Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:45
Static task
static1
Behavioral task
behavioral1
Sample
e32a929f314eafc503a5e9f03732b514ea9ac76e0841d1c403cef54c565fd75d.exe
Resource
win10v2004-20241007-en
General
-
Target
e32a929f314eafc503a5e9f03732b514ea9ac76e0841d1c403cef54c565fd75d.exe
-
Size
662KB
-
MD5
36d1a4ff3c56fc05a292ddbe6e3c7381
-
SHA1
2a59cb69ebf1316a1c1a4e5b7609a8670cc9b5ac
-
SHA256
e32a929f314eafc503a5e9f03732b514ea9ac76e0841d1c403cef54c565fd75d
-
SHA512
d81e33325fd5a46b828668d65e1af1e57af422c5398b18863aed5ccd54a692dc86573fa0e2af990e926299b9b7a969088baefe49a2c47ec8424ea3a175267a59
-
SSDEEP
12288:PMryy90yyQfEPgH6VqPpxVyr8YAQjwK6IPu33B8oVe2qtd8HDVHNJG:pyN3wGpxVyIY/jwKMqoVe2qtdo5HNw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/5096-19-0x00000000049D0000-0x00000000049EA000-memory.dmp healer behavioral1/memory/5096-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/5096-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-41-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-30-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/5096-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8348.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8348.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2280-61-0x00000000024D0000-0x0000000002516000-memory.dmp family_redline behavioral1/memory/2280-62-0x0000000002570000-0x00000000025B4000-memory.dmp family_redline behavioral1/memory/2280-68-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-74-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-96-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-94-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-92-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-88-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-86-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-84-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-83-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-80-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-78-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-76-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-72-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-71-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-90-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-66-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-64-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline behavioral1/memory/2280-63-0x0000000002570000-0x00000000025AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3944 un782490.exe 5096 pro8348.exe 2280 qu4790.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8348.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e32a929f314eafc503a5e9f03732b514ea9ac76e0841d1c403cef54c565fd75d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un782490.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1672 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8348.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4790.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e32a929f314eafc503a5e9f03732b514ea9ac76e0841d1c403cef54c565fd75d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un782490.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5096 pro8348.exe 5096 pro8348.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5096 pro8348.exe Token: SeDebugPrivilege 2280 qu4790.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1952 wrote to memory of 3944 1952 e32a929f314eafc503a5e9f03732b514ea9ac76e0841d1c403cef54c565fd75d.exe 83 PID 1952 wrote to memory of 3944 1952 e32a929f314eafc503a5e9f03732b514ea9ac76e0841d1c403cef54c565fd75d.exe 83 PID 1952 wrote to memory of 3944 1952 e32a929f314eafc503a5e9f03732b514ea9ac76e0841d1c403cef54c565fd75d.exe 83 PID 3944 wrote to memory of 5096 3944 un782490.exe 84 PID 3944 wrote to memory of 5096 3944 un782490.exe 84 PID 3944 wrote to memory of 5096 3944 un782490.exe 84 PID 3944 wrote to memory of 2280 3944 un782490.exe 96 PID 3944 wrote to memory of 2280 3944 un782490.exe 96 PID 3944 wrote to memory of 2280 3944 un782490.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\e32a929f314eafc503a5e9f03732b514ea9ac76e0841d1c403cef54c565fd75d.exe"C:\Users\Admin\AppData\Local\Temp\e32a929f314eafc503a5e9f03732b514ea9ac76e0841d1c403cef54c565fd75d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un782490.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un782490.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8348.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8348.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4790.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4790.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5dddb7fbfe17131f4429ce3a3d91fe0ae
SHA1484f878dd43a6ea83420d8e968ce5a29bb47f49a
SHA25697c4959db795fb03375829e9033c654d682304191422eab3ae40daa22e5b4df5
SHA5121ede20cce306568055287897299d484634c8d4b604161371bb5a5716ba679eb0d109f6ca97aeacbaf08f2a80fb3104a73958f488614585b23ade1bc6aaf11343
-
Filesize
236KB
MD58bc6d8b0c7e75fc98f05f101755f96ef
SHA1f47cbf03b55f989f17b582939491bcca898a03b9
SHA25692e12e0d598fcea764891f0787294d68d6d5555e51f8110a534391f305dc89f9
SHA51278a88b6a97210802d9aa3cf47ccf6b94bda23e5fb90dfe433f6ac7b8b524e46066fca90e7ba48de2d9cf6e463d2a84eac61277d1a8715c609901ce1f484ae760
-
Filesize
295KB
MD5e54b131def39b696478ddf287306e47a
SHA1890d40dc214be25f965dabe0dbffac1b113a64ea
SHA256ece34eaacaffa89ca67dff538ba6c33921277b1ea6cab96075fd2e7ade7a1203
SHA51237d56e73cae2077664b808e224038d079fc56196fe19396116876472832b692871953acebd6e917db3b4605181bf38949a22e00eef912a48e4a0ad4b463527fe