Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:36
Static task
static1
Behavioral task
behavioral1
Sample
e98c4b6041c1fa4212661a608913d3a7a36d06bf69d3b0dc7387080946cfdcf7.exe
Resource
win10v2004-20241007-en
General
-
Target
e98c4b6041c1fa4212661a608913d3a7a36d06bf69d3b0dc7387080946cfdcf7.exe
-
Size
665KB
-
MD5
cdc330baf0ac01f5018bb1cf511266f6
-
SHA1
7d82fcaf4b6fb09d56cf0c23b59aad941f5aea54
-
SHA256
e98c4b6041c1fa4212661a608913d3a7a36d06bf69d3b0dc7387080946cfdcf7
-
SHA512
d424f40cdd8e5362202205ee3125a54612de1ae07d00d821fb619b71b2002696b974e6aed58df5c268f5136bfe875fa35d35cf504e6b3592a3a54fbf2f9b6043
-
SSDEEP
12288:CMrty90DBduM6NdD3cNuF5WjcBicjk7kqpRWqjrUBHg/w/GXL5L9fa2:byMBUM6DEucwhjk7kqrjroOw+XL5L9y2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3756-19-0x0000000002590000-0x00000000025AA000-memory.dmp healer behavioral1/memory/3756-21-0x0000000002940000-0x0000000002958000-memory.dmp healer behavioral1/memory/3756-22-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-41-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-49-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-47-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-45-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-43-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-39-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-37-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-35-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-33-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-31-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-29-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-27-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-25-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/3756-23-0x0000000002940000-0x0000000002952000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9917.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/5068-60-0x00000000025F0000-0x0000000002636000-memory.dmp family_redline behavioral1/memory/5068-61-0x0000000004DE0000-0x0000000004E24000-memory.dmp family_redline behavioral1/memory/5068-69-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-93-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-81-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-67-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-65-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-63-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-62-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-95-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-91-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-89-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-87-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-85-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-83-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-79-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-77-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-75-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-73-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/5068-71-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4820 un085804.exe 3756 pro9917.exe 5068 qu2223.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9917.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9917.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e98c4b6041c1fa4212661a608913d3a7a36d06bf69d3b0dc7387080946cfdcf7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un085804.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4916 3756 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9917.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2223.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e98c4b6041c1fa4212661a608913d3a7a36d06bf69d3b0dc7387080946cfdcf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un085804.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3756 pro9917.exe 3756 pro9917.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3756 pro9917.exe Token: SeDebugPrivilege 5068 qu2223.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4888 wrote to memory of 4820 4888 e98c4b6041c1fa4212661a608913d3a7a36d06bf69d3b0dc7387080946cfdcf7.exe 84 PID 4888 wrote to memory of 4820 4888 e98c4b6041c1fa4212661a608913d3a7a36d06bf69d3b0dc7387080946cfdcf7.exe 84 PID 4888 wrote to memory of 4820 4888 e98c4b6041c1fa4212661a608913d3a7a36d06bf69d3b0dc7387080946cfdcf7.exe 84 PID 4820 wrote to memory of 3756 4820 un085804.exe 85 PID 4820 wrote to memory of 3756 4820 un085804.exe 85 PID 4820 wrote to memory of 3756 4820 un085804.exe 85 PID 4820 wrote to memory of 5068 4820 un085804.exe 95 PID 4820 wrote to memory of 5068 4820 un085804.exe 95 PID 4820 wrote to memory of 5068 4820 un085804.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\e98c4b6041c1fa4212661a608913d3a7a36d06bf69d3b0dc7387080946cfdcf7.exe"C:\Users\Admin\AppData\Local\Temp\e98c4b6041c1fa4212661a608913d3a7a36d06bf69d3b0dc7387080946cfdcf7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un085804.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un085804.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9917.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9917.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 10884⤵
- Program crash
PID:4916
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2223.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2223.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3756 -ip 37561⤵PID:3320
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD5d323c89ca1291b52d3de0a62287b7a34
SHA149a5765d6850fe9e9884712aad43266170c85381
SHA256402467a6318c0ba553ca596ed7dc72890b7732d03c14e5790b2bba2ec91bc2b2
SHA5128ada4c8695677a18b548c7c51cc2a0a3065cab478e565c0a73894e476e8f0ba710bf5e8af8779da4b16c263b877554d06170b0eb6299abbc59ff0d7e0591d6e2
-
Filesize
294KB
MD532e52d08014191dfc49bd276ad6ab449
SHA1bc0f04612a25a441b7fdf4cd3e2c21e00f8a541e
SHA256fd8a8b9686e3d30118d79cf73e21514a604cca5b4355e59fcf4d502d88a8db74
SHA5124103a034fead5657f72371a4790124d793e27da85099e5fa9686af141c41bdc9ea84c54bd5acb33b1e7f1fae28ee0f9ca133038ede82a571e4c972d9d15684b3
-
Filesize
352KB
MD5567cc9a35eb3ec0c495c69f7429ee827
SHA1adf4d27b9066c89c182235d79c98250d57b99386
SHA2569aa607cf93d086d8c32d38cadf35689208696531186d1aff0f8d3bca53e0527e
SHA51262df385202546519fce8e9320f69742bed7285499e3fc63bd699ff5db2abad86c74f0a3a3430b7c4492a43f8390cdef2aec14c9eb2795f8cc6cbcb7698f56b39