Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:19
Static task
static1
Behavioral task
behavioral1
Sample
e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935.exe
Resource
win10v2004-20241007-en
General
-
Target
e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935.exe
-
Size
689KB
-
MD5
a234ed005f2f4082febf9a114c087ed2
-
SHA1
470d0751c959f5dc821351ccb9f750faeadbd75e
-
SHA256
e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935
-
SHA512
334bc8787264e2f7652ceb800218cad5fa7814fced2b59a174daf96bc4ece4f6d924ff51bab5c43b8b180fe81c6bbe87fa1158815969aef9d0c16df30210b59a
-
SSDEEP
12288:/Mr0y90tuNFCwlBQZw6qOnIUVVm09SspVGlyaqPM43xrYM6KbwxItlf+IpRC1:nyHlBeXqOxmJsDwyX04hUM30xa32
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4984-17-0x0000000004A10000-0x0000000004A2A000-memory.dmp healer behavioral1/memory/4984-20-0x0000000004BC0000-0x0000000004BD8000-memory.dmp healer behavioral1/memory/4984-24-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-48-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-46-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-44-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-42-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-41-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-38-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-36-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-34-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-33-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-30-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-28-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-26-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-22-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer behavioral1/memory/4984-21-0x0000000004BC0000-0x0000000004BD2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3774.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2068-59-0x00000000047B0000-0x00000000047F6000-memory.dmp family_redline behavioral1/memory/2068-60-0x00000000071A0000-0x00000000071E4000-memory.dmp family_redline behavioral1/memory/2068-76-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-94-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-92-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-90-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-88-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-86-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-84-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-82-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-80-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-78-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-74-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-72-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-70-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-68-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-66-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-64-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-62-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2068-61-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3188 unio9445.exe 4984 pro3774.exe 2068 qu4606.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3774.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio9445.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1784 4984 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio9445.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3774.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4606.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4984 pro3774.exe 4984 pro3774.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4984 pro3774.exe Token: SeDebugPrivilege 2068 qu4606.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3052 wrote to memory of 3188 3052 e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935.exe 84 PID 3052 wrote to memory of 3188 3052 e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935.exe 84 PID 3052 wrote to memory of 3188 3052 e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935.exe 84 PID 3188 wrote to memory of 4984 3188 unio9445.exe 85 PID 3188 wrote to memory of 4984 3188 unio9445.exe 85 PID 3188 wrote to memory of 4984 3188 unio9445.exe 85 PID 3188 wrote to memory of 2068 3188 unio9445.exe 95 PID 3188 wrote to memory of 2068 3188 unio9445.exe 95 PID 3188 wrote to memory of 2068 3188 unio9445.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935.exe"C:\Users\Admin\AppData\Local\Temp\e69733d933cd9a6dfa13f19909d205a61cbb823ed278fd835d80792ffe744935.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9445.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio9445.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3774.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3774.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 11004⤵
- Program crash
PID:1784
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4606.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4606.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4984 -ip 49841⤵PID:3940
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD581d98a10185c35914074937bb77ad290
SHA1225879acd53b7d6b169a5bb82d48a81972fe7bcb
SHA256050acae70d22fbb2f0969ea8f110d66deb4f91a575a3684d8825c8881707c34e
SHA512cd281989b2cf8fc97efa8ad1d33d8aaa77675c11489da64499671bb8cc78987d9edc6baa84fabc8fd20e8b8152efce7ed2357c5784eebb178bd0d9fd08b4c905
-
Filesize
329KB
MD5146a37b5eee7d2d5cbecb59c7687f533
SHA147f69f6abb9a82c6428e116d91190a96670e2d23
SHA256f50f1db4d8a9f42e3e645c475b5f9d60e38cd9ce6434e1460afa34af08edfef1
SHA5120e34f7b9ea4b5d882af644b3608b6412e2652579f9c62c8de524b6ff9c62bf56f261d180a05d5eecaba2e108c2cc4df49d19222c5944081d9cacccdcbd02dd72
-
Filesize
386KB
MD5dfa878720f6eeab84c54da527dafaf1b
SHA1ba58bfede1087ff2e08b42b5f8ef2c18af8c94c9
SHA256c8208f25218f11cbeac08b87fa7c2e71578ad077d79dfd2537d3783645c2baa0
SHA512b23f77ac9ce7c52211a571451d954a15548d6c36032b0ac8d2716a1246fd9ce2f634590fd4e666355969ad375ecda2a5e78779a7415680aefc860f95491e721d