Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:43
Static task
static1
Behavioral task
behavioral1
Sample
b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6.exe
Resource
win10v2004-20241007-en
General
-
Target
b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6.exe
-
Size
687KB
-
MD5
a51fc5d312685f6dc7f1fc984300ada0
-
SHA1
6f78c387cd477a293f9bc6db4db39495ed5f299c
-
SHA256
b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6
-
SHA512
d27865e6ca891ee21a459b94f065e9ef94b62d1543cf7139a3d1b98a586213aa43a3165c573018fb4a7a0abd75f2c3e981b676825535bf3fbb6a7da9f8e3edc2
-
SSDEEP
12288:PMrQy907VmA7nCm+t1VB1iWmK5ITa6Vk5MyBq7FxONFz2Z0h10T2E2cadppUL:DyyTa1jmKaaukaw6X+h10TjncfUL
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3860-19-0x0000000002690000-0x00000000026AA000-memory.dmp healer behavioral1/memory/3860-21-0x0000000002720000-0x0000000002738000-memory.dmp healer behavioral1/memory/3860-49-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-47-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-45-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-43-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-41-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-39-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-38-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-36-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-33-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-31-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-30-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-27-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-25-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-23-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/3860-22-0x0000000002720000-0x0000000002732000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8222.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8222.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1920-60-0x0000000002790000-0x00000000027D6000-memory.dmp family_redline behavioral1/memory/1920-61-0x0000000004D00000-0x0000000004D44000-memory.dmp family_redline behavioral1/memory/1920-69-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-77-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-95-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-93-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-92-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-89-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-87-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-85-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-83-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-81-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-79-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-75-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-73-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-71-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-63-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-67-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-65-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline behavioral1/memory/1920-62-0x0000000004D00000-0x0000000004D3E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3980 un532018.exe 3860 pro8222.exe 1920 qu1432.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8222.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8222.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un532018.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 432 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2804 3860 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un532018.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1432.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3860 pro8222.exe 3860 pro8222.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3860 pro8222.exe Token: SeDebugPrivilege 1920 qu1432.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3576 wrote to memory of 3980 3576 b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6.exe 83 PID 3576 wrote to memory of 3980 3576 b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6.exe 83 PID 3576 wrote to memory of 3980 3576 b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6.exe 83 PID 3980 wrote to memory of 3860 3980 un532018.exe 84 PID 3980 wrote to memory of 3860 3980 un532018.exe 84 PID 3980 wrote to memory of 3860 3980 un532018.exe 84 PID 3980 wrote to memory of 1920 3980 un532018.exe 95 PID 3980 wrote to memory of 1920 3980 un532018.exe 95 PID 3980 wrote to memory of 1920 3980 un532018.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6.exe"C:\Users\Admin\AppData\Local\Temp\b62e570a91aa7db781f5a6ae7dd26c1ad98d3cb4600ca78f30a4cdce565137b6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532018.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532018.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8222.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8222.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3860 -s 10844⤵
- Program crash
PID:2804
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1432.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1432.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3860 -ip 38601⤵PID:968
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:432
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD53e8c90b3c7c9da0301886276e2cb109b
SHA15d6c1a3eb93e988e26b7d0a6520807be298417d0
SHA2569b33ece2a23346ee4325ee24dbd261b06762ab443d68f7aa5ec2219384498f12
SHA5124c9fa7b86b6e673d3829cf76c5c15b42b30426b80cf0e25c4fc1ff550f638ee314ce876e0b7f2a44c893a9ed539d25b2f8eb729ac4d980005494df41bf23dfca
-
Filesize
300KB
MD51154228afb30868e8172d58d9d22cca7
SHA14c5cbbd1386b59021a4ec3a749a8b7f2adf2d551
SHA25622969360db9fa10e66fd2132cc8241f259e2b0616a21d25c94a804726fe85198
SHA512b641db1fac1ba9259087a53d64a53fcb0731985b566e635d21c58e4f555f11094c3945176276357a73083f65a5d2d4cc073c04b913ca0164b9648ce83351fa63
-
Filesize
359KB
MD5559e92365d46d02c1286e2d429ffaa2f
SHA127600d9d55704b4edeed61e174b13462c2f77417
SHA25625a372eb26c84135d037947a4f66965695c7753df50ce2b8ef5105e591c00165
SHA512a8318939892850caa547e801a5eca8885c85138bf52c6fb540ab3ede71987491f344cf9834362fd17c03a04a6f60eedbb1c7d53a36c8040f1e8e5d7ff027fb31