Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9.exe
Resource
win10v2004-20241007-en
General
-
Target
9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9.exe
-
Size
689KB
-
MD5
4789250d5f6bfe7b7b8a1c49b986f4df
-
SHA1
b3d24319a7cfe95eb8b3bf0c291190dc423010d0
-
SHA256
9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9
-
SHA512
ec8b476a010c3481bee4d3ab60eb2c2c715ab3fbdadc262893d7e592ccc03b32d097c84d694b4c2f5e7e1278d383e6d6795afc4922ab118ab401b3f7ec7d4d2a
-
SSDEEP
12288:IMrBy90UWbc9ihXYYMpU9qIUVVm+pSrmAz85JscOTl843xAYMIKbYtmNgydCwxR0:5yfWVhXYYMpU98mXrzIW64hPMR0tmXCH
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/464-18-0x00000000049E0000-0x00000000049FA000-memory.dmp healer behavioral1/memory/464-20-0x0000000004DE0000-0x0000000004DF8000-memory.dmp healer behavioral1/memory/464-46-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-48-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-44-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-42-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-40-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-38-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-36-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-34-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-32-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-30-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-28-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-26-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-24-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-22-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer behavioral1/memory/464-21-0x0000000004DE0000-0x0000000004DF2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9070.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4972-60-0x00000000070D0000-0x0000000007116000-memory.dmp family_redline behavioral1/memory/4972-61-0x0000000007760000-0x00000000077A4000-memory.dmp family_redline behavioral1/memory/4972-62-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-71-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-95-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-93-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-91-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-89-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-87-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-85-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-83-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-81-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-79-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-77-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-75-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-73-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-69-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-67-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-65-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4972-63-0x0000000007760000-0x000000000779F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4948 unio6763.exe 464 pro9070.exe 4972 qu2726.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9070.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9070.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio6763.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1420 464 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9070.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio6763.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 464 pro9070.exe 464 pro9070.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 464 pro9070.exe Token: SeDebugPrivilege 4972 qu2726.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2244 wrote to memory of 4948 2244 9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9.exe 83 PID 2244 wrote to memory of 4948 2244 9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9.exe 83 PID 2244 wrote to memory of 4948 2244 9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9.exe 83 PID 4948 wrote to memory of 464 4948 unio6763.exe 85 PID 4948 wrote to memory of 464 4948 unio6763.exe 85 PID 4948 wrote to memory of 464 4948 unio6763.exe 85 PID 4948 wrote to memory of 4972 4948 unio6763.exe 99 PID 4948 wrote to memory of 4972 4948 unio6763.exe 99 PID 4948 wrote to memory of 4972 4948 unio6763.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9.exe"C:\Users\Admin\AppData\Local\Temp\9f4c2220d03c70418ba804dbe609849fe09f50e423550eb593ef30b27e6fcdd9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6763.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio6763.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9070.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9070.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 10844⤵
- Program crash
PID:1420
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2726.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2726.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 464 -ip 4641⤵PID:1200
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD5bf4f07d24c6e1f4431323afb12a4c23f
SHA123a99fd174bbb28c632238130945c7eebe33cde2
SHA2561d4f0e4d23b24281c0f7ba721ab5f5519dd47c374d019a05e1fa8500ab985d64
SHA51268d6be796a005835b656216c973296630d6db40f1193fe2076af5931dece5ccfeec03ed8b68497379e5a0f9c7ad1ac1b69b522c88a8c17bf3bec5d809e3e9f6e
-
Filesize
329KB
MD52bd6579c32dd2707c386ea89e1b9d07c
SHA1c80091e7f597d9eaf1003d1065a1d0d82e1ae5e6
SHA25624b46c350dfb0ae2a4e863dbc530880d03b5a29910ca8c0d4c4ba9ca0b67abbb
SHA51249942a0084ee10b9dbb98b42dfd056847472cc75e0ea670fcdd83f4e2deae6c0c36c897c138d2d1f36eb6b27373030bf0252aec3f4de3c0a7659872d56fe0056
-
Filesize
386KB
MD525e8c3df2d534c8ac34ed225ed45ce4c
SHA1a6d8bc32ba5103ba0ba15e5c658b7aeacd9737d5
SHA256e178f1c95ab6a65571d664d38eda163151777225dfaff1e6c2b05987984eb208
SHA51292d8b42f9152c0c1a49e042b859ab148970792128c4e6df9cd36ea91f637bb92d326da8a84434e23d4df9f80175445766890dd4150eafed722c80c8863722e0d