Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:52
Static task
static1
Behavioral task
behavioral1
Sample
e4c7044b76b1cc6fc3474c5decfce005d71f0ba024380149d6d69ccc63a80688.exe
Resource
win10v2004-20241007-en
General
-
Target
e4c7044b76b1cc6fc3474c5decfce005d71f0ba024380149d6d69ccc63a80688.exe
-
Size
689KB
-
MD5
c7c66ed87ee371fcf9ad28cc644e1a2c
-
SHA1
70fe57b73f929702d2dbe6dd82dc7c78717036f8
-
SHA256
e4c7044b76b1cc6fc3474c5decfce005d71f0ba024380149d6d69ccc63a80688
-
SHA512
7d2b60cbc58894f92f8df5a092d9c285f80e24f6c2ec3fd91a3c47af6c967a187c469a93b9ef2687b3618a1ab6328b398e556f6bf7952e32070bf8d3d0ef0f50
-
SSDEEP
12288:vMrWy90q1H5BGVldGZXXlO5dPBWDIf4xUVNMZWgbse+6cV4:FyXHK3PEDfxWN+IWd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1548-19-0x0000000002870000-0x000000000288A000-memory.dmp healer behavioral1/memory/1548-21-0x0000000005360000-0x0000000005378000-memory.dmp healer behavioral1/memory/1548-25-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-47-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-45-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-43-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-41-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-39-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-38-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-35-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-33-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-31-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-29-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-27-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-49-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-23-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/1548-22-0x0000000005360000-0x0000000005372000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9727.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9727.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2892-61-0x0000000002790000-0x00000000027D6000-memory.dmp family_redline behavioral1/memory/2892-62-0x00000000028A0000-0x00000000028E4000-memory.dmp family_redline behavioral1/memory/2892-68-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-66-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-64-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-63-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-86-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-96-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-92-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-90-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-88-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-84-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-82-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-80-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-78-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-76-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-74-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-72-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-70-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/2892-94-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3660 un590901.exe 1548 pro9727.exe 2892 qu6477.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9727.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e4c7044b76b1cc6fc3474c5decfce005d71f0ba024380149d6d69ccc63a80688.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un590901.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2268 1548 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un590901.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9727.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6477.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4c7044b76b1cc6fc3474c5decfce005d71f0ba024380149d6d69ccc63a80688.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1548 pro9727.exe 1548 pro9727.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1548 pro9727.exe Token: SeDebugPrivilege 2892 qu6477.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3520 wrote to memory of 3660 3520 e4c7044b76b1cc6fc3474c5decfce005d71f0ba024380149d6d69ccc63a80688.exe 85 PID 3520 wrote to memory of 3660 3520 e4c7044b76b1cc6fc3474c5decfce005d71f0ba024380149d6d69ccc63a80688.exe 85 PID 3520 wrote to memory of 3660 3520 e4c7044b76b1cc6fc3474c5decfce005d71f0ba024380149d6d69ccc63a80688.exe 85 PID 3660 wrote to memory of 1548 3660 un590901.exe 86 PID 3660 wrote to memory of 1548 3660 un590901.exe 86 PID 3660 wrote to memory of 1548 3660 un590901.exe 86 PID 3660 wrote to memory of 2892 3660 un590901.exe 101 PID 3660 wrote to memory of 2892 3660 un590901.exe 101 PID 3660 wrote to memory of 2892 3660 un590901.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4c7044b76b1cc6fc3474c5decfce005d71f0ba024380149d6d69ccc63a80688.exe"C:\Users\Admin\AppData\Local\Temp\e4c7044b76b1cc6fc3474c5decfce005d71f0ba024380149d6d69ccc63a80688.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un590901.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un590901.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9727.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9727.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 10804⤵
- Program crash
PID:2268
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1548 -ip 15481⤵PID:1592
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD52dda65bc49ed8f956a6a6774c3b1fc26
SHA1adb6b470399935582bbda5042838f7b50023744d
SHA2561ad3a82f6d6f1a7959d66f4cf1ea7cd0faabceba34096337354992c5bfc0cdf3
SHA512f8da4a275e957c46e89ca7925bb10fc1cf7d29d37671aa11c5b5eeb72a36dd8448511dd1ef215dadab061fb4c9e74724a96989c4305046dc4171677ea50f24af
-
Filesize
312KB
MD505ab9ba7dfe1b89ca83448ec2ee6662c
SHA1cec29652a24bcb0f5dd4ab446bcc12b34ce9750e
SHA256c02f5b0b42d70eda6bb50dde2a8804fea9893924c994927c85865be250a626e5
SHA5122cb2fc515846ce944e8ba9f40ea052a435e7c405a2e0702241af979cd566d7c1ec3cbde05deb93eb5d8ce43adcd2cfcff7c0babc8ff25bc85f23467570b5eee4
-
Filesize
370KB
MD521d9fcfe218b0713cc7cb0baf28ff4d7
SHA1efd2869e655a55dea190e3aa6de6b64d50f156cb
SHA2569b823fe6cf14601c1efd51fd911704c8762379572c69e7259e35356033de5af6
SHA5123372bb94c2c96dcc27f4a2c150c58202e5c8672ca653504acf91d5ffa1b250b8f52c0752ac3ff693a4e8f414d121b3a7acd7899cc3ec295f98d94cbf4f09c272