Analysis
-
max time kernel
145s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
7523bfe32cefa8dec906c7c6facf1598c7a015d601858f462aefa861559abf1e.exe
Resource
win10v2004-20241007-en
General
-
Target
7523bfe32cefa8dec906c7c6facf1598c7a015d601858f462aefa861559abf1e.exe
-
Size
661KB
-
MD5
37fef85789a9c04881400c32da60f22e
-
SHA1
aebebf2b3f299f69b31187a8b7d2e89aa96de5c1
-
SHA256
7523bfe32cefa8dec906c7c6facf1598c7a015d601858f462aefa861559abf1e
-
SHA512
caff05a112c994039ba9e4042a63c5e6c08c80312ee50d569763174cbadd1b38c0062b10126d3ca99c232dac7882922cd624b1b7703b13c4cef0447ac3107869
-
SSDEEP
12288:TMr2y90nKdYbF6u25kmfuD7n5PCTXQsSEavfhw/fHKXa/vmR4wF9:ty3W4bkmQ7n5PQ7SEavfh+qwmxF9
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4344-17-0x0000000004940000-0x000000000495A000-memory.dmp healer behavioral1/memory/4344-19-0x0000000004BD0000-0x0000000004BE8000-memory.dmp healer behavioral1/memory/4344-48-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-46-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-44-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-42-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-40-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-38-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-36-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-35-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-32-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-30-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-28-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-26-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-24-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-22-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer behavioral1/memory/4344-21-0x0000000004BD0000-0x0000000004BE2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7215.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/5032-59-0x00000000023E0000-0x0000000002426000-memory.dmp family_redline behavioral1/memory/5032-60-0x0000000005180000-0x00000000051C4000-memory.dmp family_redline behavioral1/memory/5032-94-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-88-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-92-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-90-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-86-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-84-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-82-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-80-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-78-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-76-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-74-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-72-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-70-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-68-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-66-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-64-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-62-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline behavioral1/memory/5032-61-0x0000000005180000-0x00000000051BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 408 un657472.exe 4344 pro7215.exe 5032 qu5477.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7215.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7523bfe32cefa8dec906c7c6facf1598c7a015d601858f462aefa861559abf1e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un657472.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3564 4344 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7523bfe32cefa8dec906c7c6facf1598c7a015d601858f462aefa861559abf1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un657472.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7215.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5477.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4344 pro7215.exe 4344 pro7215.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4344 pro7215.exe Token: SeDebugPrivilege 5032 qu5477.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 436 wrote to memory of 408 436 7523bfe32cefa8dec906c7c6facf1598c7a015d601858f462aefa861559abf1e.exe 83 PID 436 wrote to memory of 408 436 7523bfe32cefa8dec906c7c6facf1598c7a015d601858f462aefa861559abf1e.exe 83 PID 436 wrote to memory of 408 436 7523bfe32cefa8dec906c7c6facf1598c7a015d601858f462aefa861559abf1e.exe 83 PID 408 wrote to memory of 4344 408 un657472.exe 84 PID 408 wrote to memory of 4344 408 un657472.exe 84 PID 408 wrote to memory of 4344 408 un657472.exe 84 PID 408 wrote to memory of 5032 408 un657472.exe 97 PID 408 wrote to memory of 5032 408 un657472.exe 97 PID 408 wrote to memory of 5032 408 un657472.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\7523bfe32cefa8dec906c7c6facf1598c7a015d601858f462aefa861559abf1e.exe"C:\Users\Admin\AppData\Local\Temp\7523bfe32cefa8dec906c7c6facf1598c7a015d601858f462aefa861559abf1e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un657472.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un657472.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7215.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7215.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 10844⤵
- Program crash
PID:3564
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5477.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5477.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4344 -ip 43441⤵PID:3860
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5ec16c2c4ed59a9f5f461dcff61aa8729
SHA1ca5277aac34113e2c8a40d1e475f29bb474b5f90
SHA2567188c67a049809ffaace3e7e4adf522f4a19b879412c3ec26200813a9d015a9c
SHA51213dafef27874aca3610f9d7c1d1b308ebff6634d7a386be6501787e9b6365e3e4951ecc94dd267ec2cc6694192ba41084f2ab16fe684c144efc93fa35cab0648
-
Filesize
296KB
MD50a50ac814e50e98faf421f10148038f6
SHA1696367c0d0b171813cd691e64f0682c50176e4b9
SHA256600f9bf999c4fbc6389f77d8209bac9359be3cc9b0a40dce7c393949a525c3fa
SHA512be87d13b47ad56d25504b3c61a6f188ea7fc5927201cfa5ef2296f53deafa891dc78b77d027ee662c9be3e1bfe61852a260d75c702ba9c739b82380e749cc89e
-
Filesize
434KB
MD5899be074c427f71c03362a9d45f122b0
SHA1c45275cab3c4e8f08c2ac854ed57b98b7812c89f
SHA256c390a7009a34e467916f53fbf685199219768a8b7c7e4ea7eee733aa6648fafb
SHA5122dfe3393e6de6d2082098f18fd8efd2ae729cafa19f0005fa6c581a01b72b8ba4e7e23d6ec2c53e58b7d76b7815f4d927f4a16a1df767e1d5a33e969532bc4e7