Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
2b2d96aa257f42569bfbc7094765a7c6f3828b9065b26ece9e43a710cc60e746.exe
Resource
win10v2004-20241007-en
General
-
Target
2b2d96aa257f42569bfbc7094765a7c6f3828b9065b26ece9e43a710cc60e746.exe
-
Size
695KB
-
MD5
58d4919c391f2f1aa0f7601e0b8d8b8b
-
SHA1
9119e2c505a44f988e7f801ba535f981d0e514f5
-
SHA256
2b2d96aa257f42569bfbc7094765a7c6f3828b9065b26ece9e43a710cc60e746
-
SHA512
c2e9081f2c28ba4e097840c4a22bae87a68f42fa8167e1164d9b8ed25a26da837c5220fc2e0d50f79849870d24c1a4b3320252ed04ee51e8ee6886981acf5ea0
-
SSDEEP
12288:iMrVy90kgrsofR8XQVVGMvZ/vQQaDzhO82GfMvV4SeZOC8BLi:fyBisofR8XQyMvBvQQOVO8ff81e1ei
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4248-17-0x0000000002F90000-0x0000000002FAA000-memory.dmp healer behavioral1/memory/4248-20-0x0000000004D00000-0x0000000004D18000-memory.dmp healer behavioral1/memory/4248-24-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-42-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-48-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-46-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-44-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-40-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-38-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-36-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-34-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-32-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-30-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-28-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-26-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-22-0x0000000004D00000-0x0000000004D12000-memory.dmp healer behavioral1/memory/4248-21-0x0000000004D00000-0x0000000004D12000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8527.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8527.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2900-59-0x00000000070F0000-0x0000000007136000-memory.dmp family_redline behavioral1/memory/2900-60-0x00000000071B0000-0x00000000071F4000-memory.dmp family_redline behavioral1/memory/2900-66-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-64-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-62-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-61-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-72-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-92-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-90-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-88-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-86-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-84-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-82-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-80-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-76-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-74-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-71-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-68-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-94-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/2900-78-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2488 un896750.exe 4248 pro8527.exe 2900 qu1411.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8527.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8527.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2b2d96aa257f42569bfbc7094765a7c6f3828b9065b26ece9e43a710cc60e746.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un896750.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5708 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4676 4248 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b2d96aa257f42569bfbc7094765a7c6f3828b9065b26ece9e43a710cc60e746.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un896750.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8527.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1411.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4248 pro8527.exe 4248 pro8527.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4248 pro8527.exe Token: SeDebugPrivilege 2900 qu1411.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2488 1120 2b2d96aa257f42569bfbc7094765a7c6f3828b9065b26ece9e43a710cc60e746.exe 83 PID 1120 wrote to memory of 2488 1120 2b2d96aa257f42569bfbc7094765a7c6f3828b9065b26ece9e43a710cc60e746.exe 83 PID 1120 wrote to memory of 2488 1120 2b2d96aa257f42569bfbc7094765a7c6f3828b9065b26ece9e43a710cc60e746.exe 83 PID 2488 wrote to memory of 4248 2488 un896750.exe 84 PID 2488 wrote to memory of 4248 2488 un896750.exe 84 PID 2488 wrote to memory of 4248 2488 un896750.exe 84 PID 2488 wrote to memory of 2900 2488 un896750.exe 95 PID 2488 wrote to memory of 2900 2488 un896750.exe 95 PID 2488 wrote to memory of 2900 2488 un896750.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b2d96aa257f42569bfbc7094765a7c6f3828b9065b26ece9e43a710cc60e746.exe"C:\Users\Admin\AppData\Local\Temp\2b2d96aa257f42569bfbc7094765a7c6f3828b9065b26ece9e43a710cc60e746.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un896750.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un896750.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8527.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8527.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 10204⤵
- Program crash
PID:4676
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1411.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4248 -ip 42481⤵PID:4332
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5708
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD580d520700effc6e3f796b8c2f236d745
SHA1ca876cbb0b24de7f4e2693cfc169ae64fd25be4f
SHA256441c3bc6a81d2f737287440250675a4ce47477dd3a84342025f066a4c855441d
SHA512efe0e9503ada689801e303ebade9fda4ac078bf206a0b02fda887cfffc75bd80b2f1987df21a1b17e4a24c88246c59cf322cd0661dcff1fda11d9194c3a885fb
-
Filesize
347KB
MD56df3692b135dbf43d069fde9b69832f2
SHA1a72f4366aa453c254668c79854ecd66be9ab3b7e
SHA256e6766606122e1bcb65367b05b873e4194f318f251c6328914347d91f8b26ab24
SHA512ea6f52cc4657df381a7fe3c7955f659ae5ad2ab99e65db231f4fea7349dd632ae00bebf797ce5b442a595af9ed269584677a06f1dadc78be60d5fc01c3003443
-
Filesize
405KB
MD5af54ad6fd14c894b391e1fa742f3590e
SHA1d972f525128059d89c0cf28d2b0a06739e3c363d
SHA256557e83b0b62591ff8f5498db4c79cd25984c563c63a7cac74de1a761361c493a
SHA5128fb0dc2dd8ac66e86a43de45ef9100d05566448ae2b115bdd9dce070534f8f61859a740ffb0f3d46348aff763c13f42ca0d490e1befcde44d3abc25230e27efe