Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:02
Static task
static1
Behavioral task
behavioral1
Sample
2fd03a76e12c9ac2410b44b4a64d21df115b3a2010a92f2d82c8d1c6b87b9d83.exe
Resource
win10v2004-20241007-en
General
-
Target
2fd03a76e12c9ac2410b44b4a64d21df115b3a2010a92f2d82c8d1c6b87b9d83.exe
-
Size
836KB
-
MD5
27154e577f296592f0224b27d1c33acf
-
SHA1
b5bb3e2fcdd6253ab013bf34d5b5ccc27af048a6
-
SHA256
2fd03a76e12c9ac2410b44b4a64d21df115b3a2010a92f2d82c8d1c6b87b9d83
-
SHA512
ecfc59efbbec127c9dd48c8d51297f6db036787c103ebb7703a7e301b9cd04d0d6668250f7a6b8dc490348d48a8b73cb205a283fa5dd14dd8a059cc30b47b20e
-
SSDEEP
24576:jyZHH5CYAJky/kt8CAf4xwx7ixbydVrr:214eBAkwxOby7
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023cc7-19.dat healer behavioral1/memory/2912-22-0x00000000003E0000-0x00000000003EA000-memory.dmp healer behavioral1/memory/4728-29-0x0000000004860000-0x000000000487A000-memory.dmp healer behavioral1/memory/4728-31-0x00000000048D0000-0x00000000048E8000-memory.dmp healer behavioral1/memory/4728-32-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-45-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-59-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-57-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-55-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-53-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-51-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-49-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-47-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-43-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-41-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-39-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-37-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-35-0x00000000048D0000-0x00000000048E2000-memory.dmp healer behavioral1/memory/4728-33-0x00000000048D0000-0x00000000048E2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f9543ok.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f9543ok.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f9543ok.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f9543ok.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h01dh98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h01dh98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f9543ok.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f9543ok.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h01dh98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h01dh98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h01dh98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h01dh98.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/5016-67-0x0000000007080000-0x00000000070C6000-memory.dmp family_redline behavioral1/memory/5016-68-0x0000000007100000-0x0000000007144000-memory.dmp family_redline behavioral1/memory/5016-69-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-94-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-102-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-100-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-98-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-96-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-92-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-90-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-89-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-86-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-84-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-82-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-80-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-78-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-76-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-72-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-74-0x0000000007100000-0x000000000713E000-memory.dmp family_redline behavioral1/memory/5016-70-0x0000000007100000-0x000000000713E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 4608 niba8150.exe 4384 niba3739.exe 2912 f9543ok.exe 4728 h01dh98.exe 5016 iUkLT45.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h01dh98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f9543ok.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h01dh98.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2fd03a76e12c9ac2410b44b4a64d21df115b3a2010a92f2d82c8d1c6b87b9d83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba8150.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" niba3739.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4396 4728 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fd03a76e12c9ac2410b44b4a64d21df115b3a2010a92f2d82c8d1c6b87b9d83.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niba8150.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niba3739.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h01dh98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iUkLT45.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2912 f9543ok.exe 2912 f9543ok.exe 4728 h01dh98.exe 4728 h01dh98.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2912 f9543ok.exe Token: SeDebugPrivilege 4728 h01dh98.exe Token: SeDebugPrivilege 5016 iUkLT45.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3104 wrote to memory of 4608 3104 2fd03a76e12c9ac2410b44b4a64d21df115b3a2010a92f2d82c8d1c6b87b9d83.exe 83 PID 3104 wrote to memory of 4608 3104 2fd03a76e12c9ac2410b44b4a64d21df115b3a2010a92f2d82c8d1c6b87b9d83.exe 83 PID 3104 wrote to memory of 4608 3104 2fd03a76e12c9ac2410b44b4a64d21df115b3a2010a92f2d82c8d1c6b87b9d83.exe 83 PID 4608 wrote to memory of 4384 4608 niba8150.exe 84 PID 4608 wrote to memory of 4384 4608 niba8150.exe 84 PID 4608 wrote to memory of 4384 4608 niba8150.exe 84 PID 4384 wrote to memory of 2912 4384 niba3739.exe 85 PID 4384 wrote to memory of 2912 4384 niba3739.exe 85 PID 4384 wrote to memory of 4728 4384 niba3739.exe 93 PID 4384 wrote to memory of 4728 4384 niba3739.exe 93 PID 4384 wrote to memory of 4728 4384 niba3739.exe 93 PID 4608 wrote to memory of 5016 4608 niba8150.exe 97 PID 4608 wrote to memory of 5016 4608 niba8150.exe 97 PID 4608 wrote to memory of 5016 4608 niba8150.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fd03a76e12c9ac2410b44b4a64d21df115b3a2010a92f2d82c8d1c6b87b9d83.exe"C:\Users\Admin\AppData\Local\Temp\2fd03a76e12c9ac2410b44b4a64d21df115b3a2010a92f2d82c8d1c6b87b9d83.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba8150.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba8150.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba3739.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\niba3739.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9543ok.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9543ok.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h01dh98.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\h01dh98.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4728 -s 10805⤵
- Program crash
PID:4396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iUkLT45.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\iUkLT45.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4728 -ip 47281⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
694KB
MD51e9032e55b7108f6fe564a258d190cbd
SHA12dcfd605071a0a70a6e9aab536cf8561af0abc90
SHA2562a27d91de2909f32eb3c23d5abbcc1e64ce38717b83993db954a19b45089554f
SHA512ee9dc5430f9fcd3f20ad922eb25e9a665eedbcfb6a5f055c60cc2c1145324b9a3406d6c0ffe1dd96afd433303e3bbe09e7116026cc2ec298569f625eb4e9fa30
-
Filesize
391KB
MD57477fb6cb124961a1dd5a375790d1a94
SHA1208bb4d1ceecf952c39b19f4a550305e2813e333
SHA256e19f4ec7b868054e50b7d0ac4e6586b90e73645496c868b31d34a6031d32b997
SHA51205015a7bb667f8f1edb01637c5668670a8f1380d140848397840fa92a87c042eb93731553a8550d3659be138a160973f0d16ea8fbef1418926121da140c67454
-
Filesize
344KB
MD596feb44f3827a8a1ea00ec6380a75bd4
SHA130f3d9d98efa45fa3e710042a12abcba3913b745
SHA2565f0d6ac09dccc4f2b3147b1d4012e53e02a0caf187c0f0c5ed88743e91f30181
SHA5127f877898f227effab5fb273f5ea214e7292e4da2da95a6db5def62323a99b2e4def3aac5e75ca5a896ff0f2d6dcbaaed161bca728ddef2eb44607f5dd22f2ac5
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
334KB
MD501a10be1de184fa822e881617dd0346c
SHA167ad5da12deae60d438d93d7c5ae5dbab6167256
SHA25612c1a69e439298fedf78e3914943d700ed79f8b3d33edac6bf35a08ababbb5d4
SHA512698532849ec1705c92a033997adfcf4bda5f18c344b2ab9a0ef6c197a8086fa20be77aa95c4f3ab1d6a98cea784cbc9b222f2ff8d87c83040cec8d13a66e03ff