Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:13
Static task
static1
Behavioral task
behavioral1
Sample
21f0c58abc67c64c140567a6a8d0c7de8f49372b1766d856e43e288c8caa228c.exe
Resource
win10v2004-20241007-en
General
-
Target
21f0c58abc67c64c140567a6a8d0c7de8f49372b1766d856e43e288c8caa228c.exe
-
Size
667KB
-
MD5
c2afd15d013c0e70b27240571826e154
-
SHA1
3875d512610ecf34db13d5546254b460f435d77d
-
SHA256
21f0c58abc67c64c140567a6a8d0c7de8f49372b1766d856e43e288c8caa228c
-
SHA512
dbb38987153630efb5b1019cc457781ef6d512084b298308df2295fb2ee82fda111592e0a5e1351136ed9216cd3d34ed919625eba3c0cf015d9ca0eeac15b845
-
SSDEEP
12288:VMrdy90618+81ltZxz0zCo4Pjnm1mMQs1PExc996hrU02H/w8sNPYm:QyB18+2lbezJ4Pr9MQsp3P6hrQfwxPYm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1096-19-0x0000000002590000-0x00000000025AA000-memory.dmp healer behavioral1/memory/1096-21-0x0000000002730000-0x0000000002748000-memory.dmp healer behavioral1/memory/1096-49-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-47-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-46-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-43-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-41-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-39-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-38-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-35-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-34-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-31-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-30-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-27-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-25-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-23-0x0000000002730000-0x0000000002742000-memory.dmp healer behavioral1/memory/1096-22-0x0000000002730000-0x0000000002742000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3830.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3830.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1060-61-0x00000000028C0000-0x0000000002906000-memory.dmp family_redline behavioral1/memory/1060-62-0x00000000053A0000-0x00000000053E4000-memory.dmp family_redline behavioral1/memory/1060-64-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-70-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-96-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-94-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-92-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-90-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-88-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-86-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-82-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-80-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-79-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-76-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-74-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-72-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-68-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-66-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-84-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/1060-63-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 920 un931602.exe 1096 pro3830.exe 1060 qu4957.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3830.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3830.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 21f0c58abc67c64c140567a6a8d0c7de8f49372b1766d856e43e288c8caa228c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un931602.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2956 1096 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un931602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3830.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4957.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21f0c58abc67c64c140567a6a8d0c7de8f49372b1766d856e43e288c8caa228c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1096 pro3830.exe 1096 pro3830.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1096 pro3830.exe Token: SeDebugPrivilege 1060 qu4957.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4660 wrote to memory of 920 4660 21f0c58abc67c64c140567a6a8d0c7de8f49372b1766d856e43e288c8caa228c.exe 83 PID 4660 wrote to memory of 920 4660 21f0c58abc67c64c140567a6a8d0c7de8f49372b1766d856e43e288c8caa228c.exe 83 PID 4660 wrote to memory of 920 4660 21f0c58abc67c64c140567a6a8d0c7de8f49372b1766d856e43e288c8caa228c.exe 83 PID 920 wrote to memory of 1096 920 un931602.exe 84 PID 920 wrote to memory of 1096 920 un931602.exe 84 PID 920 wrote to memory of 1096 920 un931602.exe 84 PID 920 wrote to memory of 1060 920 un931602.exe 95 PID 920 wrote to memory of 1060 920 un931602.exe 95 PID 920 wrote to memory of 1060 920 un931602.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\21f0c58abc67c64c140567a6a8d0c7de8f49372b1766d856e43e288c8caa228c.exe"C:\Users\Admin\AppData\Local\Temp\21f0c58abc67c64c140567a6a8d0c7de8f49372b1766d856e43e288c8caa228c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un931602.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un931602.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3830.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3830.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 10804⤵
- Program crash
PID:2956
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4957.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4957.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1096 -ip 10961⤵PID:2880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
525KB
MD5f389cb20301f7cede29b8a17686a8a89
SHA1de703e1c1ae6bda98392a76d6c3b7dfb52231dbb
SHA256f61854ba932f9836665722dceced7e30ceeea51e2abf3337f3e395d23bc88536
SHA5128e9ffccb6c2289f6fd0f3b27434d3abaf60725431e5aa4519f107285982f4d31e76c24303d8c6570fcc1628ecbc6a2ed6ddf0c3be077509938d9b31152682b5c
-
Filesize
294KB
MD5dcbf8eb31133f06fbd4cefb4c55eba9d
SHA18410ccba76532dac07c7b8290800ba9bb293c97b
SHA256fed5f3b61e5ea4a126ecf8d2b18d99753b106d17c4b29a641d9689655f178a73
SHA51293eaeb6ca0f2e7e4623b411fea528026f99e0d97fea2b7b8d3fdff2c99fa32490fd9d3f244337754dd6ed94ad9201473f61057a8dbf6e8edde1b0a1e54042682
-
Filesize
352KB
MD5d36ef29c0617835c40e816f1c4304715
SHA1a5db6b98685ed14c5fdf011163162f3de52cac02
SHA25666454ef09d0858f301747d53ba4812aafc28f3541e3014e42c7482aeb44e4e2a
SHA5126d54b7b10900be1b06ad529e55bc5fb7529759b1433d7b31b92a5658b78aa8dc3911f5c96f88fcf45ec393406e3a5efdb1292c9daf37de3f1273e610a176cd84