Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:02
Static task
static1
Behavioral task
behavioral1
Sample
f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8.exe
Resource
win10v2004-20241007-en
General
-
Target
f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8.exe
-
Size
690KB
-
MD5
b3292a8356a01b927c95d1655d48c706
-
SHA1
b09d9a1491b9fdd91606791e1c8a13aa555530ef
-
SHA256
f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8
-
SHA512
bbdfa56192a310d1e21adc64157da82f41f3d81ecc987862b8aa2f2b5a821e5e836acfceb959e73d4f6281543dc46b6a2223751306f489620e772e80c9a76a20
-
SSDEEP
12288:FMrwy90g9JkRVqrSWxXl7kipnaCv4p8LvW/16PZhqsjHGK2yJ4:9yfYRipnj7lhryxv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4372-19-0x0000000002770000-0x000000000278A000-memory.dmp healer behavioral1/memory/4372-21-0x00000000027A0000-0x00000000027B8000-memory.dmp healer behavioral1/memory/4372-37-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-49-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-47-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-35-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-33-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-31-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-29-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-27-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-45-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-43-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-25-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-41-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-39-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-23-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/4372-22-0x00000000027A0000-0x00000000027B2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5271.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5271.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3052-60-0x00000000029F0000-0x0000000002A36000-memory.dmp family_redline behavioral1/memory/3052-61-0x0000000004E00000-0x0000000004E44000-memory.dmp family_redline behavioral1/memory/3052-75-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-78-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-95-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-93-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-91-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-89-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-87-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-83-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-82-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-79-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-73-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-72-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-69-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-67-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-65-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-85-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-63-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3052-62-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2780 un742467.exe 4372 pro5271.exe 3052 qu6433.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5271.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5271.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un742467.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4824 4372 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un742467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5271.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6433.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4372 pro5271.exe 4372 pro5271.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4372 pro5271.exe Token: SeDebugPrivilege 3052 qu6433.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2784 wrote to memory of 2780 2784 f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8.exe 84 PID 2784 wrote to memory of 2780 2784 f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8.exe 84 PID 2784 wrote to memory of 2780 2784 f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8.exe 84 PID 2780 wrote to memory of 4372 2780 un742467.exe 86 PID 2780 wrote to memory of 4372 2780 un742467.exe 86 PID 2780 wrote to memory of 4372 2780 un742467.exe 86 PID 2780 wrote to memory of 3052 2780 un742467.exe 95 PID 2780 wrote to memory of 3052 2780 un742467.exe 95 PID 2780 wrote to memory of 3052 2780 un742467.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8.exe"C:\Users\Admin\AppData\Local\Temp\f8770fb908aff136c04ec713553dc06581023fe4e8eec709bae81af501ec14d8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un742467.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un742467.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5271.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5271.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 10804⤵
- Program crash
PID:4824
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6433.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6433.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3052
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4372 -ip 43721⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD55ee930bc70fe8b74de70d0ddf2e88605
SHA178c9e6091c2ee8c0c2a1d024fca2d767567c5d63
SHA2563109ec29ac247dd8517b4727b3f16fc88ef15c0789bab5d1ffd13302683ff57d
SHA51282a7a90bef0ce43ca30de64ae0959bce2bcbec1d1c50dbe6ddad3247fdae28b9b5084216745efc8c021bfe0364dd71807eb90ac3bbc2a1afd9e73558f812680b
-
Filesize
312KB
MD5a1898962b6c2d27638bb4e224a45aea0
SHA14ba9f5db18a5d5e7136c46f596e5bb9fb2231dcd
SHA2565a345ccdd15041dc2111d786f2fd5b7518f63d6b9eea251a43c15411dc98ee0c
SHA5122c11ee71f6d25a0d07980ded678acd353071b45879ff577e2023e18e3397c54abed844466eb7ac7ae65b94bd8c35b52889456625449fa68d77de56c51abe9a37
-
Filesize
370KB
MD5ac61f4cd9f905def5bcc6115bea8a362
SHA148b1c4d4bf24af7fb9ed62a79ac81525c41d1088
SHA25687b81faa811586f52c1b0e0606c2bc0aac66b15d9802c0aefb5511e1bab5a44b
SHA5125386490e5897f19f708d408df6876fa969e8fbf6418867be00627995d04863fd62f33d8382d20d2dec16349cca4b076613c81a27b8dd1bbbdbc32ebf4abdcb20