Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:40
Static task
static1
Behavioral task
behavioral1
Sample
4e5dd22472015897a44e9c00f8b1753c2319e290176a51536e53ab4517cdb9f7.exe
Resource
win10v2004-20241007-en
General
-
Target
4e5dd22472015897a44e9c00f8b1753c2319e290176a51536e53ab4517cdb9f7.exe
-
Size
688KB
-
MD5
4a6dc18d904552b4a19a325897cf6e5f
-
SHA1
bf8bdef6246febf98524dab8ce9045a76939f11f
-
SHA256
4e5dd22472015897a44e9c00f8b1753c2319e290176a51536e53ab4517cdb9f7
-
SHA512
fb9f706bc0e79163056771607177019f97f9d7794b348865b1cf0aae9aba30f6f9d22ff15a1dac9328b24cfa3e387d087b3135b6f88fe8459f73a76094b4dc56
-
SSDEEP
12288:YMrGy90dlGQusSaOzAQqOmKXILmVmNaxwRWz43xaYMwKbFwhWRLg4sJ:uywdZSaF/KDmN4Ye4hJMpqhWJe
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/852-18-0x0000000004A70000-0x0000000004A8A000-memory.dmp healer behavioral1/memory/852-20-0x0000000007830000-0x0000000007848000-memory.dmp healer behavioral1/memory/852-40-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-48-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-46-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-44-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-42-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-36-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-34-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-32-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-30-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-28-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-26-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-24-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-22-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-21-0x0000000007830000-0x0000000007842000-memory.dmp healer behavioral1/memory/852-38-0x0000000007830000-0x0000000007842000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4479.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4479.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4479.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4479.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4479.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4479.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2236-60-0x00000000070A0000-0x00000000070E6000-memory.dmp family_redline behavioral1/memory/2236-61-0x0000000007720000-0x0000000007764000-memory.dmp family_redline behavioral1/memory/2236-77-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-91-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-95-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-93-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-89-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-87-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-85-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-83-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-81-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-79-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-75-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-73-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-71-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-69-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-67-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-63-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-65-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2236-62-0x0000000007720000-0x000000000775F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 5024 unio8301.exe 852 pro4479.exe 2236 qu3474.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4479.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4479.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio8301.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4e5dd22472015897a44e9c00f8b1753c2319e290176a51536e53ab4517cdb9f7.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4360 852 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e5dd22472015897a44e9c00f8b1753c2319e290176a51536e53ab4517cdb9f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio8301.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4479.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3474.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 852 pro4479.exe 852 pro4479.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 852 pro4479.exe Token: SeDebugPrivilege 2236 qu3474.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2356 wrote to memory of 5024 2356 4e5dd22472015897a44e9c00f8b1753c2319e290176a51536e53ab4517cdb9f7.exe 83 PID 2356 wrote to memory of 5024 2356 4e5dd22472015897a44e9c00f8b1753c2319e290176a51536e53ab4517cdb9f7.exe 83 PID 2356 wrote to memory of 5024 2356 4e5dd22472015897a44e9c00f8b1753c2319e290176a51536e53ab4517cdb9f7.exe 83 PID 5024 wrote to memory of 852 5024 unio8301.exe 84 PID 5024 wrote to memory of 852 5024 unio8301.exe 84 PID 5024 wrote to memory of 852 5024 unio8301.exe 84 PID 5024 wrote to memory of 2236 5024 unio8301.exe 95 PID 5024 wrote to memory of 2236 5024 unio8301.exe 95 PID 5024 wrote to memory of 2236 5024 unio8301.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e5dd22472015897a44e9c00f8b1753c2319e290176a51536e53ab4517cdb9f7.exe"C:\Users\Admin\AppData\Local\Temp\4e5dd22472015897a44e9c00f8b1753c2319e290176a51536e53ab4517cdb9f7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8301.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8301.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4479.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4479.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 10844⤵
- Program crash
PID:4360
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3474.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3474.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 852 -ip 8521⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
546KB
MD5195491e94afd1aba23307ee126ca902d
SHA1bcf83c4e3396515d62abb2907957bd8701d3d346
SHA256e1ebc6646ecd65400badaf1dc988bd62d68ea75e9da6b332c87e86e2867dd333
SHA5124551eabb83df5e55bd0802763b0d329cf128e61ad9837ba1012b2917674d473e98f25c449af1f68f34a406f1da2043cb840046ac27125a81cf3e333913b81b9f
-
Filesize
329KB
MD53baf6fbc1f08ffc6c5161129fbbdcd84
SHA1bcbaa3b7eaa8b962d1ecd366877fc23e923b7c82
SHA25688cd012b1b3338754bad14ede94182e5e6cb74e40f5142082874237c7bcadb0f
SHA5120ff9dd9ba3e64ad481ef4f97dde36f5880ddadaaabcbde55561e7f63077f5db0a93f2b230c1c6961956be303562142cba68b643988db53ee261f294a2bbcaef6
-
Filesize
386KB
MD5aebb3f11a069276d7567165e9b558537
SHA1523ce23bc064e8016fa18e44b639129aa310bdeb
SHA256aef85c429b207792438598b9792f1805d61f523499a53784e2b3c924b9e2673e
SHA512f3ea04d798c7b8ec9f2c9cfe4efb40124e242bbf983385e8eccff8422f5410d90d1e02561943668efa3f97fcae2eb5efcc8f27034d1bb9317ca5b08233010dca