Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71.exe
Resource
win10v2004-20241007-en
General
-
Target
74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71.exe
-
Size
673KB
-
MD5
2ca5ef90d7f03feaa362389fd6a570cb
-
SHA1
f5c62870b88cc71019ee0bbbb9f2630311bdab3f
-
SHA256
74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71
-
SHA512
97471ff0b6ac412deb8ceefeb05dc10d28cd1a7c5b449da32a68b3474801b90523f51ce44c1336436c00fc669ce449350f55712ffa4f6a24f2a4282120be10c1
-
SSDEEP
12288:EMr7y90mz8xC7zmsX/pU+uST42MnFhws02mG4xuWGOKxIh8LF:XyrGCJBtuST424mGmu90Gx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1384-19-0x0000000002290000-0x00000000022AA000-memory.dmp healer behavioral1/memory/1384-21-0x0000000004A80000-0x0000000004A98000-memory.dmp healer behavioral1/memory/1384-37-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-49-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-47-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-45-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-43-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-41-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-39-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-35-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-33-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-31-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-29-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-27-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-25-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-23-0x0000000004A80000-0x0000000004A92000-memory.dmp healer behavioral1/memory/1384-22-0x0000000004A80000-0x0000000004A92000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4677.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1488-61-0x00000000022D0000-0x0000000002316000-memory.dmp family_redline behavioral1/memory/1488-62-0x0000000004AE0000-0x0000000004B24000-memory.dmp family_redline behavioral1/memory/1488-76-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-74-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-96-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-94-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-90-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-88-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-86-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-84-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-80-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-78-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-72-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-70-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-68-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-66-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-92-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-82-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-64-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1488-63-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3460 un849767.exe 1384 pro4677.exe 1488 qu9891.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4677.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un849767.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1952 1384 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un849767.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4677.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9891.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1384 pro4677.exe 1384 pro4677.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1384 pro4677.exe Token: SeDebugPrivilege 1488 qu9891.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5028 wrote to memory of 3460 5028 74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71.exe 83 PID 5028 wrote to memory of 3460 5028 74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71.exe 83 PID 5028 wrote to memory of 3460 5028 74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71.exe 83 PID 3460 wrote to memory of 1384 3460 un849767.exe 84 PID 3460 wrote to memory of 1384 3460 un849767.exe 84 PID 3460 wrote to memory of 1384 3460 un849767.exe 84 PID 3460 wrote to memory of 1488 3460 un849767.exe 96 PID 3460 wrote to memory of 1488 3460 un849767.exe 96 PID 3460 wrote to memory of 1488 3460 un849767.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71.exe"C:\Users\Admin\AppData\Local\Temp\74c3adca35db4140ff1763783e99e8fb6a93005d998482d2424e282a63980d71.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un849767.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un849767.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4677.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4677.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 10844⤵
- Program crash
PID:1952
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9891.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9891.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1384 -ip 13841⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD539e4b9af3a056e9b84e0cec8ae394e3e
SHA181ee3f54eb058a434efb6bbfb55fbb27a099f453
SHA25610ee2762182d79b1abc48cf8602932425493a5f988ec32fe02dc7327f43feb44
SHA51271cbfbc4f4868cd1d5e5a1c96fde3cd50e2a6bdbab48348bcb38d02e3c139cb1e099738265aaf914ffe1fa54bfa9ba34c8e1953c5622ec8a436d1c3e30934e54
-
Filesize
260KB
MD51f8491a136dad7d3f77f902cb7dd34c1
SHA11e6a8c8f96ef63364af2aa1a948b3086f720beb1
SHA256b476a9f3f01c317ac18361ed30716d0fbd229f6f8e926bb4e2f578ca88b73851
SHA51231029f68a7fbc348e0d128c399c56246668b2a7179f4dfcd9edbade87d313f9b09ebde108170e6875ce9402d3b38fa26974b812fb07bec1ffe59307211a13eec
-
Filesize
319KB
MD529dbf01e2ceacccff876f8f95389c8f5
SHA14f6bb26614acd6a56785b9f17ce25c3c5b703e13
SHA2566c76024929ccb177a2f2dbf48af4ee70524089055f70c821c50034323553e57f
SHA51250a96a6bd6901f37f8e3c3d1a5c3ca43aecdad830f34c6bb158f83843cf56e0b8bbc84a954f26bd758c7c75353f05ccb4884d2d6467d59c0055953ae764008c0