Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:56
Static task
static1
Behavioral task
behavioral1
Sample
d5080aa5c2083f29843f7ffa0d4e655a97c5d615ebf9c44f428514e3a4e5b681.exe
Resource
win10v2004-20241007-en
General
-
Target
d5080aa5c2083f29843f7ffa0d4e655a97c5d615ebf9c44f428514e3a4e5b681.exe
-
Size
660KB
-
MD5
4bb23b608d5613ae83274cec8962da8f
-
SHA1
db20f905a8d58f13ebdaa3617df5115b094159a4
-
SHA256
d5080aa5c2083f29843f7ffa0d4e655a97c5d615ebf9c44f428514e3a4e5b681
-
SHA512
ee74b07bbae7f32ae18c43505a9fc41dcf1c8833543900f0f2c03a73b1e52faf689d798146da98c42a84e3c410025c605adcf07da55ce9b0ac03d78b17e99dad
-
SSDEEP
12288:AMrwy90NVRrjq3mrbEIxyPbovjtAEHo1x/:gyCjWmvzIbEjtAEI/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4000-19-0x00000000024E0000-0x00000000024FA000-memory.dmp healer behavioral1/memory/4000-21-0x0000000002520000-0x0000000002538000-memory.dmp healer behavioral1/memory/4000-49-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-47-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-45-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-43-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-41-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-39-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-37-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-35-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-33-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-31-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-29-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-27-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-25-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-23-0x0000000002520000-0x0000000002532000-memory.dmp healer behavioral1/memory/4000-22-0x0000000002520000-0x0000000002532000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7598.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7598.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7598.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4276-61-0x0000000002470000-0x00000000024B6000-memory.dmp family_redline behavioral1/memory/4276-62-0x0000000004AC0000-0x0000000004B04000-memory.dmp family_redline behavioral1/memory/4276-76-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-74-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-96-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-94-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-92-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-90-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-88-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-84-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-82-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-80-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-79-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-72-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-68-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-86-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-70-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-66-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-64-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/4276-63-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1176 un676389.exe 4000 pro7598.exe 4276 qu1788.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7598.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7598.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d5080aa5c2083f29843f7ffa0d4e655a97c5d615ebf9c44f428514e3a4e5b681.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un676389.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1560 4000 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un676389.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7598.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1788.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5080aa5c2083f29843f7ffa0d4e655a97c5d615ebf9c44f428514e3a4e5b681.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4000 pro7598.exe 4000 pro7598.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4000 pro7598.exe Token: SeDebugPrivilege 4276 qu1788.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2652 wrote to memory of 1176 2652 d5080aa5c2083f29843f7ffa0d4e655a97c5d615ebf9c44f428514e3a4e5b681.exe 83 PID 2652 wrote to memory of 1176 2652 d5080aa5c2083f29843f7ffa0d4e655a97c5d615ebf9c44f428514e3a4e5b681.exe 83 PID 2652 wrote to memory of 1176 2652 d5080aa5c2083f29843f7ffa0d4e655a97c5d615ebf9c44f428514e3a4e5b681.exe 83 PID 1176 wrote to memory of 4000 1176 un676389.exe 84 PID 1176 wrote to memory of 4000 1176 un676389.exe 84 PID 1176 wrote to memory of 4000 1176 un676389.exe 84 PID 1176 wrote to memory of 4276 1176 un676389.exe 95 PID 1176 wrote to memory of 4276 1176 un676389.exe 95 PID 1176 wrote to memory of 4276 1176 un676389.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5080aa5c2083f29843f7ffa0d4e655a97c5d615ebf9c44f428514e3a4e5b681.exe"C:\Users\Admin\AppData\Local\Temp\d5080aa5c2083f29843f7ffa0d4e655a97c5d615ebf9c44f428514e3a4e5b681.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un676389.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un676389.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7598.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7598.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 10804⤵
- Program crash
PID:1560
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1788.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1788.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4000 -ip 40001⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD5b72c62a0085f577d948711bafd9d1241
SHA1f8c600d8d2956cfb7631fd33f1e787f4f69f385a
SHA2564bc4f293d6682a2e38b5939fd104f727045a9b0ffbb83de7af83ee1f06791ca5
SHA5125149656f88e857749f298df3f2562951844457aa73f7256fef54439e2353b4ea0dbfd3617fb6192bebf8bbbd59612b25ba2b5f22bf43d1ba3fc783eeb31f3eee
-
Filesize
237KB
MD5c10fffcc707334ceb9822a12964440c0
SHA1747bb624f4e03e8f158adb74a5d7a3fa960299e1
SHA256f6c0b585f89f54cd2a7d5e3cfd336fdc78a92913d7fc6adc6ab6f0f8431b6845
SHA512837ab452130618b92fa1826765420969cf97ed741b778ce04b22bafecc56731688de9c39b18fe569e0a50c3b2c4c6733019f563859be34c52854baca489c9f2e
-
Filesize
295KB
MD50ae40f2244c0e2631416b4d5f579453a
SHA1e4caaed90afad0e8b992417f657add4acb66be23
SHA256315d3d2b7b283400efad51f5a536c34d0447f75f30673dd18094b7d5e4b05aa1
SHA5120772a24a5116f0c2bca13fe61e27760814a9236ede82bbbb1b6897685574ae4e7f4013ef121483ad97ff12905f43960b4544d3464fb7c69df26c96a761eebca3