Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
a026766f423af3b3e0cdc4e79eca3380c421fc0f2bc78a4335b5497deb9e598f.exe
Resource
win10v2004-20241007-en
General
-
Target
a026766f423af3b3e0cdc4e79eca3380c421fc0f2bc78a4335b5497deb9e598f.exe
-
Size
689KB
-
MD5
190ab995e582da87e0e0752c3d973b24
-
SHA1
be56b18b3e12a889d16aba5a96b8806c949994ea
-
SHA256
a026766f423af3b3e0cdc4e79eca3380c421fc0f2bc78a4335b5497deb9e598f
-
SHA512
01caa3ff93882a80a8eeb7653361b2d435af70f6b716e0dff9f7988273c20cd03127376c445cb932f8bec31976f591b301fd574aaa84c8293076a6e3dee5f53b
-
SSDEEP
12288:NMr0y90ilvz4WXjgMvmtVzzGqIiVVmOTSxniygaGkQVEq843x9YMSKblPRugA:NyRlv0WXcMvmtoum/xniHHZ84h2Mf5JO
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2012-18-0x0000000004840000-0x000000000485A000-memory.dmp healer behavioral1/memory/2012-20-0x0000000004910000-0x0000000004928000-memory.dmp healer behavioral1/memory/2012-48-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-46-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-44-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-42-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-40-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-38-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-37-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-34-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-33-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-30-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-28-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-26-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-24-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-22-0x0000000004910000-0x0000000004922000-memory.dmp healer behavioral1/memory/2012-21-0x0000000004910000-0x0000000004922000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9313.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9313.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9313.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9313.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9313.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9313.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/5020-60-0x0000000004C90000-0x0000000004CD6000-memory.dmp family_redline behavioral1/memory/5020-61-0x00000000071A0000-0x00000000071E4000-memory.dmp family_redline behavioral1/memory/5020-85-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-79-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-95-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-91-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-89-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-87-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-83-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-82-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-93-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-77-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-75-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-73-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-71-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-69-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-67-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-65-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-63-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/5020-62-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2344 unio3537.exe 2012 pro9313.exe 5020 qu1928.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9313.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9313.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a026766f423af3b3e0cdc4e79eca3380c421fc0f2bc78a4335b5497deb9e598f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio3537.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4104 2012 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a026766f423af3b3e0cdc4e79eca3380c421fc0f2bc78a4335b5497deb9e598f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio3537.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9313.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1928.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2012 pro9313.exe 2012 pro9313.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2012 pro9313.exe Token: SeDebugPrivilege 5020 qu1928.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3460 wrote to memory of 2344 3460 a026766f423af3b3e0cdc4e79eca3380c421fc0f2bc78a4335b5497deb9e598f.exe 83 PID 3460 wrote to memory of 2344 3460 a026766f423af3b3e0cdc4e79eca3380c421fc0f2bc78a4335b5497deb9e598f.exe 83 PID 3460 wrote to memory of 2344 3460 a026766f423af3b3e0cdc4e79eca3380c421fc0f2bc78a4335b5497deb9e598f.exe 83 PID 2344 wrote to memory of 2012 2344 unio3537.exe 84 PID 2344 wrote to memory of 2012 2344 unio3537.exe 84 PID 2344 wrote to memory of 2012 2344 unio3537.exe 84 PID 2344 wrote to memory of 5020 2344 unio3537.exe 99 PID 2344 wrote to memory of 5020 2344 unio3537.exe 99 PID 2344 wrote to memory of 5020 2344 unio3537.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\a026766f423af3b3e0cdc4e79eca3380c421fc0f2bc78a4335b5497deb9e598f.exe"C:\Users\Admin\AppData\Local\Temp\a026766f423af3b3e0cdc4e79eca3380c421fc0f2bc78a4335b5497deb9e598f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio3537.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio3537.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9313.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9313.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2012 -s 10404⤵
- Program crash
PID:4104
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1928.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1928.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2012 -ip 20121⤵PID:4100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5db6bc4f9fab1b62c6399c7833b823faf
SHA1de0d524177ac62d1aa0580fe1bdd7d4a95c198fe
SHA256296e0da2df9169c2f4bda2448eac3060886f4b97068a0b0cdd9764202f0d09e0
SHA512a830a04e7ad86428c8d57d020d734674c0456c95660e4aed297a0deb6139a2f4b905690a9402c51cf4455ed96f7164ef7f1593b17db5fd7b63ad9513bc6c0a44
-
Filesize
329KB
MD53726ee3edb8e765b548f8aa0ec022260
SHA1aea8d2f8080c5047888eee8217bf77de873a5140
SHA256758ab55449771321cfbab28ab8c991cdc11d50d57fabd4a51692eb556c555436
SHA5121bb2a3a1b0f56842a8b70e576fe739e79e078eaefac1ef5c3a030d32fb55ea683e1cb07b8a5e8cc52e9a6e0fdd9867cae16a1ec16c05b549bdc6f4a04b56d1d5
-
Filesize
386KB
MD5af70871c5c84242238e147fd16e974ee
SHA16bea49bdf7aa72f94f6285e91e5e93e11ca93fda
SHA256699adb91f64d9f2be1ab44e89fb74d33b40b260dfd80e3604777beacf49922a9
SHA51274470e543c51344867c3f70afeac91eee1afa9ade818130ed107fe837ea93de2a8a3ad47bb710426a2a1b9b0cc44da2d7f7c002c7c2cdf340f0cfa22361c2552