Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12.exe
Resource
win10v2004-20241007-en
General
-
Target
2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12.exe
-
Size
671KB
-
MD5
7ee30a22d37cc0bb3d1d284826dcbac4
-
SHA1
ce3c3488a47f0fc098e7278467c3b5b1d4292cf0
-
SHA256
2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12
-
SHA512
901e0beb9e01fe4c92c9245cec46aed086bf34794578a205dd9e1be59488602e4adf614c5bef96839c3a603841406d634a6864e00242d788bb9636bd12fa5ee7
-
SSDEEP
12288:3MrKy9051HgEJiMOEHU+HXrqO0fgsD090L9ZbJKR/tfmcq3LqUo2rQIq8a:dyDWxOEHUuqO0fn0CpdJefmcq3GUpjqN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2588-18-0x0000000003BB0000-0x0000000003BCA000-memory.dmp healer behavioral1/memory/2588-21-0x0000000003C40000-0x0000000003C58000-memory.dmp healer behavioral1/memory/2588-31-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-49-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-47-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-45-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-43-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-41-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-39-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-37-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-35-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-29-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-27-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-25-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-23-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-22-0x0000000003C40000-0x0000000003C52000-memory.dmp healer behavioral1/memory/2588-33-0x0000000003C40000-0x0000000003C52000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4850.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4850.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4850.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4850.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4850.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4850.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3676-62-0x0000000003A40000-0x0000000003A86000-memory.dmp family_redline behavioral1/memory/3676-63-0x0000000003BC0000-0x0000000003C04000-memory.dmp family_redline behavioral1/memory/3676-71-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-91-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-97-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-95-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-94-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-89-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-87-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-85-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-83-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-81-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-79-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-77-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-75-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-73-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-67-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-70-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-65-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline behavioral1/memory/3676-64-0x0000000003BC0000-0x0000000003BFF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2164 un211617.exe 2588 pro4850.exe 3676 qu7188.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4850.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4850.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un211617.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2808 2588 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un211617.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4850.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7188.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2588 pro4850.exe 2588 pro4850.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2588 pro4850.exe Token: SeDebugPrivilege 3676 qu7188.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3984 wrote to memory of 2164 3984 2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12.exe 83 PID 3984 wrote to memory of 2164 3984 2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12.exe 83 PID 3984 wrote to memory of 2164 3984 2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12.exe 83 PID 2164 wrote to memory of 2588 2164 un211617.exe 84 PID 2164 wrote to memory of 2588 2164 un211617.exe 84 PID 2164 wrote to memory of 2588 2164 un211617.exe 84 PID 2164 wrote to memory of 3676 2164 un211617.exe 100 PID 2164 wrote to memory of 3676 2164 un211617.exe 100 PID 2164 wrote to memory of 3676 2164 un211617.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12.exe"C:\Users\Admin\AppData\Local\Temp\2dc5e9ac14c3eaf4d0a866af5444b6cc57306958f0af2727f18ff5b546154b12.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un211617.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un211617.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4850.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4850.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 10804⤵
- Program crash
PID:2808
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7188.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7188.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2588 -ip 25881⤵PID:2232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
529KB
MD579df9eae284d7f687d48525dba954062
SHA1d53aee7641845d85fd804ddc9c801da859a8bfb0
SHA25638bdb35426e26ca0c77200343ce53e327debf3549ed6bd79543f2f2f41122f32
SHA512f432c038ad759fa15349d319b367b169b0c605442a6a679f9c865efff631b0af72eb4a1bc2dd49b0f63df16823f71949cded7903cd5974db3d9eb750c7088c8d
-
Filesize
301KB
MD5ccda2cb859ff69fcaff8ed41b90bd6b0
SHA1594498fc2d946ad10b0c47382c37a44d77dde9ba
SHA256a51a42a90f91a44d2fcbc696d8a9b41440a9618c016fedd11e8b12cccf397d7c
SHA512542b0f7ca3f38d39022f16750f1cd4daaf381a751d892a9665a698d594a4c6a466729aaaea9ab14633e5fa0c663aaaf36b479996b1b20f9ac1ab396b4cc7ede7
-
Filesize
359KB
MD583ecdfbd467c719e32a05275be672735
SHA141d74d887ae58891d331e5f32165e5ce58ee18ea
SHA2565a7575b0c0fd5f30bc41e7a64f545ac5584c84793f76dc0c672f7cbfc1562788
SHA51238f98abf497a3aa1f5ee6b5fe45fa40675ccda3842cdd0e5477eb7f7c1e49b1d9fcce081da77d9743ab65c4f604bc77759574efc8c6d34f5243c11fbba1aa1b7