to memory of 5068 5008 un924814.exe pro5679.exe PID 5008 wrote to memory of 5068 5008 un924814.exe pro5679.exe PID 5008 wrote to memory of 4288 5008 un924814.exe qu7500.exe PID 5008 wrote to memory of 4288 5008 un924814.exe qu7500.exe PID 5008 wrote to memory of 4288 5008 un924814.exe qu7500.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2807c7d26c4db7d5b7f37fd9e87c66c77fab2eb3bb4d088be35a6f22e716e5e2.exe"C:\Users\Admin\AppData\Local\Temp\2807c7d26c4db7d5b7f37fd9e87c66c77fab2eb3bb4d088be35a6f22e716e5e2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un924814.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un924814.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5679.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5679.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 10804⤵
- Program crash
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7500.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7500.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4288
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5068 -ip 50681⤵PID:960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD5252168ce70f8e02d3042f5f22c8ebd15
SHA13fe8f94bfc7d8ebf86cec5626369218b73503750
SHA256633d47bcf7492cc61d67b078cfff00955b0813c4686199d07464fabd4190601f
SHA5121a9649618a71c792262d9fb2e63ed26ea1eb2bd2909d3c1d6b4ea1540271d5972f438d25206d84b558ef11b5c6a46bd97c115abdbd751ae694558b8e9d74f43d
-
Filesize
260KB
MD52819c21ae62ca34dc750b0146fa4e700
SHA1bf6024c3de0a02dfc9100e19cf6757af3cda746c
SHA2566eeec575db182d62bbe6403ff2d04d35e982dc59b501fddd471564234ea1a909
SHA512b70c7a98f1a7a481a6c9b8ea6225204b7e2868a22e24f8287285104bab05c3219f4dda0abe4ec72a417a2d93b15b6253fe378877fa03ad9518c489c8e9f1abc9
-
Filesize
319KB
MD5114da3910491335028f3e35e2b3c9677
SHA189e28b1ad16a0cbf7dd4cf1cc91aaf26820e9d16
SHA2567ecda673cfab6a36494acfae598746ad062bd11480b1c755087ab785e07a0468
SHA512ae4321f70c8311d930cd539c1c037a2c388217e181a82215d13be5da7aecb8fa37cbbc221934db45d72b97f4870543ad76f62d7abef897a1a0f3559dac8781e2