Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:39
Static task
static1
Behavioral task
behavioral1
Sample
a8e6b120f2686ac3652301e97b8421832b091d794292ab17ac763a270c38de05.exe
Resource
win10v2004-20241007-en
General
-
Target
a8e6b120f2686ac3652301e97b8421832b091d794292ab17ac763a270c38de05.exe
-
Size
671KB
-
MD5
1289acd13586218f3fd5b7422e180ce5
-
SHA1
e56e2e6c31418792107af3e58c2ab710ddb23cb7
-
SHA256
a8e6b120f2686ac3652301e97b8421832b091d794292ab17ac763a270c38de05
-
SHA512
c389414e922738df229ee6426028593ddb5a6b400ee44bffa7ae3e39d6d16eb43db018d8cdb2c8e0290042f20edf386861c315929a7e811e815cf398023b0958
-
SSDEEP
12288:7MrDy90uN6k+8LOsnF6TKshbhXzjHiYhzIhy7ytlNc:IyD6k+L3jbhXzjHNUhHm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1504-19-0x0000000002310000-0x000000000232A000-memory.dmp healer behavioral1/memory/1504-21-0x0000000002440000-0x0000000002458000-memory.dmp healer behavioral1/memory/1504-22-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-49-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-39-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-37-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-35-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-33-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-31-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-29-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-27-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-25-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-23-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-47-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-45-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-43-0x0000000002440000-0x0000000002452000-memory.dmp healer behavioral1/memory/1504-41-0x0000000002440000-0x0000000002452000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3399.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3399.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3768-60-0x0000000002520000-0x0000000002566000-memory.dmp family_redline behavioral1/memory/3768-61-0x0000000004A90000-0x0000000004AD4000-memory.dmp family_redline behavioral1/memory/3768-63-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-62-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-75-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-95-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-93-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-91-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-89-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-87-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-83-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-81-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-80-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-73-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-71-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-69-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-67-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-65-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-85-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/3768-77-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3016 un635913.exe 1504 pro3399.exe 3768 qu4758.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3399.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a8e6b120f2686ac3652301e97b8421832b091d794292ab17ac763a270c38de05.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un635913.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4464 1504 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4758.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8e6b120f2686ac3652301e97b8421832b091d794292ab17ac763a270c38de05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un635913.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1504 pro3399.exe 1504 pro3399.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1504 pro3399.exe Token: SeDebugPrivilege 3768 qu4758.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4556 wrote to memory of 3016 4556 a8e6b120f2686ac3652301e97b8421832b091d794292ab17ac763a270c38de05.exe 83 PID 4556 wrote to memory of 3016 4556 a8e6b120f2686ac3652301e97b8421832b091d794292ab17ac763a270c38de05.exe 83 PID 4556 wrote to memory of 3016 4556 a8e6b120f2686ac3652301e97b8421832b091d794292ab17ac763a270c38de05.exe 83 PID 3016 wrote to memory of 1504 3016 un635913.exe 84 PID 3016 wrote to memory of 1504 3016 un635913.exe 84 PID 3016 wrote to memory of 1504 3016 un635913.exe 84 PID 3016 wrote to memory of 3768 3016 un635913.exe 95 PID 3016 wrote to memory of 3768 3016 un635913.exe 95 PID 3016 wrote to memory of 3768 3016 un635913.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8e6b120f2686ac3652301e97b8421832b091d794292ab17ac763a270c38de05.exe"C:\Users\Admin\AppData\Local\Temp\a8e6b120f2686ac3652301e97b8421832b091d794292ab17ac763a270c38de05.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un635913.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un635913.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3399.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3399.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1504 -s 10804⤵
- Program crash
PID:4464
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4758.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4758.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1504 -ip 15041⤵PID:2216
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5756867e599ddc33ed7e93543dc992ff6
SHA160460126e4a87b768e604ef4baaf8c644670034b
SHA256053a58a4f7b8d8abab8af88f1a9923b6372f24ca4c12cd27debf61e68cfb4aa5
SHA51212e9e2fb67fa3f405b65813633968cc52b4c930a075b9e5477081b59c586d53b6382f7eed9b891e9d62b8c91e6a6aacf95fd1c69824281adcef8feb476940769
-
Filesize
237KB
MD533f67bd48e4e8f8cf3c05eebf5d5c16a
SHA13d0ab9d0e5b078b5b3dc23ab428e048e96182d5c
SHA2564a02fb8e9ae84acd681406baefd7d24bc925ea361435d72bc9cb8f61564d6cad
SHA5123b73065b85538653a7e844671055c038e5e8f453f0785dc874c6c56863adb2684a913aece20fe07716cbcb59b09170b8166c390f8c9baa3a94136b4eab031917
-
Filesize
295KB
MD580c0d5988343ab6fd897ea905634b446
SHA14f5e49b968579d58f35061a8d10327b5f5bcee43
SHA2565ec741a7913132afe9e8d4c7639b9de97eb24d6cd32db519a7aee3766ee7eb97
SHA51266a305e30e7b8bf4b1e5b90992eda03b7a987e143e8136ff2229ef1bd5d6b545bcd942d29ac663a6d09451c76e6183f4fa9ba90228838685f72c3d06921d24c1