Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
ed3ec7d1c48dae459f1210f3c218c54d662b9e6dafce18002c2816af0ed39260.exe
Resource
win10v2004-20241007-en
General
-
Target
ed3ec7d1c48dae459f1210f3c218c54d662b9e6dafce18002c2816af0ed39260.exe
-
Size
1.0MB
-
MD5
e5b081a487018b2f23a35abd4e43dee9
-
SHA1
78b8d17d9cc1edc4014e6342a67c498b728e61f3
-
SHA256
ed3ec7d1c48dae459f1210f3c218c54d662b9e6dafce18002c2816af0ed39260
-
SHA512
0ec3a685e94ec2b37d5ad4d39cb76c4b3994d97f2a31d114dbf05527362a8815cc3ee01e8ee08040011a8044dc22950d6a307f49d2327b4d7fdc5917db5e67eb
-
SSDEEP
24576:Qyx89cVcd0TpYgJ8+4vhMFvAT5N3ro7JpwCFiJN6ylg/e:Xy95O1YgC+Eav05Fs7JOCF2Uylg/
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023b81-26.dat healer behavioral1/memory/2352-28-0x00000000000A0000-0x00000000000AA000-memory.dmp healer behavioral1/memory/1996-34-0x0000000002790000-0x00000000027AA000-memory.dmp healer behavioral1/memory/1996-36-0x0000000002820000-0x0000000002838000-memory.dmp healer behavioral1/memory/1996-37-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-44-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-64-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-63-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-60-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-58-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-56-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-54-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-52-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-50-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-48-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-46-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-42-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-40-0x0000000002820000-0x0000000002832000-memory.dmp healer behavioral1/memory/1996-38-0x0000000002820000-0x0000000002832000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bus7133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bus7133.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor4146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor4146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor4146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor4146.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bus7133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bus7133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bus7133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bus7133.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor4146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor4146.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2648-72-0x00000000024F0000-0x0000000002536000-memory.dmp family_redline behavioral1/memory/2648-73-0x00000000028D0000-0x0000000002914000-memory.dmp family_redline behavioral1/memory/2648-77-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-83-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-105-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-103-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-101-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-99-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-97-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-95-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-93-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-91-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-89-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-87-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-81-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-79-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-107-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-85-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-75-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline behavioral1/memory/2648-74-0x00000000028D0000-0x000000000290E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 4676 kino4937.exe 2252 kino0084.exe 4728 kino7711.exe 2352 bus7133.exe 1996 cor4146.exe 2648 dJH23s77.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bus7133.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor4146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor4146.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ed3ec7d1c48dae459f1210f3c218c54d662b9e6dafce18002c2816af0ed39260.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kino4937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" kino0084.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" kino7711.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3564 1996 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cor4146.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dJH23s77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed3ec7d1c48dae459f1210f3c218c54d662b9e6dafce18002c2816af0ed39260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kino4937.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kino0084.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kino7711.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2352 bus7133.exe 2352 bus7133.exe 1996 cor4146.exe 1996 cor4146.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2352 bus7133.exe Token: SeDebugPrivilege 1996 cor4146.exe Token: SeDebugPrivilege 2648 dJH23s77.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5076 wrote to memory of 4676 5076 ed3ec7d1c48dae459f1210f3c218c54d662b9e6dafce18002c2816af0ed39260.exe 83 PID 5076 wrote to memory of 4676 5076 ed3ec7d1c48dae459f1210f3c218c54d662b9e6dafce18002c2816af0ed39260.exe 83 PID 5076 wrote to memory of 4676 5076 ed3ec7d1c48dae459f1210f3c218c54d662b9e6dafce18002c2816af0ed39260.exe 83 PID 4676 wrote to memory of 2252 4676 kino4937.exe 84 PID 4676 wrote to memory of 2252 4676 kino4937.exe 84 PID 4676 wrote to memory of 2252 4676 kino4937.exe 84 PID 2252 wrote to memory of 4728 2252 kino0084.exe 86 PID 2252 wrote to memory of 4728 2252 kino0084.exe 86 PID 2252 wrote to memory of 4728 2252 kino0084.exe 86 PID 4728 wrote to memory of 2352 4728 kino7711.exe 88 PID 4728 wrote to memory of 2352 4728 kino7711.exe 88 PID 4728 wrote to memory of 1996 4728 kino7711.exe 94 PID 4728 wrote to memory of 1996 4728 kino7711.exe 94 PID 4728 wrote to memory of 1996 4728 kino7711.exe 94 PID 2252 wrote to memory of 2648 2252 kino0084.exe 98 PID 2252 wrote to memory of 2648 2252 kino0084.exe 98 PID 2252 wrote to memory of 2648 2252 kino0084.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed3ec7d1c48dae459f1210f3c218c54d662b9e6dafce18002c2816af0ed39260.exe"C:\Users\Admin\AppData\Local\Temp\ed3ec7d1c48dae459f1210f3c218c54d662b9e6dafce18002c2816af0ed39260.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4937.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino4937.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino0084.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kino0084.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7711.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\kino7711.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus7133.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bus7133.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4146.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cor4146.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 10846⤵
- Program crash
PID:3564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dJH23s77.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\dJH23s77.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1996 -ip 19961⤵PID:1244
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
842KB
MD5522e1e4da17a1592a441304717729845
SHA1d505dfa8e79145aa618083e6cb22fc3c8a8f86bb
SHA2569b43593cd7553921fcca5199e8b31885287d8779708f24a7ae4ecca77da5dc2f
SHA51234b88cec668dfc2d198ba4d20ffce7a820989c4b94afd92b5f2913beb645b48ef036f8fcdcabdc3b733481aa12b70487e23ad3ac0e46219f039856b77796a40f
-
Filesize
700KB
MD5e8605da581f99390513e709f42479704
SHA19288d7454f1d5208bbeac7a09faac4588959ddff
SHA25600986faafb48fc588fa250d3e38c7730caf502fb5890b912fcea4d6c79d9f23c
SHA5120c2da4170614c833901656abf71502dedfb442e2a30e6e2aeddaab5d4d4e16642815554aba880bfb9f321cb1f9008b206d140186e9090d6f009a9efd65ad070d
-
Filesize
358KB
MD557e45126e4315d7ea0617a98feae68ba
SHA11393f657f2f0e652984c39a6f7629bf99ae533d7
SHA256b27cd89de6ce89ec0aaf4379957c4eefae258668cf795d64627b38fe9d77a293
SHA512e894dabcbbf073b584992207daf18d1a17ba31495aee83e07adad3e2de1edd490c5dc6e4d52f55a5a88daf5d86aeb56fd51eec8d8546cec1e9206b953e891f8a
-
Filesize
347KB
MD55e776cc5585a8f58128b8086a668a3e1
SHA1009cc0d563a42998c204a69ca037b40616642c68
SHA256edbab7e644090cb27e65ac50b640ba673f97d86e82dc87021a539d3f6fcca43d
SHA512068b449092fe0ba66fb4f720f20c1e750bd3695683a1cd65a520476767ddc73bc2df91a694f01e222a813c36ccbaa6e8912014a33209d8de3befbb13ee3ceae1
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
300KB
MD581287b5e33a26e2c220736f2a4b9a701
SHA1ce16901a59232f53a612bae7b5fa581733832c45
SHA2563059ccf4dd61ca6194637f3087477ec2b67d6173a89de436bc1fff6094d06f1e
SHA512df6ce978fcca2c261a8735ffa53a2a68a31d8a1c0c4500767a03132fc94c1fe4895d150e393f4cec960dd77ec4a4ae54b6c1d19a1c06bac8da91356806eea5d0