Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
7e48390958e686e291319a7fa35f7e9669a40a6155cc9d2152d60b8863541ee6.exe
Resource
win10v2004-20241007-en
General
-
Target
7e48390958e686e291319a7fa35f7e9669a40a6155cc9d2152d60b8863541ee6.exe
-
Size
696KB
-
MD5
990c2140f76c4160d24593ab90a29b40
-
SHA1
81e79f426b22208b9c43a90b7daf2996924153e1
-
SHA256
7e48390958e686e291319a7fa35f7e9669a40a6155cc9d2152d60b8863541ee6
-
SHA512
0ab98d9cc4cd794de0698a043dbd0071db9c9aac96ef5297965bd504b7a19b3031face7a414cf1d7f95680d225e5ffdc320c50c58c60561279fd5a49a7104282
-
SSDEEP
12288:SMrLy90M7zEzkRpfJH8Cj+aDzHmkPzzJSFdfFVzzJZHIUlBhHAZR:xy5sQc2+OjJdSFdtVJFj5gR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1860-18-0x0000000004CB0000-0x0000000004CCA000-memory.dmp healer behavioral1/memory/1860-20-0x0000000004D30000-0x0000000004D48000-memory.dmp healer behavioral1/memory/1860-21-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-48-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-47-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-44-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-42-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-40-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-38-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-36-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-34-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-32-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-30-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-28-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-26-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-24-0x0000000004D30000-0x0000000004D42000-memory.dmp healer behavioral1/memory/1860-22-0x0000000004D30000-0x0000000004D42000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3651.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3651.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4772-59-0x0000000004C30000-0x0000000004C76000-memory.dmp family_redline behavioral1/memory/4772-60-0x0000000007170000-0x00000000071B4000-memory.dmp family_redline behavioral1/memory/4772-86-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-94-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-92-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-90-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-88-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-80-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-78-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-76-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-74-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-72-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-70-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-68-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-66-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-64-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-84-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-82-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-62-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/4772-61-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2752 un370464.exe 1860 pro3651.exe 4772 qu3293.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3651.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e48390958e686e291319a7fa35f7e9669a40a6155cc9d2152d60b8863541ee6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un370464.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4844 1860 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3293.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e48390958e686e291319a7fa35f7e9669a40a6155cc9d2152d60b8863541ee6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un370464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3651.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1860 pro3651.exe 1860 pro3651.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1860 pro3651.exe Token: SeDebugPrivilege 4772 qu3293.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5068 wrote to memory of 2752 5068 7e48390958e686e291319a7fa35f7e9669a40a6155cc9d2152d60b8863541ee6.exe 82 PID 5068 wrote to memory of 2752 5068 7e48390958e686e291319a7fa35f7e9669a40a6155cc9d2152d60b8863541ee6.exe 82 PID 5068 wrote to memory of 2752 5068 7e48390958e686e291319a7fa35f7e9669a40a6155cc9d2152d60b8863541ee6.exe 82 PID 2752 wrote to memory of 1860 2752 un370464.exe 83 PID 2752 wrote to memory of 1860 2752 un370464.exe 83 PID 2752 wrote to memory of 1860 2752 un370464.exe 83 PID 2752 wrote to memory of 4772 2752 un370464.exe 98 PID 2752 wrote to memory of 4772 2752 un370464.exe 98 PID 2752 wrote to memory of 4772 2752 un370464.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e48390958e686e291319a7fa35f7e9669a40a6155cc9d2152d60b8863541ee6.exe"C:\Users\Admin\AppData\Local\Temp\7e48390958e686e291319a7fa35f7e9669a40a6155cc9d2152d60b8863541ee6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370464.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370464.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3651.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3651.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 10804⤵
- Program crash
PID:4844
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3293.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3293.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1860 -ip 18601⤵PID:3428
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554KB
MD5e24f419bd8a5b81dd26e61443dbdee6d
SHA1cffb88ac2a02811990a320b5a044b6113a21dd04
SHA2561b3fe2661a8d00c8a7b20acdaf045ec0ab956e1ccdf5c4eabea29d92223347f6
SHA512bd17ce5ca4d170044d410ba4874feac38b35f284ff734de305fd0c4ef354a86a5dd017cf1ce15994127b5ff37d5edb5c0fc17e5574e13d9919be8b37152ef2a0
-
Filesize
347KB
MD55f668ce2f593197979478715fe21ba0f
SHA10843c5b316a35bff979fa6097bae88b8d8841c0a
SHA256e2cdf7acbfee59ab309e8c14ae44e614592a3df1e2c53918c4ffb6d45aa69743
SHA5128727b95b7b502ea17cd32edd05e05893910e13dcab2344b1be52bd2423d01a0bfb45b6fc1d6e54bffa19482c9b7666b6c116563c353b5245a62696bc4ff2f891
-
Filesize
405KB
MD548247182400e83677201cc43c4365914
SHA104a61ec7ab740db0f4d0bd00db5ffbba87b3d537
SHA2567b236172a5301077c4be6e1914084ebaee3bea360074eb43401a670b7de44583
SHA5123b758fb8ae2388bff1034f2bd46767f677478935ce6dcaf9fb83723db0aeb232b419d2ca10a53c056e49146eb38af6b0884e01b77bc65a3abe52cfa0e68433bc