Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe
Resource
win10v2004-20241007-en
General
-
Target
8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe
-
Size
907KB
-
MD5
3514963358f969c128e6906c1d785f77
-
SHA1
b6654cad610ef8f7032ae9163ae77c66dbf62c6c
-
SHA256
8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c
-
SHA512
8c4b284cee4045f7a45b185ca5649bca2aefa5ce4acf234f13aa68b2f1232e114b8478238dfe8e5885ff937d098c337175cefae72c03f3abf7f1d7b0ec740242
-
SSDEEP
24576:2yzv07zIvGlkgQM0B/gQCA53aEr/Dk+IPTW:Fzv0vkJB/Z3
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023c94-19.dat healer behavioral1/memory/5072-22-0x0000000000F80000-0x0000000000F8A000-memory.dmp healer behavioral1/memory/4892-29-0x00000000027E0000-0x00000000027FA000-memory.dmp healer behavioral1/memory/4892-31-0x0000000004CC0000-0x0000000004CD8000-memory.dmp healer behavioral1/memory/4892-32-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-43-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-59-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-58-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-55-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-53-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-51-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-49-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-47-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-45-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-41-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-39-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-37-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-35-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer behavioral1/memory/4892-33-0x0000000004CC0000-0x0000000004CD2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection qu2889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" qu2889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" qu2889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8981.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" qu2889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" qu2889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" qu2889.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro8981.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1192-67-0x0000000002530000-0x0000000002576000-memory.dmp family_redline behavioral1/memory/1192-68-0x0000000002A20000-0x0000000002A64000-memory.dmp family_redline behavioral1/memory/1192-72-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-85-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-103-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-100-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-98-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-97-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-94-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-92-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-91-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-88-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-86-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-82-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-80-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-79-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-76-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-74-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-70-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline behavioral1/memory/1192-69-0x0000000002A20000-0x0000000002A5E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 4936 unio6381.exe 2660 unio6079.exe 5072 pro8981.exe 4892 qu2889.exe 1192 rGr42s04.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8981.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features qu2889.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" qu2889.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio6381.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" unio6079.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2988 4892 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2889.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rGr42s04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio6381.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio6079.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5072 pro8981.exe 5072 pro8981.exe 4892 qu2889.exe 4892 qu2889.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5072 pro8981.exe Token: SeDebugPrivilege 4892 qu2889.exe Token: SeDebugPrivilege 1192 rGr42s04.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4008 wrote to memory of 4936 4008 8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe 82 PID 4008 wrote to memory of 4936 4008 8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe 82 PID 4008 wrote to memory of 4936 4008 8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe 82 PID 4936 wrote to memory of 2660 4936 unio6381.exe 83 PID 4936 wrote to memory of 2660 4936 unio6381.exe 83 PID 4936 wrote to memory of 2660 4936 unio6381.exe 83 PID 2660 wrote to memory of 5072 2660 unio6079.exe 84 PID 2660 wrote to memory of 5072 2660 unio6079.exe 84 PID 2660 wrote to memory of 4892 2660 unio6079.exe 96 PID 2660 wrote to memory of 4892 2660 unio6079.exe 96 PID 2660 wrote to memory of 4892 2660 unio6079.exe 96 PID 4936 wrote to memory of 1192 4936 unio6381.exe 107 PID 4936 wrote to memory of 1192 4936 unio6381.exe 107 PID 4936 wrote to memory of 1192 4936 unio6381.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe"C:\Users\Admin\AppData\Local\Temp\8612e2857bb01b77be3ba81f3ff5a984eaf4c90a406d952796ca937030f3ec0c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6381.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6381.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio6079.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\unio6079.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8981.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pro8981.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu2889.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu2889.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 10845⤵
- Program crash
PID:2988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rGr42s04.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rGr42s04.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4892 -ip 48921⤵PID:4672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
765KB
MD510dd0d138f640da05f4cf5b68e328eec
SHA1328383f543464f8e48071f4d94c4a86ed791d6b6
SHA256b5452bc501dc99c8bed4095028d8316acf55a26fc525f90a381ec537793576e3
SHA512941811508dac2caabf2eb2c5c4a52a613ac621cfdb887aa75412e0293d4292321e06f4ac78b8bc9628f4a98828aa04ea400d4905d82bd97af12d0ec27d8819f7
-
Filesize
457KB
MD5756eb7939f2ffc37ec17cf7711110b69
SHA1a9c8e1547c4d7a23f9fb2587ded8640cf2245672
SHA2563808a4de9951571e4a23ea486a64582720264bc612aa62dd2e9a2a8e6f72c2f5
SHA5129c2aa7386eaf67e84998f182c381064d1475a7ded6fc011d33050aa43b8bb0c9a7668e3538d9a4a17d5bb882b393d5299cde77536ee03099a3634a9f064c4a40
-
Filesize
379KB
MD57b8b31002487ad91d979152490674b5a
SHA178be39da9dcc7a8ef90bf9736ab0d82226432f99
SHA2568f139982114be62195aa8240a00d1d0ed7c2ffc22127d9834eaa0fd66235dbf6
SHA5126370c6c209b42b9f4aaa37eb9b52d5ab90b16555638fac09a652db52be98ed616fc4a5100c9f164d01606ead773e3821521c3664788e7120afb785d9f9915250
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
399KB
MD5263f3783d29c5a6f9fce53d5cafdf6c5
SHA1f357e9b0b8b18b682b0ef2e684b0b6fabc951308
SHA25667d2b8e767033ec0a440e44588c17895546aa4d2ae5f373b450833fba0c91d6a
SHA5124683c877f2b5802b57cd15a660e6aa938aca4f95ade3ba372705b24dba9f731dbc9a0f58611de87a0ca3307b69570d4f6a02623f2155d035cb52c98f725cf32d