Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
903027bc3e36bf09bc63a4a722e76d103d01bd20727e72227ac3ad54a09c462a.exe
Resource
win10v2004-20241007-en
General
-
Target
903027bc3e36bf09bc63a4a722e76d103d01bd20727e72227ac3ad54a09c462a.exe
-
Size
687KB
-
MD5
906eaded65dadde89a8719af90eff0d6
-
SHA1
83f3ef920d885a16ba0f11c166d953ba8f712abe
-
SHA256
903027bc3e36bf09bc63a4a722e76d103d01bd20727e72227ac3ad54a09c462a
-
SHA512
10a3342b97ec5ad6acd50fcb143a6dd8ba805a2056e59c7aef6da2069f3e982e7092419c9aadf34adb33bcb2e5e417450d0ca699e7d664ff7eb253728f631565
-
SSDEEP
12288:xMrKy90ZSwo2CxcfANoyDyhfdfP6oCdqTNLn1J/Hh9W43/zlbLjgQacHJA49R5:3yHh2CmANbDyhFKoCdeL1JvfWqlnjgQH
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2428-17-0x0000000002810000-0x000000000282A000-memory.dmp healer behavioral1/memory/2428-20-0x0000000004DE0000-0x0000000004DF8000-memory.dmp healer behavioral1/memory/2428-48-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-44-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-42-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-40-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-38-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-36-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-34-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-32-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-30-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-28-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-24-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-22-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-46-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-26-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/2428-21-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4847.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4847.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4847.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/60-56-0x0000000004CC0000-0x0000000004D06000-memory.dmp family_redline behavioral1/memory/60-57-0x0000000004D40000-0x0000000004D84000-memory.dmp family_redline behavioral1/memory/60-63-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-61-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-59-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-58-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-73-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-89-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-87-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-85-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-83-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-79-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-77-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-75-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-71-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-69-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-67-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-65-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-91-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline behavioral1/memory/60-81-0x0000000004D40000-0x0000000004D7E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3120 un697676.exe 2428 pro4847.exe 60 qu7232.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4847.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4847.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 903027bc3e36bf09bc63a4a722e76d103d01bd20727e72227ac3ad54a09c462a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un697676.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un697676.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4847.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7232.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 903027bc3e36bf09bc63a4a722e76d103d01bd20727e72227ac3ad54a09c462a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2428 pro4847.exe 2428 pro4847.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2428 pro4847.exe Token: SeDebugPrivilege 60 qu7232.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 920 wrote to memory of 3120 920 903027bc3e36bf09bc63a4a722e76d103d01bd20727e72227ac3ad54a09c462a.exe 83 PID 920 wrote to memory of 3120 920 903027bc3e36bf09bc63a4a722e76d103d01bd20727e72227ac3ad54a09c462a.exe 83 PID 920 wrote to memory of 3120 920 903027bc3e36bf09bc63a4a722e76d103d01bd20727e72227ac3ad54a09c462a.exe 83 PID 3120 wrote to memory of 2428 3120 un697676.exe 84 PID 3120 wrote to memory of 2428 3120 un697676.exe 84 PID 3120 wrote to memory of 2428 3120 un697676.exe 84 PID 3120 wrote to memory of 60 3120 un697676.exe 96 PID 3120 wrote to memory of 60 3120 un697676.exe 96 PID 3120 wrote to memory of 60 3120 un697676.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\903027bc3e36bf09bc63a4a722e76d103d01bd20727e72227ac3ad54a09c462a.exe"C:\Users\Admin\AppData\Local\Temp\903027bc3e36bf09bc63a4a722e76d103d01bd20727e72227ac3ad54a09c462a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un697676.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un697676.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4847.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4847.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7232.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7232.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:60
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
545KB
MD5b2a7afca1063594f123db5c53fc3bd6b
SHA1360939c2beff8519ce0ce50853003cd9270f1747
SHA25626c866926e5d60d0abbdb1d0f31c57812147807c5fbb4f0507b9756e70c69a2e
SHA51230937a881baed39f6bb0c4188636e8c0724e8f774540a2d644764a3b282ec8210d83bd409f77092b50e401265a5c56f90ba5a8ad8ddcbe4a7ca341fcf9b913f0
-
Filesize
300KB
MD5c26db53190eea8f920be44e33e1ac8f2
SHA18dbdc17d2f917944cca79ffa4a24e51fd7b79f8d
SHA2564df3bab4c1741bbe1353ff254c7c1460a2cff547cf54071ee3b5be0509e5af6f
SHA5129bc4216ec65dd09e4a5ce8d3abca8a9abdf1b43344197ee3bf82e93dd537bfb66cbc244896b0983e47a6e3dba8f394790e5336e6dd78b73b31bd238851241014
-
Filesize
359KB
MD56f3b6b153825f927d02ecf1972935598
SHA1e5da35729f2da375dd1d0fa02934e44df406e776
SHA256d12281ba4f15d23e2eb456928fad9d1059e1e75de344231c92b54b6a5c23fc5b
SHA51255ea06f90c07bd623e8ce7a6fa0054efad16cfc721a782d03f9feb0c0e61a87037e48d0d10bfc03fc5b73da8ba8629b19615c508fe78a2e087ebb9afc0f597d9