Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:32
Static task
static1
Behavioral task
behavioral1
Sample
f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696.exe
Resource
win10v2004-20241007-en
General
-
Target
f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696.exe
-
Size
655KB
-
MD5
243c96320a02acea7631c8ac4d19519b
-
SHA1
439e7bf173f6791ea2cf2d1f45afdbae8f562072
-
SHA256
f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696
-
SHA512
eb38da78c22186e3ae3048982a0358c25887d9871b3f9f0e18445aa32cf5976223d4c405a3761b7dcc5be3c51b5d2fd3758e6c8a8c3b0b495b74761aaab4173f
-
SSDEEP
12288:oMrZy90Uu02r3shzl68zBtz/WBcULSTSNI6t1BQ+eaL2p1dH9Y:ByTm3Cl6G/Wq418taLy1dHq
Malware Config
Extracted
redline
ronur
193.233.20.20:4134
-
auth_value
f88f86755a528d4b25f6f3628c460965
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/996-19-0x0000000002340000-0x000000000235A000-memory.dmp healer behavioral1/memory/996-21-0x0000000004B10000-0x0000000004B28000-memory.dmp healer behavioral1/memory/996-47-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-49-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-45-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-43-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-41-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-39-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-37-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-35-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-33-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-31-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-29-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-27-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-25-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-23-0x0000000004B10000-0x0000000004B22000-memory.dmp healer behavioral1/memory/996-22-0x0000000004B10000-0x0000000004B22000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection eoZ74GC10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" eoZ74GC10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" eoZ74GC10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" eoZ74GC10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" eoZ74GC10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" eoZ74GC10.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4400-61-0x00000000024C0000-0x0000000002506000-memory.dmp family_redline behavioral1/memory/4400-62-0x0000000004B60000-0x0000000004BA4000-memory.dmp family_redline behavioral1/memory/4400-66-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-76-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-97-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-94-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-92-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-90-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-88-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-86-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-84-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-82-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-80-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-74-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-72-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-70-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-68-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-78-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-64-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline behavioral1/memory/4400-63-0x0000000004B60000-0x0000000004B9E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4536 rwF90Zi46.exe 996 eoZ74GC10.exe 4400 hKG11gd65.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features eoZ74GC10.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" eoZ74GC10.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" rwF90Zi46.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2084 996 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rwF90Zi46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eoZ74GC10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hKG11gd65.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 996 eoZ74GC10.exe 996 eoZ74GC10.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 996 eoZ74GC10.exe Token: SeDebugPrivilege 4400 hKG11gd65.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1260 wrote to memory of 4536 1260 f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696.exe 83 PID 1260 wrote to memory of 4536 1260 f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696.exe 83 PID 1260 wrote to memory of 4536 1260 f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696.exe 83 PID 4536 wrote to memory of 996 4536 rwF90Zi46.exe 84 PID 4536 wrote to memory of 996 4536 rwF90Zi46.exe 84 PID 4536 wrote to memory of 996 4536 rwF90Zi46.exe 84 PID 4536 wrote to memory of 4400 4536 rwF90Zi46.exe 97 PID 4536 wrote to memory of 4400 4536 rwF90Zi46.exe 97 PID 4536 wrote to memory of 4400 4536 rwF90Zi46.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696.exe"C:\Users\Admin\AppData\Local\Temp\f319df3ebf86e47b79d8b1c8c6ea61656b7438a385f97f96063ea573923da696.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rwF90Zi46.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\rwF90Zi46.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eoZ74GC10.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eoZ74GC10.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 996 -s 10804⤵
- Program crash
PID:2084
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hKG11gd65.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\hKG11gd65.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 996 -ip 9961⤵PID:1988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
511KB
MD52f08e356b715855dabd3c11ee67a6149
SHA1dcb08bcc7526ee93a354830383b9a3c33d78f42d
SHA256fbdeebe1e4796f7825c10ca86838bda17809bb22bb0919a6b9d2818e9698faa8
SHA51282da7fd31c8bd78edea7396ce8597ea6a786d4e33ae3a6dbf369865691843fb7adfe16fc08863088cc2776941ab71c8fab5b6e9ecaa7178c1a385a7ee535a816
-
Filesize
216KB
MD5489d8385f7f76ef51770e0168a81088d
SHA1357aac634423bafdce89f49b7d2c38eebbc1b5c3
SHA256442d79bd1f9fb6f13997fe528edeab3f9cb5f4efe506b45a2f4f87b5188b5b7f
SHA5122223f7ee33853225c31aa26008011a4bd7f7bbf6fcfc4a2f3eddf2da30f77a21a21904e6d6d1472b65469ce90bf1cf223ab5111ca8b485e0a50251931c41cbe5
-
Filesize
275KB
MD54273205b1d726879e61ee6ff47875e81
SHA11c3dea7548d78efe6332443ecfbcb01b057ecc3e
SHA256f2486a347fb6acb13c1ff3023cfa296c558c97b3d4f118fbfa8fa65153935e47
SHA512bd0d8437a775a2ae6245ef4d00cb69ddfeb9330677076d611e92bfbbdfe7c7328f62f76a3d4b90743a08ad28a2828980bdb2e6d390da8ffb5a4ed1e6c0205dda