Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f.exe
Resource
win10v2004-20241007-en
General
-
Target
ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f.exe
-
Size
660KB
-
MD5
9ad9cd8331203b928d8435ae0a1a2d14
-
SHA1
4de98ccd0a2816beaf7b9e08e8ee7f6e6a5b0ba0
-
SHA256
ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f
-
SHA512
825dd40d5fe2d0503b6366f87aaab698bad7e0e7ed2be9adcbc0d982972001b1fe8dbe59b5652130561abb01ed009a105373cb6851e903746f7736466febe5f3
-
SSDEEP
12288:QMr8y90TycflIDBnOm4c7nc8n7/MHO0UsvrLiMipaWPqHVwRJC:8yipflCnqc7nRn7/cOBsv6Mip5WVSJC
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4808-19-0x00000000024B0000-0x00000000024CA000-memory.dmp healer behavioral1/memory/4808-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/4808-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-41-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4808-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1296.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1296.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1296.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1296.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1296.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1296.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3480-61-0x0000000002400000-0x0000000002446000-memory.dmp family_redline behavioral1/memory/3480-62-0x00000000025C0000-0x0000000002604000-memory.dmp family_redline behavioral1/memory/3480-70-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-78-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-96-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-94-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-90-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-88-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-87-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-84-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-82-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-80-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-76-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-74-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-72-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-92-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-68-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-66-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-64-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline behavioral1/memory/3480-63-0x00000000025C0000-0x00000000025FF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1336 un008060.exe 4808 pro1296.exe 3480 qu3530.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1296.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1296.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un008060.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2268 4808 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un008060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1296.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3530.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4808 pro1296.exe 4808 pro1296.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4808 pro1296.exe Token: SeDebugPrivilege 3480 qu3530.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3556 wrote to memory of 1336 3556 ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f.exe 83 PID 3556 wrote to memory of 1336 3556 ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f.exe 83 PID 3556 wrote to memory of 1336 3556 ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f.exe 83 PID 1336 wrote to memory of 4808 1336 un008060.exe 85 PID 1336 wrote to memory of 4808 1336 un008060.exe 85 PID 1336 wrote to memory of 4808 1336 un008060.exe 85 PID 1336 wrote to memory of 3480 1336 un008060.exe 95 PID 1336 wrote to memory of 3480 1336 un008060.exe 95 PID 1336 wrote to memory of 3480 1336 un008060.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f.exe"C:\Users\Admin\AppData\Local\Temp\ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un008060.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un008060.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1296.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1296.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 10764⤵
- Program crash
PID:2268
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3530.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4808 -ip 48081⤵PID:2284
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD51bb758c0bdaa37bfe2c2010f43202778
SHA1fe34e4721c255279052d54c89dca45fdc2d91ad9
SHA2564478c54f7ab395883be6b8fd30a0f3be3648c393f19ec19e893f5f7fbf22f9f1
SHA512c6e7d28ce690e72845cab2665115ace872de161a746bfab26ec79cf90b7cf0c40f40c372c6c90a4da966c5f95424a7b66d20ed8b354ffe6de621b9647ffabd05
-
Filesize
236KB
MD57100a47ee77d030cff03ffbeb277dd83
SHA19023762f3f2306bc4d92ecc6ac0e2174203bc023
SHA2569b716c29c45ac85d3808be9e0c3e802fc9c0f7285f5632c1beb2952c715051c4
SHA5121a2f3e55c00d33abae7284fd8b4662f26ab33eacabf175e3950c12571746907f68a6233442d1e5e09384b8b0cf70fb1db2ed12b98c65bbf2ff73d91732a100ff
-
Filesize
295KB
MD5513c3489bd39c054a2a06ea71e799efc
SHA1f060324842f0efa5a4526be0b76f1e41894e15cb
SHA2560a14549e746be9f0e36b7afdc23a1a9c1d78e9ba86fded6268004c4cc7355bc8
SHA512f71d963d28a5e08afe87d923052341e9730651e3d44f4e784bdb95fe64038ecf6ccd46df55cd10f79934361d574534abe2073a44ccd25b78a4adc94b2ba60989