Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:27
Static task
static1
Behavioral task
behavioral1
Sample
f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8.exe
Resource
win10v2004-20241007-en
General
-
Target
f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8.exe
-
Size
690KB
-
MD5
d9832350036785cf543f3ad73201a67f
-
SHA1
419c5941f440bb1ff40ecaacebccae3c22bc3ff3
-
SHA256
f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8
-
SHA512
97d2c8b82787f0cb912d44532e7c4771948e8038be8b72ce2eaa091fa273f28589c954d26bd9bbd815bd42e31e57b5e4fdcfc6aea47fe9197035b476557c825f
-
SSDEEP
12288:2MrRy9074n+fdOha/9sBUI1NO4H2KcsMJmPAa3XRMt8MX8gdvoWh:jyo4BhzN/OsfZpSmMMWvoWh
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/5036-19-0x00000000027F0000-0x000000000280A000-memory.dmp healer behavioral1/memory/5036-21-0x0000000002870000-0x0000000002888000-memory.dmp healer behavioral1/memory/5036-49-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-47-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-45-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-41-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-39-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-38-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-35-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-34-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-31-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-29-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-27-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-25-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-23-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-22-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/5036-44-0x0000000002870000-0x0000000002882000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3902.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3902.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3902.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3902.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3902.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3902.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4908-61-0x00000000027A0000-0x00000000027E6000-memory.dmp family_redline behavioral1/memory/4908-62-0x0000000004E00000-0x0000000004E44000-memory.dmp family_redline behavioral1/memory/4908-70-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-74-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-73-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-92-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-76-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-68-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-66-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-64-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-63-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-96-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-94-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-90-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-88-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-86-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-84-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-82-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-80-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4908-78-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3092 un079397.exe 5036 pro3902.exe 4908 qu1865.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3902.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3902.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un079397.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2704 5036 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un079397.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3902.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1865.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5036 pro3902.exe 5036 pro3902.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5036 pro3902.exe Token: SeDebugPrivilege 4908 qu1865.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3840 wrote to memory of 3092 3840 f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8.exe 83 PID 3840 wrote to memory of 3092 3840 f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8.exe 83 PID 3840 wrote to memory of 3092 3840 f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8.exe 83 PID 3092 wrote to memory of 5036 3092 un079397.exe 84 PID 3092 wrote to memory of 5036 3092 un079397.exe 84 PID 3092 wrote to memory of 5036 3092 un079397.exe 84 PID 3092 wrote to memory of 4908 3092 un079397.exe 99 PID 3092 wrote to memory of 4908 3092 un079397.exe 99 PID 3092 wrote to memory of 4908 3092 un079397.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8.exe"C:\Users\Admin\AppData\Local\Temp\f327093f1b6c6dd2aae50510ef3e5dceb9ca5f31139b121e0e21a55d232125d8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un079397.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un079397.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3902.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3902.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5036 -s 10844⤵
- Program crash
PID:2704
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1865.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1865.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5036 -ip 50361⤵PID:4408
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5cc8357134f546ac539ca8e31abc97bff
SHA15cb0139a027516884d995d6ab483d6710a506b93
SHA256f4778cf72541a3754f4d56d3b00027e2b258533bd9fd52dfd033a700cea3058d
SHA512d7e8c072817edd709497ccc92848cd96ef2ca8b8de2b405aac5a4ed1099dc0cce5845271e8c79d28224dd816a4bce2e3fce5a8da4b3a24f315729c954ac54cf0
-
Filesize
314KB
MD5a2d406c4ea563b25db4cf5beb67299af
SHA1b75f06114a10def8ee7256e4ba70ab3432fa433b
SHA256a2e944c6164caaab2e767e0f2365ab84cc03690f713f034fe47bfbc696e83590
SHA512088d10330e30e38c030e36ce1c83db112012cbc8acb8b9b34bd3ee62a4732650f326c07998d885abf59f37bfe69156c4a84566a048456fcbd06ed7e566a65b5a
-
Filesize
372KB
MD56eff84b012cabc9629d6f8640fcb73c7
SHA139e3005dd1dfd02836d7e3fe7c6f08b0c9bdc778
SHA2561fbd64b80a815190c8d3859ccf2ab61e0fdcbd65ea76db43e961fdd368e4522c
SHA512560b5e5cfaedae1551ce10828ea14e3a80d019e21da8def98e182523377cb25362579474577948647c1a8e409322a53b1466ca26912738b40cabd3986514e8bb