Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
074c279482af463c7cdbafa7889ffaf52be4703e8704c265a70759e3a964727a.exe
Resource
win10v2004-20241007-en
General
-
Target
074c279482af463c7cdbafa7889ffaf52be4703e8704c265a70759e3a964727a.exe
-
Size
688KB
-
MD5
746f59d383c1c18ae35e82ed3bf83937
-
SHA1
4145467513678a0a78c44820b3ad56f8c96f6fcf
-
SHA256
074c279482af463c7cdbafa7889ffaf52be4703e8704c265a70759e3a964727a
-
SHA512
030d58a7a0d438efdc8fe0685ce30ffd1eeeb80f34792a88d6774cc55ebf2a18e8214186eae89541aa1cc0352b931f474ec039bdfce1ba9ad95cce0d61ba5ff5
-
SSDEEP
12288:VMrsy90Dvm0iQXPI2tLNcG2ly2Gdqihczhikol6HSmWyTbKIN:Fy8vmUX3L5yy2GlczPoluSkWE
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3532-17-0x0000000004980000-0x000000000499A000-memory.dmp healer behavioral1/memory/3532-20-0x0000000007250000-0x0000000007268000-memory.dmp healer behavioral1/memory/3532-28-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-48-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-47-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-44-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-42-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-40-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-38-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-36-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-34-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-32-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-30-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-24-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-22-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-21-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3532-26-0x0000000007250000-0x0000000007262000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1462.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2972-59-0x0000000004A50000-0x0000000004A96000-memory.dmp family_redline behavioral1/memory/2972-60-0x0000000007790000-0x00000000077D4000-memory.dmp family_redline behavioral1/memory/2972-68-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-95-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-92-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-90-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-89-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-86-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-84-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-83-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-80-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-78-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-77-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-74-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-72-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-71-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-66-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-64-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-62-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline behavioral1/memory/2972-61-0x0000000007790000-0x00000000077CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1548 un944276.exe 3532 pro1462.exe 2972 qu0851.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1462.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1462.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un944276.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 074c279482af463c7cdbafa7889ffaf52be4703e8704c265a70759e3a964727a.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5112 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1332 3532 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0851.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 074c279482af463c7cdbafa7889ffaf52be4703e8704c265a70759e3a964727a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un944276.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1462.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3532 pro1462.exe 3532 pro1462.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3532 pro1462.exe Token: SeDebugPrivilege 2972 qu0851.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5108 wrote to memory of 1548 5108 074c279482af463c7cdbafa7889ffaf52be4703e8704c265a70759e3a964727a.exe 83 PID 5108 wrote to memory of 1548 5108 074c279482af463c7cdbafa7889ffaf52be4703e8704c265a70759e3a964727a.exe 83 PID 5108 wrote to memory of 1548 5108 074c279482af463c7cdbafa7889ffaf52be4703e8704c265a70759e3a964727a.exe 83 PID 1548 wrote to memory of 3532 1548 un944276.exe 84 PID 1548 wrote to memory of 3532 1548 un944276.exe 84 PID 1548 wrote to memory of 3532 1548 un944276.exe 84 PID 1548 wrote to memory of 2972 1548 un944276.exe 95 PID 1548 wrote to memory of 2972 1548 un944276.exe 95 PID 1548 wrote to memory of 2972 1548 un944276.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\074c279482af463c7cdbafa7889ffaf52be4703e8704c265a70759e3a964727a.exe"C:\Users\Admin\AppData\Local\Temp\074c279482af463c7cdbafa7889ffaf52be4703e8704c265a70759e3a964727a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944276.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944276.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1462.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1462.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 10764⤵
- Program crash
PID:1332
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0851.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0851.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3532 -ip 35321⤵PID:4908
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
546KB
MD597411c296e16b8b8e1a8be6845f8d6b9
SHA10067f6a0f459ca6779f5e04ad08d2eee7aca964f
SHA256eff87dc1e4c67b22b5795db945a6791d9ee498d2712b6c49dfeaaaaffc2f77ca
SHA512165703bd5da08bbf3c9aa8f8bdb048e96e36327b7b88373bd6497034f8990074afe20a6e1142bbb9829a269f7a82c72e941808aaed4ec8f8536f93fddb37a808
-
Filesize
328KB
MD5db64d06de661fa804a68bf9863ef6df6
SHA1463619a74a7a72d513560901fb4526bb6b2b3bc8
SHA256fabf8ff0015154e3c2e6747b30bb9beaa26b6f6bcc28c4669cfe3837a7cf8dd2
SHA512bfba769b10d2a7c2fe5f234e15aa0d2d8508434ceb0c5a6efab0bb9e1fac6393ca1e73c21f336a3ac71580ec60e8e8cd562487d1a6a77ab0e0b28084500fb6fd
-
Filesize
385KB
MD545c34b472bafaf4256b3f4627df8ccd8
SHA18f56b9472d9142ddcbad8fd7e7b2f43b519c2d06
SHA256b3dfa1979163a5c41d2e22b07b22abb46a0329037d4f3fe58978ee7dc23ccaa0
SHA512be43f1f23e741dd39dd2a127b4d9eed2265dd5b28f7689431c69060ece1b02af5cbf6af1dd222342789d72b6c646a37729e7d0fbe9bdbe0531521a3256e8ceb0