Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0.exe
Resource
win10v2004-20241007-en
General
-
Target
3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0.exe
-
Size
909KB
-
MD5
cf95db7127f3e69fa4aaa44a2b368ac1
-
SHA1
b766e6cee7c310610fb8fad749492762ff882103
-
SHA256
3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0
-
SHA512
f58e122188bf67a7c39b4192ebac861fdeaa57375e6a90d4a5aa8d186224c550c48ef8350411e31f718a7e285ed9da99e3088fb2ce84d20c4f0b6de845e176c9
-
SSDEEP
12288:QMrZy90nyMVo+7nlnvFnh0VBWzLecl5n3/M3PCAEGCHTkYzTjFY/Pnzb/mrWZ:Zy6yMV/5h02zKcl5nvMCXHQWFqn3Ory
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023b7d-19.dat healer behavioral1/memory/1600-22-0x0000000000F60000-0x0000000000F6A000-memory.dmp healer behavioral1/memory/4804-29-0x0000000002630000-0x000000000264A000-memory.dmp healer behavioral1/memory/4804-31-0x0000000002870000-0x0000000002888000-memory.dmp healer behavioral1/memory/4804-37-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-41-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-58-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-56-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-53-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-52-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-49-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-47-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-45-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-43-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-39-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-35-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-33-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-32-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/4804-59-0x0000000002870000-0x0000000002882000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu3237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu3237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu3237.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro8048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8048.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection qu3237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu3237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu3237.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3504-67-0x0000000004D00000-0x0000000004D46000-memory.dmp family_redline behavioral1/memory/3504-68-0x0000000005330000-0x0000000005374000-memory.dmp family_redline behavioral1/memory/3504-74-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-84-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-102-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-101-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-98-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-96-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-92-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-90-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-88-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-86-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-82-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-80-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-78-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-76-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-94-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-72-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-70-0x0000000005330000-0x000000000536E000-memory.dmp family_redline behavioral1/memory/3504-69-0x0000000005330000-0x000000000536E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 3452 unio4469.exe 2296 unio8794.exe 1600 pro8048.exe 4804 qu3237.exe 3504 rvc81s48.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8048.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu3237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu3237.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio8794.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio4469.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3536 4804 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio4469.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio8794.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3237.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rvc81s48.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1600 pro8048.exe 1600 pro8048.exe 4804 qu3237.exe 4804 qu3237.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1600 pro8048.exe Token: SeDebugPrivilege 4804 qu3237.exe Token: SeDebugPrivilege 3504 rvc81s48.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1784 wrote to memory of 3452 1784 3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0.exe 83 PID 1784 wrote to memory of 3452 1784 3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0.exe 83 PID 1784 wrote to memory of 3452 1784 3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0.exe 83 PID 3452 wrote to memory of 2296 3452 unio4469.exe 84 PID 3452 wrote to memory of 2296 3452 unio4469.exe 84 PID 3452 wrote to memory of 2296 3452 unio4469.exe 84 PID 2296 wrote to memory of 1600 2296 unio8794.exe 85 PID 2296 wrote to memory of 1600 2296 unio8794.exe 85 PID 2296 wrote to memory of 4804 2296 unio8794.exe 96 PID 2296 wrote to memory of 4804 2296 unio8794.exe 96 PID 2296 wrote to memory of 4804 2296 unio8794.exe 96 PID 3452 wrote to memory of 3504 3452 unio4469.exe 101 PID 3452 wrote to memory of 3504 3452 unio4469.exe 101 PID 3452 wrote to memory of 3504 3452 unio4469.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0.exe"C:\Users\Admin\AppData\Local\Temp\3df4c305addc5eb3cf2bd9513af108cf2513ca25fbb2f0d241c4a1dca6bdefc0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4469.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio4469.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8794.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio8794.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8048.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8048.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu3237.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu3237.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 10805⤵
- Program crash
PID:3536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rvc81s48.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rvc81s48.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4804 -ip 48041⤵PID:2648
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
766KB
MD555b45addb3d075c15362581279de9d31
SHA189143adc06ab762cee9a81814593588825877e33
SHA256a9069bbfd583f0d3047501515abbed2ff90cd100d0eb6f889d2d605461c1f48d
SHA512c33507ef90a84d61181b1d52516ed94bf879377810275c38a2835904de2f5b6a073c2027d0eaeb37fb2320021d23da169f50c3e5d5d5436f8073e06a7fd12a3b
-
Filesize
457KB
MD51b9009894e3b5c6da2e7c0f2c6201547
SHA18fddac2f4e2c2a1d6b5f6bb88e34c2b3ed53115b
SHA2569223561cb234437f8dfa6e727cbedd9ba583e7245eb34ff4de192034e3a0b02a
SHA5120de592df58fbf5405f64e82157784afaadd80256a9660c93355ff82bde38c37de0b9fcde05c50849a13cee3476d22c793cab3aeb5542e3d0451d1e36e4c2bba6
-
Filesize
380KB
MD59ac8ef25fdffaf7e372fad29d128a42e
SHA1c64423de27a955b2c6b5b1107a7728b386ea2c97
SHA2563640ae6e2b42c7b74a1cc184ac91ee5eff1e24e795537d11823bcd37807228ce
SHA5123028268c713438fa6fd7f39a6b88ee3ee9660ebc9f05c9e04fa5909add5985188c215b7cf8a5d99b49fa0de023474a1cc3d0f5921c3697c7e46b9693f91804fc
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
399KB
MD57bd5af17a52785c6d4aaa42a17fda90a
SHA10d019aa7caa7cf13561e114164fed71f44ad2e1d
SHA2561fe239b1ec05c132a8a012f8afab01a83dc4cd70f01042683b8862115808b443
SHA512732318cbf1d20dfbd77370665fc54b946abd4b5dc4b3ef9033cb11fda0a76813e82f4be6e9deacdc656d365912f1ebc254d3beee4507b2d23d72642555c71d90