Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:41
Static task
static1
Behavioral task
behavioral1
Sample
30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe
Resource
win10v2004-20241007-en
General
-
Target
30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe
-
Size
690KB
-
MD5
543f09f87d5da63edc098306fc11ac0d
-
SHA1
5ec3ea8635381b80459b610542f78745190296cb
-
SHA256
30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b
-
SHA512
75f596ca12bd684c2b7e2d4be17add7882cf4a44e38c8c07b34e977eb36075045762cb6624af524ebe9e6cfd0b2293f9432a22d266c81267d8a125d0bca0641a
-
SSDEEP
12288:kMrUy905r0fbEFa6W6yb65hLuY8Nf3/r+tv5vFFXUfig+K44E/MgBG7Zq8:IyRjbH3GfaYmfT+B5HXUagK78
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/992-19-0x00000000026C0000-0x00000000026DA000-memory.dmp healer behavioral1/memory/992-21-0x0000000002840000-0x0000000002858000-memory.dmp healer behavioral1/memory/992-49-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-47-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-45-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-44-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-42-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-39-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-37-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-35-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-33-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-31-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-30-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-23-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-22-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-27-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/992-25-0x0000000002840000-0x0000000002852000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1965.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1965.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4072-60-0x0000000005E20000-0x0000000005E66000-memory.dmp family_redline behavioral1/memory/4072-61-0x0000000005F00000-0x0000000005F44000-memory.dmp family_redline behavioral1/memory/4072-67-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-81-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-95-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-93-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-91-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-89-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-87-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-85-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-79-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-77-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-75-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-73-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-71-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-69-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-65-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-83-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-63-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline behavioral1/memory/4072-62-0x0000000005F00000-0x0000000005F3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3276 un553933.exe 992 pro1965.exe 4072 qu0298.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1965.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un553933.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2084 992 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un553933.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1965.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0298.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 992 pro1965.exe 992 pro1965.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 992 pro1965.exe Token: SeDebugPrivilege 4072 qu0298.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2176 wrote to memory of 3276 2176 30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe 83 PID 2176 wrote to memory of 3276 2176 30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe 83 PID 2176 wrote to memory of 3276 2176 30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe 83 PID 3276 wrote to memory of 992 3276 un553933.exe 84 PID 3276 wrote to memory of 992 3276 un553933.exe 84 PID 3276 wrote to memory of 992 3276 un553933.exe 84 PID 3276 wrote to memory of 4072 3276 un553933.exe 97 PID 3276 wrote to memory of 4072 3276 un553933.exe 97 PID 3276 wrote to memory of 4072 3276 un553933.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe"C:\Users\Admin\AppData\Local\Temp\30151bb882c6eb1242cf8bc3d7170af8cb1f8ce7e6d1478157e15be83e556c8b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553933.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553933.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1965.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 10884⤵
- Program crash
PID:2084
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0298.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0298.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 992 -ip 9921⤵PID:2764
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD5030a1889eedc15b6db06a48a81a94b94
SHA1b1d6d771e67c2242a24d802b45db1da13cc69b04
SHA256e9b2ce9f5bc0dd7a2dba3c195f9c607472c26fcae89e8b6bd0d3a3459e7dfcef
SHA512a5b8af1d84ba0b8c8f691d65aab1f7858c58bf18b32ebe017e1ed777ada2443615ca85a6b69cf299aecfa301bbbd337182212503a7625b7a4c69eb453f461b6d
-
Filesize
291KB
MD51e59ecfc08924e2bfc50f57bc09e6fd2
SHA16aa90fb42cf65b5bca8f63aeb14c93a36670d813
SHA256fe4e9d855e3d3a0b5722a5429a464f26585965c68c9c1fac99ea41a83acd5a04
SHA5124317be1dccc72d5b523b8a0277ca70e95449289642fef4186b9cba5de8a830242b609c07429aa2dea8c2cc39bd35471518cb66d64856e3e6fccd1d43d851ef34
-
Filesize
345KB
MD5758b2a3185f77a1b38e2702f7edabb06
SHA19635547fa93f253b585b4a10e5f8bb92dd9cd11a
SHA256efe8004b092176cc3cae2d7588b41d36b87f6027d20b6803af6d36b95d1ca50e
SHA5121910866ede92ccfb3c20f19f368183fc91aa3d5083dc6ae9d3046c0309a1e10d6931e357345a568b42a319e1514c12259fbb2d2ee00a2efb8f3143a24d21a0f0