Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf.exe
Resource
win10v2004-20241007-en
General
-
Target
058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf.exe
-
Size
974KB
-
MD5
e383859975f044fd4bc9efaff8ef1a0d
-
SHA1
e7c0b827f75f1e91d88164e4b85ef58b622f7fe5
-
SHA256
058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf
-
SHA512
c2d68dfcc97fd77b1a477aac2e114ab36a9ef10c2febd35aa1af65425ea6e43b239719baa3a8722405f544f1d910ccf429936459ecb7d31fb8ffa14b68a3ecb1
-
SSDEEP
24576:oyzNV9j29B0juCZOA/FoHAgrtUEgu4Ir6rqt7zaG:vBH29B0juCZHbgxku4Iraqtna
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2800-29-0x00000000022C0000-0x00000000022DA000-memory.dmp healer behavioral1/memory/2800-31-0x0000000004C50000-0x0000000004C68000-memory.dmp healer behavioral1/memory/2800-59-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-57-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-56-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-53-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-51-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-49-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-47-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-45-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-43-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-41-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-39-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-37-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-35-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-33-0x0000000004C50000-0x0000000004C62000-memory.dmp healer behavioral1/memory/2800-32-0x0000000004C50000-0x0000000004C62000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" aJY03Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" aJY03Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" aJY03Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" aJY03Ve.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection aJY03Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" aJY03Ve.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1724-67-0x0000000002710000-0x0000000002756000-memory.dmp family_redline behavioral1/memory/1724-68-0x0000000002790000-0x00000000027D4000-memory.dmp family_redline behavioral1/memory/1724-76-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-82-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-102-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-100-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-96-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-92-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-90-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-88-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-86-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-85-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-80-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-78-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-74-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-72-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-98-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-94-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-70-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline behavioral1/memory/1724-69-0x0000000002790000-0x00000000027CE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 396 nuY68qe.exe 3396 nic17UQ.exe 2688 nlD35pO.exe 2800 aJY03Ve.exe 1724 bIM77sr.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features aJY03Ve.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" aJY03Ve.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nuY68qe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nic17UQ.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" nlD35pO.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 368 2800 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlD35pO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aJY03Ve.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bIM77sr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nuY68qe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nic17UQ.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2800 aJY03Ve.exe 2800 aJY03Ve.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2800 aJY03Ve.exe Token: SeDebugPrivilege 1724 bIM77sr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3668 wrote to memory of 396 3668 058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf.exe 83 PID 3668 wrote to memory of 396 3668 058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf.exe 83 PID 3668 wrote to memory of 396 3668 058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf.exe 83 PID 396 wrote to memory of 3396 396 nuY68qe.exe 84 PID 396 wrote to memory of 3396 396 nuY68qe.exe 84 PID 396 wrote to memory of 3396 396 nuY68qe.exe 84 PID 3396 wrote to memory of 2688 3396 nic17UQ.exe 85 PID 3396 wrote to memory of 2688 3396 nic17UQ.exe 85 PID 3396 wrote to memory of 2688 3396 nic17UQ.exe 85 PID 2688 wrote to memory of 2800 2688 nlD35pO.exe 87 PID 2688 wrote to memory of 2800 2688 nlD35pO.exe 87 PID 2688 wrote to memory of 2800 2688 nlD35pO.exe 87 PID 2688 wrote to memory of 1724 2688 nlD35pO.exe 97 PID 2688 wrote to memory of 1724 2688 nlD35pO.exe 97 PID 2688 wrote to memory of 1724 2688 nlD35pO.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf.exe"C:\Users\Admin\AppData\Local\Temp\058034951c6ea5987018e99d4e708ebaa20db01722a78559674d7da90ce27fdf.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nuY68qe.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nuY68qe.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nic17UQ.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nic17UQ.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nlD35pO.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nlD35pO.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\aJY03Ve.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\aJY03Ve.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 10806⤵
- Program crash
PID:368
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bIM77sr.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bIM77sr.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2800 -ip 28001⤵PID:1488
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
787KB
MD55a98c17bb5f504cb9ccfad2f552c9c3b
SHA18b4f83afcbc0ac3202394139084dfc48b97bdb8d
SHA2563e832012237ac14c497b818670aaa644cde7cadf7464b27cf3f9d384ac5b4b40
SHA5120c3833e0e6b51ba11a29900a2a11ac5ad8f3aef74b84db8553de7868da2cf209403eb2316d91a649800c6bfbd310c4e7bc9338f757d95e72477c322cdab062e2
-
Filesize
642KB
MD59c1a5f8ddc8f6e26cefb816db9d3abb4
SHA1908622ff32a0fc27032f01ea7c95b9811da62783
SHA256a26dd2c762728d313edf75949bf5449ff2f1a39acbd9665289b20faa5688ba40
SHA5129e70ac3e400649bf0b0f8054cbe98257a9c3d6024708b77540aee5cf3764a814ca90714dbb354e1d87d18acc539505909c5229e3ae5c7e6ded5ce7c8be753657
-
Filesize
539KB
MD567f6021281eca801b37e7b41f138c85c
SHA1b5e8fedd357379e7956e6bd170bb41a2379f5376
SHA256d85c5e6fa3b031ab87b9691dbc5526792f8c3d0e4923c2ad5b2cf816d8ffd018
SHA51288086be475b301279f762e9e841afc48a5ecc9088525359c511513efb80e74ee77743515ddb883df2ce2887a5fbbff7ab934152198949062b5e8aa9ffb114977
-
Filesize
255KB
MD53c0da2b6de2adb899e51f79c7e6a8579
SHA1b3a1bd853d755194038feec5858b81afae5531fe
SHA256f373a90de0291631dcd1d0980db491695c2ddee66281890b2a86184b6120b458
SHA5123881b38bdf3753f33836d936d1808d7ce5ba89702fe3ad7f6260f22594daa050cff1c467b4bd064276bb2d18dd24b644c6f21b6a20cc6fcc33e53f908c92fb5a
-
Filesize
314KB
MD52d118ac5db60c0958003174567c06dca
SHA1e4ef705db00c24b4fb0c01290e5c2b3dc4d237be
SHA2566e8f687bbab68864efc5cf0e3b9f28feeeffec164dadfb920906e72444319ea8
SHA512bd3df4182c769f54cca01e45cf003c13c61ea4e525382d445bd2aecffde5f26a06f547ff200f983f0f5df5bdadda46f4499aff916c6d16165c3703dd92f65060