Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
155bd36c434f7864f86b9b8f9df15508dd0382be38c84b7989a87960fb728b2b.exe
Resource
win10v2004-20241007-en
General
-
Target
155bd36c434f7864f86b9b8f9df15508dd0382be38c84b7989a87960fb728b2b.exe
-
Size
658KB
-
MD5
f477ef093f8f0822691564ff70735aef
-
SHA1
c290ba88e8d565db11a9c8d2badf13d1c4587efc
-
SHA256
155bd36c434f7864f86b9b8f9df15508dd0382be38c84b7989a87960fb728b2b
-
SHA512
184f5d4a39fc12a049d313e321861a268798420451fd61b1eac0fef5bff20a14ad24ce4ca3b44c3837d7bec548491c54b3024b352869e1495ba6b4dbbd9d5d45
-
SSDEEP
12288:zMrIy90nvauOsvTOlV/vU7tyS8FrROLfLt8wPjPfV44czWKrO8v26GV+:Pyaau3TOn87tA0Lfh/rfG4VKQ6GV+
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2692-19-0x0000000002430000-0x000000000244A000-memory.dmp healer behavioral1/memory/2692-21-0x0000000004A60000-0x0000000004A78000-memory.dmp healer behavioral1/memory/2692-37-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-47-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-49-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-45-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-43-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-41-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-39-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-35-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-33-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-31-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-29-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-27-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-25-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-23-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/2692-22-0x0000000004A60000-0x0000000004A72000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9155.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9155.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9155.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9155.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9155.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9155.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2824-60-0x00000000023B0000-0x00000000023F6000-memory.dmp family_redline behavioral1/memory/2824-61-0x0000000002670000-0x00000000026B4000-memory.dmp family_redline behavioral1/memory/2824-65-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-63-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-62-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-79-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-95-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-93-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-91-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-89-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-85-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-83-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-81-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-77-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-75-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-73-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-71-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-69-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-67-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/2824-87-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4892 un871247.exe 2692 pro9155.exe 2824 qu3101.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9155.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9155.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 155bd36c434f7864f86b9b8f9df15508dd0382be38c84b7989a87960fb728b2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un871247.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4388 2692 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 155bd36c434f7864f86b9b8f9df15508dd0382be38c84b7989a87960fb728b2b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un871247.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9155.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3101.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2692 pro9155.exe 2692 pro9155.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2692 pro9155.exe Token: SeDebugPrivilege 2824 qu3101.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1660 wrote to memory of 4892 1660 155bd36c434f7864f86b9b8f9df15508dd0382be38c84b7989a87960fb728b2b.exe 83 PID 1660 wrote to memory of 4892 1660 155bd36c434f7864f86b9b8f9df15508dd0382be38c84b7989a87960fb728b2b.exe 83 PID 1660 wrote to memory of 4892 1660 155bd36c434f7864f86b9b8f9df15508dd0382be38c84b7989a87960fb728b2b.exe 83 PID 4892 wrote to memory of 2692 4892 un871247.exe 84 PID 4892 wrote to memory of 2692 4892 un871247.exe 84 PID 4892 wrote to memory of 2692 4892 un871247.exe 84 PID 4892 wrote to memory of 2824 4892 un871247.exe 98 PID 4892 wrote to memory of 2824 4892 un871247.exe 98 PID 4892 wrote to memory of 2824 4892 un871247.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\155bd36c434f7864f86b9b8f9df15508dd0382be38c84b7989a87960fb728b2b.exe"C:\Users\Admin\AppData\Local\Temp\155bd36c434f7864f86b9b8f9df15508dd0382be38c84b7989a87960fb728b2b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un871247.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un871247.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9155.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9155.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 11004⤵
- Program crash
PID:4388
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3101.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3101.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2692 -ip 26921⤵PID:1700
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515KB
MD593ba59381cf3e5a1bccbe28953833886
SHA1d6ceb3b090bcf09969625e60c762773771f5b147
SHA256b88e239d203ac10627ccbb31b756b69847c332ac35cfa845cdfbfa8231a54d6a
SHA512aa502c24f1a076f5a03f49c12dc8e4bd9857641103859a643a7d5d810601bd3c4a3cae1d81fd36098cc9ce5b79c9b7a997d49cc24bb3eaa7a21a1158af9f36d2
-
Filesize
235KB
MD576663c8d3c2ead682a2415456c51ab16
SHA1b7b6283dfd9eccc2276a2bbebd2d1ba2f5d6a953
SHA256859cbf8f68d0146c1ade7d32d1cd14aed3fc09146c786e71e7977596e9498105
SHA512ea4cb032499cfc591db61e16f8baeddf164afc890d360a18472b812a6d0c4cad8f2c12ea3c184510248268690a174f1239ef1b2003e0279d34dd56cc12016734
-
Filesize
294KB
MD55f91ce9a4b28b2902c30896f389ca103
SHA15c545e310614a6944b502277a6673b945063c2d2
SHA256d38b47447ebada36d10f51d4b8ba79ea4f504612ef6e904d7bda2de1c4b0ab46
SHA512be857826770a3b506c5c12339342dd94212e7094b4ed7111308f2c36b42d368a5f374ce041b6f336afbdb2e036f2a47e0809865829555d25bafb5abf7ff007e1