Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
9938b685023ab3dae6da2e77e77b5bff657da0f3e0dcf9e9b68554ba1ea340f3.exe
Resource
win10v2004-20241007-en
General
-
Target
9938b685023ab3dae6da2e77e77b5bff657da0f3e0dcf9e9b68554ba1ea340f3.exe
-
Size
657KB
-
MD5
49b31ff17906903788348b2cdbaa3136
-
SHA1
04be267a80cb88e32744da10f600198c12e1d75b
-
SHA256
9938b685023ab3dae6da2e77e77b5bff657da0f3e0dcf9e9b68554ba1ea340f3
-
SHA512
d08199aae7000037ccc8fb38d61f567e92457029fc16e12ac1156c803e258457767eb92afe71bfc5791a9e26b0462a2be29380df4305d52a22d530a38cb4d871
-
SSDEEP
12288:2Mryy90qj/MjeTo06auaytEjSvBYa7S0qTl706B+EVZxO/Wn1sHt:gyDj/ASNckoB9i06+EVzvsHt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4180-18-0x00000000048D0000-0x00000000048EA000-memory.dmp healer behavioral1/memory/4180-20-0x0000000004C20000-0x0000000004C38000-memory.dmp healer behavioral1/memory/4180-46-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-44-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-48-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-42-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-38-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-36-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-34-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-32-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-30-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-28-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-26-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-24-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-22-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-21-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/4180-40-0x0000000004C20000-0x0000000004C32000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2568.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2568.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2568.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2568.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2568.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2568.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3792-60-0x00000000070D0000-0x0000000007116000-memory.dmp family_redline behavioral1/memory/3792-61-0x0000000007780000-0x00000000077C4000-memory.dmp family_redline behavioral1/memory/3792-77-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-95-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-93-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-91-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-89-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-87-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-85-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-83-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-81-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-80-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-75-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-73-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-71-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-69-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-67-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-65-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-63-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/3792-62-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 444 un371457.exe 4180 pro2568.exe 3792 qu9631.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2568.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2568.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9938b685023ab3dae6da2e77e77b5bff657da0f3e0dcf9e9b68554ba1ea340f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un371457.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4156 4180 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9938b685023ab3dae6da2e77e77b5bff657da0f3e0dcf9e9b68554ba1ea340f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un371457.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2568.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9631.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4180 pro2568.exe 4180 pro2568.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4180 pro2568.exe Token: SeDebugPrivilege 3792 qu9631.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1472 wrote to memory of 444 1472 9938b685023ab3dae6da2e77e77b5bff657da0f3e0dcf9e9b68554ba1ea340f3.exe 83 PID 1472 wrote to memory of 444 1472 9938b685023ab3dae6da2e77e77b5bff657da0f3e0dcf9e9b68554ba1ea340f3.exe 83 PID 1472 wrote to memory of 444 1472 9938b685023ab3dae6da2e77e77b5bff657da0f3e0dcf9e9b68554ba1ea340f3.exe 83 PID 444 wrote to memory of 4180 444 un371457.exe 84 PID 444 wrote to memory of 4180 444 un371457.exe 84 PID 444 wrote to memory of 4180 444 un371457.exe 84 PID 444 wrote to memory of 3792 444 un371457.exe 98 PID 444 wrote to memory of 3792 444 un371457.exe 98 PID 444 wrote to memory of 3792 444 un371457.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\9938b685023ab3dae6da2e77e77b5bff657da0f3e0dcf9e9b68554ba1ea340f3.exe"C:\Users\Admin\AppData\Local\Temp\9938b685023ab3dae6da2e77e77b5bff657da0f3e0dcf9e9b68554ba1ea340f3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un371457.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un371457.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2568.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2568.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 10804⤵
- Program crash
PID:4156
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9631.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9631.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4180 -ip 41801⤵PID:4500
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515KB
MD52eac592cac52dad3ac47cf9d9ae9bbd2
SHA1bcd2aec5e28b31c3803a1d4eb4a2f969c5753c1e
SHA25641fc37cf22f4b7ab4a34e9bf26abc2f6998b2d0a5c8c30a45ae9c8ceb09cf659
SHA5129e3a2195c2e81e00499b37052b1a565d54c44869c1d6d71aa814ef528258a79af467e88ac922fc14c79dd2546c8724d455de717057238d11c1cc123333b693a9
-
Filesize
295KB
MD5c32c7e391fbf5f584e1d213224144cfc
SHA1195a4d372e73575b75be163e5c4e275fc0dea133
SHA256480842f05a0f9702de0fad56e7febff92a5cfec1adeda7ff7efbd2827330c00e
SHA51210d46131149f59f92b2cd0a9221cadbee0701072e58989c427938b0cfe3794bc3410a357a3eb9905d9dc3e07797ab4eda2039afff5e07216314aed3a054ef4ca
-
Filesize
354KB
MD58ca082ebc9a962f32ea6722e6f11b6d3
SHA12c2e0c6298ef1cee81b3c6b991689be5bcbfde0c
SHA256c683a8214b510331393e4e0d5fa4f5c7fd495d5030151a9d45ae577d852c5fb2
SHA512c1bc642c03de31d64c4c92ad8dffbbdf5895e08aff092fb8e2e707b0789c7bbcee0b89549160120e8163006997dd59d641f7645a69341c91c3357b6caf7f0eb7