Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:05
Static task
static1
Behavioral task
behavioral1
Sample
83b8f06fe3d37e27d630c07c6391f428c98312ba4910a39d1fcf2b7e0aa74d02.exe
Resource
win10v2004-20241007-en
General
-
Target
83b8f06fe3d37e27d630c07c6391f428c98312ba4910a39d1fcf2b7e0aa74d02.exe
-
Size
696KB
-
MD5
b869ea93fa2a84a01ee758e367b763c6
-
SHA1
35ecbad979f0fff6a47feb761d43b6b2a8863792
-
SHA256
83b8f06fe3d37e27d630c07c6391f428c98312ba4910a39d1fcf2b7e0aa74d02
-
SHA512
124ca7ff97346412ad29cf6b32a77b18689c3030b049c8bd5b54bcbfc94b3469a7bc534d8f7f15bd0dd25d699a5d3774e4f73a0ee1b8728afba91e8c60068633
-
SSDEEP
12288:dMrjy90vr1MGhMT4yjNbE5Shf3NBj9IbrHr69/ROMuVRgc9XaOLZwaW5woCLLFkT:2y81MQwSW9Bj9SHr6nOMQJ8yeCVOfzN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3292-18-0x0000000004840000-0x000000000485A000-memory.dmp healer behavioral1/memory/3292-20-0x00000000070F0000-0x0000000007108000-memory.dmp healer behavioral1/memory/3292-28-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-48-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-46-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-44-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-42-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-40-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-38-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-36-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-34-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-32-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-30-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-24-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-22-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-21-0x00000000070F0000-0x0000000007102000-memory.dmp healer behavioral1/memory/3292-26-0x00000000070F0000-0x0000000007102000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2942.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1048-60-0x00000000070D0000-0x0000000007116000-memory.dmp family_redline behavioral1/memory/1048-61-0x0000000007190000-0x00000000071D4000-memory.dmp family_redline behavioral1/memory/1048-77-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-95-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-93-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-91-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-89-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-87-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-85-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-83-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-81-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-80-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-75-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-73-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-71-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-69-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-67-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-65-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-63-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/1048-62-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1364 un891551.exe 3292 pro2942.exe 1048 qu1323.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2942.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2942.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 83b8f06fe3d37e27d630c07c6391f428c98312ba4910a39d1fcf2b7e0aa74d02.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un891551.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3000 3292 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1323.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83b8f06fe3d37e27d630c07c6391f428c98312ba4910a39d1fcf2b7e0aa74d02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un891551.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2942.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3292 pro2942.exe 3292 pro2942.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3292 pro2942.exe Token: SeDebugPrivilege 1048 qu1323.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3228 wrote to memory of 1364 3228 83b8f06fe3d37e27d630c07c6391f428c98312ba4910a39d1fcf2b7e0aa74d02.exe 83 PID 3228 wrote to memory of 1364 3228 83b8f06fe3d37e27d630c07c6391f428c98312ba4910a39d1fcf2b7e0aa74d02.exe 83 PID 3228 wrote to memory of 1364 3228 83b8f06fe3d37e27d630c07c6391f428c98312ba4910a39d1fcf2b7e0aa74d02.exe 83 PID 1364 wrote to memory of 3292 1364 un891551.exe 84 PID 1364 wrote to memory of 3292 1364 un891551.exe 84 PID 1364 wrote to memory of 3292 1364 un891551.exe 84 PID 1364 wrote to memory of 1048 1364 un891551.exe 99 PID 1364 wrote to memory of 1048 1364 un891551.exe 99 PID 1364 wrote to memory of 1048 1364 un891551.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\83b8f06fe3d37e27d630c07c6391f428c98312ba4910a39d1fcf2b7e0aa74d02.exe"C:\Users\Admin\AppData\Local\Temp\83b8f06fe3d37e27d630c07c6391f428c98312ba4910a39d1fcf2b7e0aa74d02.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un891551.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un891551.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2942.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2942.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 10804⤵
- Program crash
PID:3000
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1323.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1323.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3292 -ip 32921⤵PID:1616
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554KB
MD5cde908248bce758c121f8371ddffca00
SHA1fb4372eb9f78e40a7b9830bcba008ca05341050b
SHA25650ea6314b034c00aa7cf471013c3865888ba130565cca74855fee2d1639d23c1
SHA512b0917916aea29c0c712a90405fb12468974f8c898a982d3ef93e310dae2155f8741f6e5c3f85387a5a82e77d30b0291142cbcd4df1444559c7e67b9353cc6a27
-
Filesize
345KB
MD5bafb06e2a16faa2048bd9f41dd3762a1
SHA1d86a4c4987a28ac7f784fef56f4619b0ab48c1a1
SHA2567e7623be4a33637e2133441bfe4d9853bbf2dee2d58bc920155487a52676ca4f
SHA512bb4b2acc3f5fd7342a4901c108084c038b62c0376acd9b007af8e49042daf72b86a32ab3714b8ed31a8bea6f1f0b90bc8f7364207dd269a9ae744a868aa48f41
-
Filesize
403KB
MD5c331bced183860a3844d406d68650988
SHA195fc1b050c00150bdb56566123fa8de07beeaf76
SHA2565ca50b88cbaec217a1e98b2d5a293fb27715502ab42fe56f98879f1a3d1e527a
SHA51232d8a1bac4a76e4aaf67ea0129a4c67e72122236b366dd7d6c3ba6311cedd078f543e3bf2f8f7c4929172518f8efd5fea36648209e2fb9deb1d9d1a98a1bf42c