Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:50
Static task
static1
Behavioral task
behavioral1
Sample
fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe
Resource
win10v2004-20241007-en
General
-
Target
fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe
-
Size
686KB
-
MD5
853d11ba9669b817fee51d64fc3f2287
-
SHA1
3b10d4bce1c5260f12bb7d60d5cc30a125d4799f
-
SHA256
fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8
-
SHA512
c9184ac193d5c36dadc17e22427b4f8bd7571e8aba61b4f141261498ae47bfd5ef37ca9c79537a3ed52906226714f4099fd343628ccbb749962b242d076e7c00
-
SSDEEP
12288:jMrvy90PiIRl+sHGX6yjC30R5qdKFMRREUKnuXt/7A:UyzIJHGRjC050WOREZuXl7A
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3200-18-0x0000000004820000-0x000000000483A000-memory.dmp healer behavioral1/memory/3200-20-0x0000000004C20000-0x0000000004C38000-memory.dmp healer behavioral1/memory/3200-22-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-48-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-46-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-44-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-42-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-40-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-38-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-36-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-34-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-32-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-30-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-28-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-26-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-24-0x0000000004C20000-0x0000000004C32000-memory.dmp healer behavioral1/memory/3200-21-0x0000000004C20000-0x0000000004C32000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7200.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7200.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2772-60-0x0000000004740000-0x0000000004786000-memory.dmp family_redline behavioral1/memory/2772-61-0x0000000004C00000-0x0000000004C44000-memory.dmp family_redline behavioral1/memory/2772-75-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-93-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-91-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-89-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-87-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-85-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-83-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-81-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-79-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-77-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-73-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-71-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-69-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-67-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-95-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-65-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-63-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2772-62-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3648 un953697.exe 3200 pro7200.exe 2772 qu9568.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7200.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un953697.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1432 3200 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un953697.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7200.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9568.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3200 pro7200.exe 3200 pro7200.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3200 pro7200.exe Token: SeDebugPrivilege 2772 qu9568.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2956 wrote to memory of 3648 2956 fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe 85 PID 2956 wrote to memory of 3648 2956 fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe 85 PID 2956 wrote to memory of 3648 2956 fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe 85 PID 3648 wrote to memory of 3200 3648 un953697.exe 86 PID 3648 wrote to memory of 3200 3648 un953697.exe 86 PID 3648 wrote to memory of 3200 3648 un953697.exe 86 PID 3648 wrote to memory of 2772 3648 un953697.exe 105 PID 3648 wrote to memory of 2772 3648 un953697.exe 105 PID 3648 wrote to memory of 2772 3648 un953697.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe"C:\Users\Admin\AppData\Local\Temp\fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953697.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953697.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7200.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7200.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 10604⤵
- Program crash
PID:1432
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9568.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9568.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3200 -ip 32001⤵PID:4044
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
545KB
MD5eb94dc1c5f4a530c0914bc31621e4a99
SHA119888fa757451d1e2832ba252a3a93c993851f22
SHA256b261dc7bbc328053f216c22b859cfe8ce73f04d8b27707c315eee12ea424e32e
SHA512c8b614da815358c807fd60308213c584c933418aa03648671918ba112ce9551b14f9a567e6b58f9e7ca113f544f1cf55c52004c2c2ec0564cf51f7b185b95fa1
-
Filesize
321KB
MD52009eaf3d589b5cc00e030555a9ef4e7
SHA1036750a9b52e32d3aed5f3f0fd0a2b03d3e3d471
SHA25683d1b1ee1990772e19cd001401ca731927b34fa724e24f5a606e9c4da2ada513
SHA51296ce39c6929e194f6bd196eed25f313ca6a652a0fcff39e99dbc010e0f53cea777e982779365b5e8e5b94bfba3f93f06a7653274164b6faf2404b233480bb429
-
Filesize
380KB
MD5b29f093898a4814600d5258782d91db2
SHA1661aae1232aaf987e39b8a603e2e5f715168af3b
SHA2567e910e74e1f857627d8cde1d2244793882c1a29dbbbe3528c355dfe569841b81
SHA5128cb848170ea09df9bebe958488ba85aec86d8f63fbecee94bea2db0c5bca86c5f3ddec966f1150ca9d2a9544b2fcb031ef1e94683217958f7a4039042e9ba800