Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0.exe
Resource
win10v2004-20241007-en
General
-
Target
b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0.exe
-
Size
674KB
-
MD5
398526a2f48021151c58d010f44ca2be
-
SHA1
001f5a796086f796f02d9d57e384f4e7ef571a9e
-
SHA256
b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0
-
SHA512
2fce9b213b379f5dfac16ecfb6b58cde3c0650bf9acd3534251ecf2fdc8fbd2c0b2b9bd52a0a2c2c5f185b3af55f5c7e0fb7773a2ed31f5668a28a43c8912cb0
-
SSDEEP
12288:9MrCy90/UKqiK78HO2ZTjnA+t4qWlfeQALQbzHAoVTxLzuluXI42mXAEphVjYvdI:jyoU5/4u21jn2Jf0KWN42mXAWsvu
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4236-19-0x0000000002390000-0x00000000023AA000-memory.dmp healer behavioral1/memory/4236-21-0x00000000024D0000-0x00000000024E8000-memory.dmp healer behavioral1/memory/4236-29-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-49-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-47-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-46-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-43-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-41-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-39-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-37-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-35-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-33-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-31-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-27-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-25-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-23-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/4236-22-0x00000000024D0000-0x00000000024E2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3065.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2064-61-0x00000000041E0000-0x0000000004226000-memory.dmp family_redline behavioral1/memory/2064-62-0x0000000006E90000-0x0000000006ED4000-memory.dmp family_redline behavioral1/memory/2064-68-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-74-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-72-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-96-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-94-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-90-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-88-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-86-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-84-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-82-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-80-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-78-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-76-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-70-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-92-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-66-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-64-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline behavioral1/memory/2064-63-0x0000000006E90000-0x0000000006ECF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4876 un566756.exe 4236 pro3065.exe 2064 qu1123.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3065.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3065.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un566756.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1580 4236 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un566756.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3065.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1123.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4236 pro3065.exe 4236 pro3065.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4236 pro3065.exe Token: SeDebugPrivilege 2064 qu1123.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1224 wrote to memory of 4876 1224 b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0.exe 83 PID 1224 wrote to memory of 4876 1224 b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0.exe 83 PID 1224 wrote to memory of 4876 1224 b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0.exe 83 PID 4876 wrote to memory of 4236 4876 un566756.exe 84 PID 4876 wrote to memory of 4236 4876 un566756.exe 84 PID 4876 wrote to memory of 4236 4876 un566756.exe 84 PID 4876 wrote to memory of 2064 4876 un566756.exe 97 PID 4876 wrote to memory of 2064 4876 un566756.exe 97 PID 4876 wrote to memory of 2064 4876 un566756.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0.exe"C:\Users\Admin\AppData\Local\Temp\b32b2bfcb6f00f61cf009551b725eb71e9bb28670a7f00d781f55856d44f1ec0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un566756.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un566756.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3065.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3065.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 10804⤵
- Program crash
PID:1580
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1123.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1123.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4236 -ip 42361⤵PID:1792
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
532KB
MD5db1a0b0ad03e59b4a6df558aaa8ddfae
SHA1a240774a2aed8cfd2523532caa1aed971a48a265
SHA256a88267d149004511eeb58c17c5e5cd862c248a790fab634d738a756178ff6fe2
SHA512aa8838f6b2eb64ff316d1636686e4575beae03a99f76ab0cca83b251e5685931b49f3ac8a78e1c71c199de440fbdfbe5c29a9d14b12e26327b1ec03b042e97ad
-
Filesize
376KB
MD5c706a5b8483d71ec1ed7c6f552ef5d4d
SHA170ddd25aaca716ca9420a18dadf6fcdb95fc6b54
SHA256ce83e5eba2957ab2f3257ea72eb35d3f3a6fc758033f80cd2db5e6fc71fa31af
SHA512669230afc4f1544fc6b6bae315fa478b6c2d7238ff431b6e8b34fc717638163e3b61afcb5fcb7bff45d2a30afad629f7d8deb4d895a8bf918aa08ba09ebc780f
-
Filesize
435KB
MD503ec3a14c759adffb52e7a8d5b72eeb6
SHA1bee603076e24753b5dac1fe715b51e2ca588555c
SHA2564446508eb3dcdfe9eee1ce0c47c42d53f36afb04935597dd51979fd608abe085
SHA512e553cbadf3e1d9e89adccd7fccf2e348d346f05b1463e70c4ca50fa41facd45807493028a52935aba1e74d4df762d233017ad7f2a448090d69b8b8b2af8a7af3