Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
0eb2788ba20de4f9f66be46e75584f994e8674acd3308811334218ed5a5f567b.exe
Resource
win10v2004-20241007-en
General
-
Target
0eb2788ba20de4f9f66be46e75584f994e8674acd3308811334218ed5a5f567b.exe
-
Size
682KB
-
MD5
230a8699719a4a8c538abc850551a0f2
-
SHA1
f555d877d44e84369a066cfbfd6a2ca2bc212877
-
SHA256
0eb2788ba20de4f9f66be46e75584f994e8674acd3308811334218ed5a5f567b
-
SHA512
b7d138c7183625f29f5758bada0f234633a7fd2070c9e8257f07c4071fb16aba190e3f408fd6f3415d2bc4d30fe29dbce764593f6ba69c3a458fcd16fe25f472
-
SSDEEP
12288:KMrPy90NFtwEuxur2kNf+LD7lPE45N+VAKAQg2t+IG+mzCXJUtYOCI:1yStwbur2kNf+D75E47EAKAv28IXlUtN
Malware Config
Extracted
redline
stek
melevv.eu:4162
-
auth_value
4205381daf6946b2df5fe3bc7eacc918
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2904-17-0x00000000047B0000-0x00000000047CA000-memory.dmp healer behavioral1/memory/2904-19-0x0000000004B60000-0x0000000004B78000-memory.dmp healer behavioral1/memory/2904-46-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-48-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-44-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-42-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-40-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-36-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-35-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-32-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-30-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-26-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-25-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-38-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-28-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-22-0x0000000004B60000-0x0000000004B72000-memory.dmp healer behavioral1/memory/2904-21-0x0000000004B60000-0x0000000004B72000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urUL32Oj26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urUL32Oj26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urUL32Oj26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urUL32Oj26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urUL32Oj26.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection urUL32Oj26.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/4368-59-0x0000000004990000-0x00000000049D6000-memory.dmp family_redline behavioral1/memory/4368-60-0x0000000004E30000-0x0000000004E74000-memory.dmp family_redline behavioral1/memory/4368-84-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-94-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-92-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-90-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-88-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-86-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-82-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-80-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-78-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-76-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-74-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-72-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-70-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-66-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-68-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-64-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-62-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline behavioral1/memory/4368-61-0x0000000004E30000-0x0000000004E6E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2504 ycMA20lg76.exe 2904 urUL32Oj26.exe 4368 wrPV24YW44.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urUL32Oj26.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urUL32Oj26.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0eb2788ba20de4f9f66be46e75584f994e8674acd3308811334218ed5a5f567b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycMA20lg76.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3300 2904 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0eb2788ba20de4f9f66be46e75584f994e8674acd3308811334218ed5a5f567b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ycMA20lg76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language urUL32Oj26.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wrPV24YW44.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2904 urUL32Oj26.exe 2904 urUL32Oj26.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2904 urUL32Oj26.exe Token: SeDebugPrivilege 4368 wrPV24YW44.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4032 wrote to memory of 2504 4032 0eb2788ba20de4f9f66be46e75584f994e8674acd3308811334218ed5a5f567b.exe 84 PID 4032 wrote to memory of 2504 4032 0eb2788ba20de4f9f66be46e75584f994e8674acd3308811334218ed5a5f567b.exe 84 PID 4032 wrote to memory of 2504 4032 0eb2788ba20de4f9f66be46e75584f994e8674acd3308811334218ed5a5f567b.exe 84 PID 2504 wrote to memory of 2904 2504 ycMA20lg76.exe 85 PID 2504 wrote to memory of 2904 2504 ycMA20lg76.exe 85 PID 2504 wrote to memory of 2904 2504 ycMA20lg76.exe 85 PID 2504 wrote to memory of 4368 2504 ycMA20lg76.exe 95 PID 2504 wrote to memory of 4368 2504 ycMA20lg76.exe 95 PID 2504 wrote to memory of 4368 2504 ycMA20lg76.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\0eb2788ba20de4f9f66be46e75584f994e8674acd3308811334218ed5a5f567b.exe"C:\Users\Admin\AppData\Local\Temp\0eb2788ba20de4f9f66be46e75584f994e8674acd3308811334218ed5a5f567b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycMA20lg76.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycMA20lg76.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urUL32Oj26.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urUL32Oj26.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 10804⤵
- Program crash
PID:3300
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrPV24YW44.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrPV24YW44.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2904 -ip 29041⤵PID:2960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
538KB
MD55a31ada26c1747191eeef24a61afcc1e
SHA1051947d71200e27ec445cf8b2a3bc5a6c1271ab7
SHA2566ecc3d72370d3e7e6b871c01885bb4e492690edc2f989a696345ed0131e7b175
SHA512bad2e7c6df3ed3bf50ba51966e092cd5a72dd8458be90db0ce347a1b8005ea8022c6be0618baa581f998d2bd791e73778cefc762cff0a8d6f46e7d7fb42d81be
-
Filesize
318KB
MD50819b539ffb60d7590cb337bb711f58e
SHA1d346ebf2765a656b8905f3f48975f07429abd52a
SHA256037e41f5a95e619cec1a5f3f39a298e29da890dbc4617ecb67ff09c0ebf4f2d0
SHA512128dd46cc3fab171867139dd39ae7f61d121ca54df1e687772de07edc2732c9ebe225e96a3649325820e82e64fc6bf3a0b713de91bae2a44ccc7bd78b9dd0843
-
Filesize
377KB
MD5f1ee2f9260487ebcd921054e948b7c77
SHA1653a941f90804cc68f78db483e0c0e559b1eefb7
SHA25653d391e42f7a8a701906e246d5ed87be400f65f779e4689a448d0497adaf8df9
SHA512ece3849635baa6ef692dec38f3415d566f6419ffb4854043c60708578f748a3f2112360e3794d9e3f5a64e8feaf26b6f0a17efcd852d009d3a7063cde9895222