Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
f6bd71b98910db5ad0f3d8e40e226235f8891b29dd60bb95995642ab221bcd78.exe
Resource
win10v2004-20241007-en
General
-
Target
f6bd71b98910db5ad0f3d8e40e226235f8891b29dd60bb95995642ab221bcd78.exe
-
Size
688KB
-
MD5
df3f8dd604dfa28fdef700878163714b
-
SHA1
4af600203d87ae4ebc26ab8e46debfab43728172
-
SHA256
f6bd71b98910db5ad0f3d8e40e226235f8891b29dd60bb95995642ab221bcd78
-
SHA512
9d716e3c724b2daa73e26ac5d65b3c9bf020ae0cca472a63a94dbb5705c03c3cf2de5e493869038d11dce3134d177c98cd5f9093084489feaa7801f7aa72a72b
-
SSDEEP
12288:0Mray903gkikJJ5ZtfqXkIlf2+tlkne5eBfrjvXgRMqsFIei/:OyOnikjJAkIlf2wH8BDDgRMlOe+
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3396-19-0x00000000029E0000-0x00000000029FA000-memory.dmp healer behavioral1/memory/3396-21-0x0000000002A00000-0x0000000002A18000-memory.dmp healer behavioral1/memory/3396-43-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-49-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-47-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-46-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-41-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-39-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-37-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-35-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-31-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-29-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-27-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-25-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-23-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-22-0x0000000002A00000-0x0000000002A12000-memory.dmp healer behavioral1/memory/3396-33-0x0000000002A00000-0x0000000002A12000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1417.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1417.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1568-61-0x00000000028C0000-0x0000000002906000-memory.dmp family_redline behavioral1/memory/1568-62-0x0000000002A90000-0x0000000002AD4000-memory.dmp family_redline behavioral1/memory/1568-68-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-76-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-96-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-94-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-92-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-90-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-86-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-84-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-82-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-81-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-74-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-72-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-70-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-88-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-78-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-66-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-64-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline behavioral1/memory/1568-63-0x0000000002A90000-0x0000000002ACF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2524 un665710.exe 3396 pro1417.exe 1568 qu9527.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1417.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1417.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f6bd71b98910db5ad0f3d8e40e226235f8891b29dd60bb95995642ab221bcd78.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un665710.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2328 3396 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9527.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6bd71b98910db5ad0f3d8e40e226235f8891b29dd60bb95995642ab221bcd78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un665710.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1417.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3396 pro1417.exe 3396 pro1417.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3396 pro1417.exe Token: SeDebugPrivilege 1568 qu9527.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 868 wrote to memory of 2524 868 f6bd71b98910db5ad0f3d8e40e226235f8891b29dd60bb95995642ab221bcd78.exe 84 PID 868 wrote to memory of 2524 868 f6bd71b98910db5ad0f3d8e40e226235f8891b29dd60bb95995642ab221bcd78.exe 84 PID 868 wrote to memory of 2524 868 f6bd71b98910db5ad0f3d8e40e226235f8891b29dd60bb95995642ab221bcd78.exe 84 PID 2524 wrote to memory of 3396 2524 un665710.exe 86 PID 2524 wrote to memory of 3396 2524 un665710.exe 86 PID 2524 wrote to memory of 3396 2524 un665710.exe 86 PID 2524 wrote to memory of 1568 2524 un665710.exe 95 PID 2524 wrote to memory of 1568 2524 un665710.exe 95 PID 2524 wrote to memory of 1568 2524 un665710.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6bd71b98910db5ad0f3d8e40e226235f8891b29dd60bb95995642ab221bcd78.exe"C:\Users\Admin\AppData\Local\Temp\f6bd71b98910db5ad0f3d8e40e226235f8891b29dd60bb95995642ab221bcd78.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un665710.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un665710.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1417.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1417.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3396 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3396 -s 10844⤵
- Program crash
PID:2328
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9527.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9527.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3396 -ip 33961⤵PID:4784
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
534KB
MD515953e20e6a9518e0554e247cb7c277a
SHA1fe86b491bab65a25a9e70d894c6f813125761b50
SHA25658fbd188de563de95f753fd77afd717db7a5441ee076deff31d52818ff19ec74
SHA512b6375057baa4c82ba6638be548181d08bcb7cd0880896b516c172295a63fe93ccf2d2831db705dee1e2fad6cbdc95b76d0fc9f95970037072dd48e4854296c8b
-
Filesize
311KB
MD5a18faf03845dfa7e7fd1b1a11e783c84
SHA1313974dc09fd65876ddf3bc245b9bc3d363371a2
SHA2568ac9724388c8e87d32a078f6dde78341dde20a79625bf36279da272f1748ca49
SHA512591ec8a41bcf749f288fc338b5a941a3408cb61c8bd97ae8da790a1f9b78bbdae78a8dac87867dbc64022baafac1258150602d8ff9f958e3148b991ef17f5e62
-
Filesize
370KB
MD599acb8f93c4047d6ce75716ca8ec4702
SHA14aa2408d87dc1f4f12cb65cfeb5dc9e5860e21c0
SHA25682201ee408f3a2c4f8623daf4f13b6e932e3f8ea63678520097e6848627d7f54
SHA5125973ddf4bff4febe8b35d6905d34f06b32471abfd9b9b60e53affbdca8ab23e44435f84c9b41f909701d7cc1a93d5619964e7b12f334ab1e73c4951c5e872e56