Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
e1f83c921eac900ffa1a3533a3e8450a187d1065e36a636a543b735dec08a617.exe
Resource
win10v2004-20241007-en
General
-
Target
e1f83c921eac900ffa1a3533a3e8450a187d1065e36a636a543b735dec08a617.exe
-
Size
690KB
-
MD5
42d79e83b06f985da7d1620186df5339
-
SHA1
32ff7f02b2a5255945b28a15ae49942e7d0e7761
-
SHA256
e1f83c921eac900ffa1a3533a3e8450a187d1065e36a636a543b735dec08a617
-
SHA512
61b8552f4088262629250746fa523f0f9de5b146441a4ba128a2c82322d80393705bf6681fff312c04b1f1fd12fd068532afc13a51b4ea8eddcc1457b28c567e
-
SSDEEP
12288:wMrwy90D1OJVUNM1kAS6fB2ohc1fKZ7p8H6RZAh+NvmFhgfigC4wqqtJ945:Qyu1O7sASwzV5LVNChgagCz/tJa5
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3644-19-0x0000000002900000-0x000000000291A000-memory.dmp healer behavioral1/memory/3644-21-0x0000000004DF0000-0x0000000004E08000-memory.dmp healer behavioral1/memory/3644-25-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-49-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-47-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-45-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-43-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-41-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-39-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-37-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-35-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-34-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-31-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-29-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-27-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-23-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer behavioral1/memory/3644-22-0x0000000004DF0000-0x0000000004E02000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3399.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3399.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4172-60-0x0000000003870000-0x00000000038B6000-memory.dmp family_redline behavioral1/memory/4172-61-0x0000000006620000-0x0000000006664000-memory.dmp family_redline behavioral1/memory/4172-69-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-75-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-95-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-93-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-91-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-90-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-85-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-83-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-81-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-79-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-77-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-73-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-71-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-67-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-87-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-65-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-63-0x0000000006620000-0x000000000665F000-memory.dmp family_redline behavioral1/memory/4172-62-0x0000000006620000-0x000000000665F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2952 un792791.exe 3644 pro3399.exe 4172 qu6644.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3399.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3399.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e1f83c921eac900ffa1a3533a3e8450a187d1065e36a636a543b735dec08a617.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un792791.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3484 3644 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1f83c921eac900ffa1a3533a3e8450a187d1065e36a636a543b735dec08a617.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un792791.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6644.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3644 pro3399.exe 3644 pro3399.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3644 pro3399.exe Token: SeDebugPrivilege 4172 qu6644.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1076 wrote to memory of 2952 1076 e1f83c921eac900ffa1a3533a3e8450a187d1065e36a636a543b735dec08a617.exe 83 PID 1076 wrote to memory of 2952 1076 e1f83c921eac900ffa1a3533a3e8450a187d1065e36a636a543b735dec08a617.exe 83 PID 1076 wrote to memory of 2952 1076 e1f83c921eac900ffa1a3533a3e8450a187d1065e36a636a543b735dec08a617.exe 83 PID 2952 wrote to memory of 3644 2952 un792791.exe 84 PID 2952 wrote to memory of 3644 2952 un792791.exe 84 PID 2952 wrote to memory of 3644 2952 un792791.exe 84 PID 2952 wrote to memory of 4172 2952 un792791.exe 95 PID 2952 wrote to memory of 4172 2952 un792791.exe 95 PID 2952 wrote to memory of 4172 2952 un792791.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1f83c921eac900ffa1a3533a3e8450a187d1065e36a636a543b735dec08a617.exe"C:\Users\Admin\AppData\Local\Temp\e1f83c921eac900ffa1a3533a3e8450a187d1065e36a636a543b735dec08a617.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un792791.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un792791.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3399.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3399.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 10804⤵
- Program crash
PID:3484
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6644.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6644.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4172
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3644 -ip 36441⤵PID:2964
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD58b461e2f43499ce0033e6f56926eb0ad
SHA133c034a5e2c68fd8c656f1f2b7e37119488681e3
SHA256bb843d0d32b6c34c80bd526d3c795a8cb90b27868d186bffc52986fbf495d4bd
SHA512b7f8ff001b0cd0ec0de7a035e0699e3134250a395c66549fb64d8fb58ea455b935c30f85033f1ecee1e66450409069ce7efbee1229636f82d1beceb98309020b
-
Filesize
291KB
MD58ecaac96cc545bd32ad18c22de731ada
SHA1dc53753b504bcf353f09d6b572bc1cb5e98d48f9
SHA2566cec7773e3cf0c2bcb11e32e25b7fbe422f6985de4af8295464e865b53726785
SHA5124ee5c1f3453bfbc7a92375b091b704bd7dc3cc2a98a706283da9cd657b5ef4e8aeb13f0cd069f7df7e49ef1fbb8853c6c0a404b967cf0e8329e511b5c5f7a4e4
-
Filesize
345KB
MD5390d8703fe73d69349c27863dcbb2156
SHA11426575f3274ef5c45e2faba112cd386e6a15e10
SHA2568a0bdc4567588defb185bed004aab7d4184fc6f9be2ab4221b8990ab5bb73134
SHA51269b1e233c6c3fd23c22838edf20b0e5226b44866e541047b07a146646ac0b6aa614bafdb8b88fd7578cd2c330919c9e25811c62b3cb6d437d0bbec544d8d308c