Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
c4fab6d95b7d02b1ad30ab5b8d8dcd6ebe4adcfbea2c80246ef5c4990e3dc959.exe
Resource
win10v2004-20241007-en
General
-
Target
c4fab6d95b7d02b1ad30ab5b8d8dcd6ebe4adcfbea2c80246ef5c4990e3dc959.exe
-
Size
684KB
-
MD5
bc48d9db778e502df154a423256683ea
-
SHA1
5ec6daae377f70703edfcea5535b0270bbe559d8
-
SHA256
c4fab6d95b7d02b1ad30ab5b8d8dcd6ebe4adcfbea2c80246ef5c4990e3dc959
-
SHA512
1128854d71e7160328425231d0c648f46ceafc41464b83b24d0b0355345902377710258b43b819f798f83f8451e45b1dbe1a03d2c0ce8166e7b0373567b80a5c
-
SSDEEP
12288:nMrEy90ofsrP+vyxzOHXgz9l2kGBCyaxmjXN+uqMZj6TtknH:zycrPFOHWl2P4KXN+uqqGm
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4384-18-0x0000000004890000-0x00000000048AA000-memory.dmp healer behavioral1/memory/4384-20-0x0000000007110000-0x0000000007128000-memory.dmp healer behavioral1/memory/4384-37-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-46-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-44-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-42-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-40-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-39-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-34-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-48-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-32-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-30-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-28-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-26-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-24-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-22-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/4384-21-0x0000000007110000-0x0000000007122000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7360.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7360.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1420-60-0x0000000004B90000-0x0000000004BD6000-memory.dmp family_redline behavioral1/memory/1420-61-0x00000000071A0000-0x00000000071E4000-memory.dmp family_redline behavioral1/memory/1420-62-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-64-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-95-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-93-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-91-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-89-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-87-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-85-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-83-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-81-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-79-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-77-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-76-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-73-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-71-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-70-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-67-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline behavioral1/memory/1420-65-0x00000000071A0000-0x00000000071DE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3792 un546845.exe 4384 pro7360.exe 1420 qu3730.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7360.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7360.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c4fab6d95b7d02b1ad30ab5b8d8dcd6ebe4adcfbea2c80246ef5c4990e3dc959.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un546845.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3730.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4fab6d95b7d02b1ad30ab5b8d8dcd6ebe4adcfbea2c80246ef5c4990e3dc959.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un546845.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7360.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4384 pro7360.exe 4384 pro7360.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4384 pro7360.exe Token: SeDebugPrivilege 1420 qu3730.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 932 wrote to memory of 3792 932 c4fab6d95b7d02b1ad30ab5b8d8dcd6ebe4adcfbea2c80246ef5c4990e3dc959.exe 83 PID 932 wrote to memory of 3792 932 c4fab6d95b7d02b1ad30ab5b8d8dcd6ebe4adcfbea2c80246ef5c4990e3dc959.exe 83 PID 932 wrote to memory of 3792 932 c4fab6d95b7d02b1ad30ab5b8d8dcd6ebe4adcfbea2c80246ef5c4990e3dc959.exe 83 PID 3792 wrote to memory of 4384 3792 un546845.exe 84 PID 3792 wrote to memory of 4384 3792 un546845.exe 84 PID 3792 wrote to memory of 4384 3792 un546845.exe 84 PID 3792 wrote to memory of 1420 3792 un546845.exe 93 PID 3792 wrote to memory of 1420 3792 un546845.exe 93 PID 3792 wrote to memory of 1420 3792 un546845.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4fab6d95b7d02b1ad30ab5b8d8dcd6ebe4adcfbea2c80246ef5c4990e3dc959.exe"C:\Users\Admin\AppData\Local\Temp\c4fab6d95b7d02b1ad30ab5b8d8dcd6ebe4adcfbea2c80246ef5c4990e3dc959.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un546845.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un546845.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7360.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7360.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3730.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3730.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
542KB
MD509e28176b47c90cd8e99298b6e79e6bf
SHA15f57d4ff9ad32367cb49b09f98f6758ce23e1997
SHA2560cac21a953b85e1d857e22ff1f10f0bc0c25c2e06680f53b3a584c49a9f78e99
SHA512451b07983e8769fcf9916b25333d1371819b9a3e8a9737d54c9d372f3e418d5df3bd026c6ac26843d24b49f13dfdb5fa5da2f8bb987c5ea9f4835063556669cc
-
Filesize
322KB
MD5df017b65eac0eb6616eeacd4edfeeb60
SHA1934ac85f653221d02cc4b719a3161a25ad83b8b6
SHA256a4c70b3146c4257718cdf3d87090bda84204431d4dd556aefce4ec82c0002774
SHA51224f360c67b65632a89c4f15174801bbbaa984490d9f16ef812afc3cc0e9bf668dee5ca22b5c5d5856ec8a05fc980782d5f788d0a15a8fbc2b70e3ca3178a4b36
-
Filesize
379KB
MD5467183a6ca6d6cbe8f608dc28b241a76
SHA1489040a3727548037736696586f8d19d329092b9
SHA25626804786c88845c69a6fe51e3e1621535540d88295499347277837775e2b7f80
SHA5123896d6ad3d4052e045062e93ace7e145fa86a6e0bd263638c23d958bba0f098e8abd97c4f3048d1664f0d0c4feb9962058b9e8d28a6ce9a53b5e8ff3f504e544