Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:26
Static task
static1
Behavioral task
behavioral1
Sample
261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f.exe
Resource
win10v2004-20241007-en
General
-
Target
261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f.exe
-
Size
672KB
-
MD5
4410e7244639fdd1c9d458e543eba7b2
-
SHA1
fc996c0709edd31981eca3a0f8966acb3deec576
-
SHA256
261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f
-
SHA512
640d64ea1c05ad74efff707f354fcd0f0c6a816646a3d03cdae9c4f8307d25fe7988354add0b0ff24d4d065ac05644c384262abb307713d0910f9b5837991cbb
-
SSDEEP
12288:FMrQy90lkpHXfuP+P3a8r1VBnZvcVlS96bzc1fC5HFt8gomHZ+Yb524pAcptQts:ByDHXk4ak1PZvAYMchoHFtdoRWP6+b
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2768-19-0x0000000002470000-0x000000000248A000-memory.dmp healer behavioral1/memory/2768-21-0x0000000002600000-0x0000000002618000-memory.dmp healer behavioral1/memory/2768-22-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-49-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-48-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-45-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-43-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-42-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-39-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-37-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-35-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-33-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-31-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-29-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-27-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-25-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/2768-23-0x0000000002600000-0x0000000002612000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9965.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9965.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2776-60-0x0000000004A40000-0x0000000004A86000-memory.dmp family_redline behavioral1/memory/2776-61-0x0000000005070000-0x00000000050B4000-memory.dmp family_redline behavioral1/memory/2776-77-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-79-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-95-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-93-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-89-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-87-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-85-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-83-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-81-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-75-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-73-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-71-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-70-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-67-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-91-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-65-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-63-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/2776-62-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1888 un668387.exe 2768 pro9965.exe 2776 qu5731.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9965.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9965.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un668387.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2912 2768 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un668387.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9965.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5731.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2768 pro9965.exe 2768 pro9965.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2768 pro9965.exe Token: SeDebugPrivilege 2776 qu5731.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4564 wrote to memory of 1888 4564 261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f.exe 83 PID 4564 wrote to memory of 1888 4564 261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f.exe 83 PID 4564 wrote to memory of 1888 4564 261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f.exe 83 PID 1888 wrote to memory of 2768 1888 un668387.exe 84 PID 1888 wrote to memory of 2768 1888 un668387.exe 84 PID 1888 wrote to memory of 2768 1888 un668387.exe 84 PID 1888 wrote to memory of 2776 1888 un668387.exe 96 PID 1888 wrote to memory of 2776 1888 un668387.exe 96 PID 1888 wrote to memory of 2776 1888 un668387.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f.exe"C:\Users\Admin\AppData\Local\Temp\261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un668387.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un668387.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9965.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 10804⤵
- Program crash
PID:2912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5731.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5731.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2768 -ip 27681⤵PID:1976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
530KB
MD5876fbcc3a75f4dcb3a4823a7c6b91361
SHA186384872566eb344cb67cf7a3e13a5387b080348
SHA256f064903555bdfc98a5480b88b3dc37c6a8cddf5879fd4b63b71581cfd4670b7a
SHA512517b347adf54567b3e77766b3a5a38d5c40fb6683d8b2d263b4cecdb2484caa5caff89baae116637f47ced59f33595ee3cf6c4d38f3d36fbe50bf9658f40cc01
-
Filesize
259KB
MD52c3a50721c3c7555ad4303643d4c3979
SHA170b34edd7fcedaf290bb1cf3686cc81d8ac2a196
SHA2563ecc2b4708d795ad69515f3aeb2e9939fb59966a61e4a1d73ae652b0d3f4c9c0
SHA512355a55fe6ec13ad4078a7954e8764edf35cc06094b28c1a9a8725094cefd3ccff924497ab8d562a506c8bc5934aa80d4294ea44b1e24024a4a396ae54a500f9f
-
Filesize
318KB
MD5e3f89614a82ec29cba1697d6f71e609e
SHA15cd3f2973c6b0c51a1d04865ccc7e5a54822d761
SHA2562edb426fb0df00b1b2258a50f101add304d7b896622c18a612e6850504c689fc
SHA512591af481650855a4ca973b708f5aba55c0e14d6a838a92020f10048bd5efbdfc9f3b4265cf029ac985e059fa50b1a95fb88cb00045a09d1b1371b39e56719ab4