Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
8467771ebfed596b9806da69302746132cbc13fccffa820528600a0d80257e7d.exe
Resource
win10v2004-20241007-en
General
-
Target
8467771ebfed596b9806da69302746132cbc13fccffa820528600a0d80257e7d.exe
-
Size
660KB
-
MD5
ab5a6b7f9a4fbfd52c53a0e62a188ee6
-
SHA1
163a6b05da0fcdb1b340770cbc8c7f727d2dca80
-
SHA256
8467771ebfed596b9806da69302746132cbc13fccffa820528600a0d80257e7d
-
SHA512
10b04e34530150b23b1f04f8ffae939ad38b4002447a0c666d24caccfc042e7be23c51775eceb5a0027391d4c9445b6df6c0222332fdc6542dad0d787e7a540d
-
SSDEEP
12288:jMray90HYFwoNecQYzh4m5fxlUlvV1abzMpBQat59KrwXH+CbYGft/juW/yvDER:ZydDrFyaOGbat5EAHPbLBWvDER
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/832-17-0x0000000002320000-0x000000000233A000-memory.dmp healer behavioral1/memory/832-19-0x0000000002440000-0x0000000002458000-memory.dmp healer behavioral1/memory/832-38-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-47-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-45-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-41-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-39-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-35-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-33-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-31-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-29-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-27-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-26-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-23-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-21-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-20-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/832-43-0x0000000002440000-0x0000000002452000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1821.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1821.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4188-55-0x00000000022F0000-0x0000000002336000-memory.dmp family_redline behavioral1/memory/4188-56-0x0000000002760000-0x00000000027A4000-memory.dmp family_redline behavioral1/memory/4188-80-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-84-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-90-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-88-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-86-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-82-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-78-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-76-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-72-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-70-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-68-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-66-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-64-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-62-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-74-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-60-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-58-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4188-57-0x0000000002760000-0x000000000279F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4268 un566230.exe 832 pro1821.exe 4188 qu9127.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1821.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1821.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un566230.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8467771ebfed596b9806da69302746132cbc13fccffa820528600a0d80257e7d.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5644 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4596 832 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8467771ebfed596b9806da69302746132cbc13fccffa820528600a0d80257e7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un566230.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1821.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9127.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 832 pro1821.exe 832 pro1821.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 832 pro1821.exe Token: SeDebugPrivilege 4188 qu9127.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4560 wrote to memory of 4268 4560 8467771ebfed596b9806da69302746132cbc13fccffa820528600a0d80257e7d.exe 83 PID 4560 wrote to memory of 4268 4560 8467771ebfed596b9806da69302746132cbc13fccffa820528600a0d80257e7d.exe 83 PID 4560 wrote to memory of 4268 4560 8467771ebfed596b9806da69302746132cbc13fccffa820528600a0d80257e7d.exe 83 PID 4268 wrote to memory of 832 4268 un566230.exe 85 PID 4268 wrote to memory of 832 4268 un566230.exe 85 PID 4268 wrote to memory of 832 4268 un566230.exe 85 PID 4268 wrote to memory of 4188 4268 un566230.exe 99 PID 4268 wrote to memory of 4188 4268 un566230.exe 99 PID 4268 wrote to memory of 4188 4268 un566230.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8467771ebfed596b9806da69302746132cbc13fccffa820528600a0d80257e7d.exe"C:\Users\Admin\AppData\Local\Temp\8467771ebfed596b9806da69302746132cbc13fccffa820528600a0d80257e7d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un566230.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un566230.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1821.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1821.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 832 -s 10524⤵
- Program crash
PID:4596
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9127.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9127.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 832 -ip 8321⤵PID:3984
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5644
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5389fb4efe5d1142e2df0886a93e8a05e
SHA1dfc524046fa0b4fa836af18247d0b2ddedb5352d
SHA256972d3a6c2e903f4dba5cba0932359d7bb6cf72623098d478f10ba19b184a549f
SHA512723bb54304bf0bed009c24a07fab77c549e2021bae9cab179c33a25abf5f87bb5be5c79073edcb1fe93a42394016a79fe947bcb7b292acca3491898bf6515801
-
Filesize
237KB
MD5963d55d710ee057a439dcfd7c194c7ac
SHA1c4f70d2b5b5e91a8b69035c6067b0a7d8d3427bf
SHA2569f226845d78f73a28213488dc1f855664071d8a4de5b4283f9508869dcd30ae2
SHA5120934444dfb3a6bc9135f2077742f3c4e46371863ad684f7540e27a4ea82a84034b989964ddcb94d88691157d0d2eeec76f55caeefa269f745679153951bb6a74
-
Filesize
295KB
MD5bb454563cbef81e447be82944f1d1127
SHA1e260a0e490c4889ea642c05eabfb905f56eb2a8f
SHA25674b23f50a4a4ac3c643093a721ff8dbaa2fab3e1d2f629ac5e070b31edb20ef2
SHA51234b8ae0640362f1e6768bfe0959de5492ca6ec238fed3a9b9236427f1df27d116ae2ccd28b98597676304dc7d5b632b15c4b62a9dda2e4a2d8ee398180973493