Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:40
Static task
static1
Behavioral task
behavioral1
Sample
856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe
Resource
win10v2004-20241007-en
General
-
Target
856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe
-
Size
685KB
-
MD5
18fa5994fe0a4e1b5ecadf4339035bcd
-
SHA1
30092438ffb30146d244f6ad8d95c9e1319664f8
-
SHA256
856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93
-
SHA512
4e666583b32c3a310a4efe02ba882cb3e9f638ee6452b572ba2e71154ad737132b5d3fe37b6ad1d9dfeb62976e352ab2f07bdf4866be9887327ec2f7b337bd95
-
SSDEEP
12288:/Mrwy90T/w5bEl1X5RJSkPKyz0GmfqwwvvwUBKYiEnVBZ8UN:DyM/JVRrKy7mfqLXYYiEvZBN
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3828-19-0x00000000024A0000-0x00000000024BA000-memory.dmp healer behavioral1/memory/3828-21-0x0000000005260000-0x0000000005278000-memory.dmp healer behavioral1/memory/3828-37-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-49-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-47-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-45-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-43-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-41-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-39-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-35-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-33-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-29-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-25-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-23-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-31-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-27-0x0000000005260000-0x0000000005272000-memory.dmp healer behavioral1/memory/3828-22-0x0000000005260000-0x0000000005272000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3990.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/652-61-0x0000000004CE0000-0x0000000004D26000-memory.dmp family_redline behavioral1/memory/652-62-0x0000000004D60000-0x0000000004DA4000-memory.dmp family_redline behavioral1/memory/652-66-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-76-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-97-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-94-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-92-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-90-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-88-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-86-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-84-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-82-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-80-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-74-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-72-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-70-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-68-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-78-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-64-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline behavioral1/memory/652-63-0x0000000004D60000-0x0000000004D9E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4516 un377617.exe 3828 pro3990.exe 652 qu3742.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3990.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3990.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un377617.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1276 3828 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un377617.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3990.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3742.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3828 pro3990.exe 3828 pro3990.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3828 pro3990.exe Token: SeDebugPrivilege 652 qu3742.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5044 wrote to memory of 4516 5044 856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe 83 PID 5044 wrote to memory of 4516 5044 856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe 83 PID 5044 wrote to memory of 4516 5044 856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe 83 PID 4516 wrote to memory of 3828 4516 un377617.exe 85 PID 4516 wrote to memory of 3828 4516 un377617.exe 85 PID 4516 wrote to memory of 3828 4516 un377617.exe 85 PID 4516 wrote to memory of 652 4516 un377617.exe 95 PID 4516 wrote to memory of 652 4516 un377617.exe 95 PID 4516 wrote to memory of 652 4516 un377617.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe"C:\Users\Admin\AppData\Local\Temp\856fc10fc4ffc2d24670e1d06998b7647c7739df7421285a53f46f227a1b2d93.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un377617.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un377617.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3990.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3990.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 10924⤵
- Program crash
PID:1276
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3742.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3742.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 3828 -ip 38281⤵PID:1772
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD574abde217ee41cd2d5fcaf45077a1393
SHA13ffe9a660bc1f0da66e7e57426d222041c65867b
SHA2569aabec782378d100e34a24357b8589fd94ef21629d623780bc22fcc046023e9e
SHA512b4d7586d75bf75b76114e4421e3e403c97a171b362adb4d24a6d18877379861c8c60fea50f2bd9ec2318fe1de29e2d45f608bc0c4c640844aa1052f0a5d88b4d
-
Filesize
292KB
MD520e9652e47b2cbb64e87953d6c03c943
SHA1c4d4e8eb05152932ed50c2f7338609bcab61b3f2
SHA256fd06cad2551968f58c060292ac16e11373727ed82ff6ead5079207e80fbca1d0
SHA512d0548df90fca251d304afe52ba835e74648ca7070e7dee9e610910f63a55f4428c7b8b5c7262b45ae32642dfee64ec71ded31c7cb1e21ebb01c194e211b15eca
-
Filesize
350KB
MD5dccd45a8ef6d57ab657f8ab2d86a06b1
SHA12c3f7af875f3716cff348f3c0204fd219f3a10e5
SHA25611f91c7b26911bda11c70e53db97d10452920fbbdb94e9dde4c18ebe444d1863
SHA5129974513ac5d5cc4994b6c588483aeee8748d2e1570d8124200498d0087aaffc7c6872519267bb8136498b7cdc539044638a94f797fbfe83f1239b8386c8209e8