Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
7b54b7661665843269a5421e0b547bb5c134f2aa2da974b28be3f4856c1569f1.exe
Resource
win10v2004-20241007-en
General
-
Target
7b54b7661665843269a5421e0b547bb5c134f2aa2da974b28be3f4856c1569f1.exe
-
Size
836KB
-
MD5
dc9aa38ffe6b2495c1e0b528d7221e5b
-
SHA1
ee7e7bf4f3062368171e2bfc520ee1b21525fb79
-
SHA256
7b54b7661665843269a5421e0b547bb5c134f2aa2da974b28be3f4856c1569f1
-
SHA512
27b23fdfe2e5faf1e4f20ab3e6d0bd2aac75465596558cec429490998a12d5578bdfb90a1c8f82a99550bec7aa38514c67ed3d7f5517ed3989057fc5b83bb34b
-
SSDEEP
12288:ZMrFy90rxEtz84XGKypjjqS9xiGx6cCPZvX/XfJGHTO3G7NNrunelzNQaCoQu9zE:cyy4WKhS9xiGiPZnfJ/mFeu9A
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000c000000023bb0-19.dat healer behavioral1/memory/4440-22-0x0000000000470000-0x000000000047A000-memory.dmp healer behavioral1/memory/4804-29-0x0000000002A00000-0x0000000002A1A000-memory.dmp healer behavioral1/memory/4804-31-0x0000000004F10000-0x0000000004F28000-memory.dmp healer behavioral1/memory/4804-32-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-43-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-59-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-57-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-55-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-53-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-51-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-49-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-47-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-45-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-41-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-39-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-37-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-35-0x0000000004F10000-0x0000000004F22000-memory.dmp healer behavioral1/memory/4804-33-0x0000000004F10000-0x0000000004F22000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu8741.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu8741.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu8741.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9114.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection qu8741.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu8741.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro9114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9114.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu8741.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3068-67-0x0000000004D50000-0x0000000004D96000-memory.dmp family_redline behavioral1/memory/3068-68-0x0000000004E20000-0x0000000004E64000-memory.dmp family_redline behavioral1/memory/3068-74-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-90-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-103-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-100-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-98-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-96-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-94-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-93-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-88-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-86-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-84-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-82-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-80-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-78-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-76-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-72-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-70-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline behavioral1/memory/3068-69-0x0000000004E20000-0x0000000004E5E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 3916 unio5237.exe 4776 unio5889.exe 4440 pro9114.exe 4804 qu8741.exe 3068 ryX90s03.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu8741.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9114.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu8741.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7b54b7661665843269a5421e0b547bb5c134f2aa2da974b28be3f4856c1569f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio5237.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio5889.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2016 4804 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio5237.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio5889.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8741.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ryX90s03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b54b7661665843269a5421e0b547bb5c134f2aa2da974b28be3f4856c1569f1.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4440 pro9114.exe 4440 pro9114.exe 4804 qu8741.exe 4804 qu8741.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4440 pro9114.exe Token: SeDebugPrivilege 4804 qu8741.exe Token: SeDebugPrivilege 3068 ryX90s03.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1244 wrote to memory of 3916 1244 7b54b7661665843269a5421e0b547bb5c134f2aa2da974b28be3f4856c1569f1.exe 83 PID 1244 wrote to memory of 3916 1244 7b54b7661665843269a5421e0b547bb5c134f2aa2da974b28be3f4856c1569f1.exe 83 PID 1244 wrote to memory of 3916 1244 7b54b7661665843269a5421e0b547bb5c134f2aa2da974b28be3f4856c1569f1.exe 83 PID 3916 wrote to memory of 4776 3916 unio5237.exe 84 PID 3916 wrote to memory of 4776 3916 unio5237.exe 84 PID 3916 wrote to memory of 4776 3916 unio5237.exe 84 PID 4776 wrote to memory of 4440 4776 unio5889.exe 85 PID 4776 wrote to memory of 4440 4776 unio5889.exe 85 PID 4776 wrote to memory of 4804 4776 unio5889.exe 95 PID 4776 wrote to memory of 4804 4776 unio5889.exe 95 PID 4776 wrote to memory of 4804 4776 unio5889.exe 95 PID 3916 wrote to memory of 3068 3916 unio5237.exe 100 PID 3916 wrote to memory of 3068 3916 unio5237.exe 100 PID 3916 wrote to memory of 3068 3916 unio5237.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b54b7661665843269a5421e0b547bb5c134f2aa2da974b28be3f4856c1569f1.exe"C:\Users\Admin\AppData\Local\Temp\7b54b7661665843269a5421e0b547bb5c134f2aa2da974b28be3f4856c1569f1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5237.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio5237.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5889.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio5889.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro9114.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro9114.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8741.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu8741.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 11045⤵
- Program crash
PID:2016
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ryX90s03.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ryX90s03.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4804 -ip 48041⤵PID:3164
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
694KB
MD55a4595b09dc1896a1c4f2a132758f10b
SHA1b8797523afc0670189fc962b5dae2423f4c4121e
SHA256e09974fbaa71db51e5decefb80d47fee13f310a045fd26c571b0eb5ac2c0e3b1
SHA512a4ed19df724248e4d52ded06947b6988ad08218de40c55330e007d3f6500b60053da680b2e0f144d430a89e81cf273c8e7ae814d88c8c5a4d5cf816360fcd48b
-
Filesize
361KB
MD5233f2c3cd0d62fb66afa49870f474286
SHA1a9929e81261c4f63bb7efb97a4ee9ec100ce6c33
SHA25610ca5dc88289863e9230df4cc0fd64fb87e724645b8cbdd08ca703c7a42f5a97
SHA5127a07be8294f5d01d53a2bc6efb26dd395737152f7ec2ce44734fabba362c124ddb15e70a7681e5e00675b66badf8b185fc6e57e456926d105c12fe4f2a2fb187
-
Filesize
344KB
MD52c847e0ae135066ad5c240d52992830c
SHA1d6f4a490e7c2eb88989fd1162b9ede059fc34575
SHA2560785033d11cb96d12546547b143833e4e8dc8edb48f51e14cdd2de43156ef984
SHA512a4377147ee902843b0e890e909512c49a8d6e8620cadd862563892390225983fb8a1dc622031d8494bb0e9ed1ae00fd2091a17cf0a0a5afe88f455c812ebc9ca
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
304KB
MD56ef2e44ec40a7e2959e3c12e2621a78f
SHA1babb11219369233abb217b62dd0f35e3118e2ddf
SHA25625eafddac1a098164ac6af65702059f20eab866677163cb43f51e953f9cc44d2
SHA5122e9fac146123daff6055c560151b0e55c26563bd8ae964c4492d30178efb6cc56831bc0da5ce031c0a2b33545f105120792ff194a8384d2f522d6c99ea2ce2da