Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5.exe
Resource
win10v2004-20241007-en
General
-
Target
15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5.exe
-
Size
689KB
-
MD5
6ab6085373c94c50c83e01c8e614eef7
-
SHA1
c82e4bb09dd06224bb7ecd0b638f05187725266c
-
SHA256
15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5
-
SHA512
13e5904134a8dbb82a72890c6ace75f5059afb7fb99964742095fdc485fafdca43edfbd390938f0663349421b19fb8db665292cb1627dc8d33f110831a2a82d7
-
SSDEEP
12288:oMrxy90GXz6FubYqomGj3JeylgG1lvaNtZDce6mzkqGNMEyEvxJmR/4FiR9yAI:ZyhDBkqMkyfliNtZDceXGNlyEvSRRR98
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2748-19-0x00000000024B0000-0x00000000024CA000-memory.dmp healer behavioral1/memory/2748-21-0x0000000004EE0000-0x0000000004EF8000-memory.dmp healer behavioral1/memory/2748-22-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-49-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-47-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-45-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-43-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-41-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-39-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-37-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-35-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-33-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-31-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-29-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-27-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-25-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/2748-23-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1746.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1746.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2060-60-0x0000000002790000-0x00000000027D6000-memory.dmp family_redline behavioral1/memory/2060-61-0x00000000053D0000-0x0000000005414000-memory.dmp family_redline behavioral1/memory/2060-65-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-77-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-95-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-94-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-91-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-89-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-88-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-85-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-83-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-82-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-79-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-75-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-73-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-71-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-69-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-67-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-63-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/2060-62-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4352 un137388.exe 2748 pro1746.exe 2060 qu3487.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1746.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1746.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un137388.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3524 2748 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un137388.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1746.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3487.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2748 pro1746.exe 2748 pro1746.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2748 pro1746.exe Token: SeDebugPrivilege 2060 qu3487.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 648 wrote to memory of 4352 648 15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5.exe 83 PID 648 wrote to memory of 4352 648 15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5.exe 83 PID 648 wrote to memory of 4352 648 15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5.exe 83 PID 4352 wrote to memory of 2748 4352 un137388.exe 84 PID 4352 wrote to memory of 2748 4352 un137388.exe 84 PID 4352 wrote to memory of 2748 4352 un137388.exe 84 PID 4352 wrote to memory of 2060 4352 un137388.exe 95 PID 4352 wrote to memory of 2060 4352 un137388.exe 95 PID 4352 wrote to memory of 2060 4352 un137388.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5.exe"C:\Users\Admin\AppData\Local\Temp\15dab570b7925b4068bb95808ff69fc7e33b46d14b6ea6eef27c690b13b30dd5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un137388.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un137388.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1746.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1746.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 10804⤵
- Program crash
PID:3524
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3487.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3487.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2748 -ip 27481⤵PID:1720
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5bea48d6a45dcb05f0b2b5189a77a5776
SHA1a84a84339597338ae1ef9c8f6daf7bd73be4177e
SHA256a1091842504cc19c71b8cb733503f254a30539a1ef34ef8b3745c982eb180d66
SHA512d8418d6dc0062f1f9b794d0d2bef7c4af2fde1d7ef381d1537d29c9568ac50ecc6e27cd6723ced02b97e34fcdc2070e04ef4d89112e5f855a89d1cf4aa0639a2
-
Filesize
314KB
MD51815f0daffa4108d09bd4d0436a197db
SHA1af6281943eada70f1f9a23ebff3e58f87bbf38d4
SHA256b526a4f2116aff03728ead3c45e6ddb238b82ceebb7b5d297edb617ebaefc3c5
SHA51220d8108a30e282422711938920938a7987d6871c6040ae8008d781ba653942c3a3a41b50e901a70460c1fa9a6d57510ab8be43c8548882f25f6a68eac5e4555c
-
Filesize
372KB
MD5e64735a2b77b531a1af3e2db3b517826
SHA10fcb5a4a664416766bc32e35f07fc6f107dd0f75
SHA2566bff34b616bffdc43f2558bd13e4d1377bdef393329b16039ef87e3a0dbe906f
SHA51277f5a653537b358074bfe4dfb7225d91e55be4ecd334b7df9ce002ff8656257df9f8fcdb638c6244b4ee5053b826c77d7e9094c457fe2c9626b75fd89a8ddc73