Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
de7b4c8c5f53ab98573503897cf708ae0c802c3d37fcd918ab619cb10c3e35af.exe
Resource
win10v2004-20241007-en
General
-
Target
de7b4c8c5f53ab98573503897cf708ae0c802c3d37fcd918ab619cb10c3e35af.exe
-
Size
685KB
-
MD5
2ff0844e0efbe8726cd15828d095238f
-
SHA1
1686c5f285948065c3b54d774d0278a44716970d
-
SHA256
de7b4c8c5f53ab98573503897cf708ae0c802c3d37fcd918ab619cb10c3e35af
-
SHA512
ed8b45c9cd348c7c3577696b48e19f794e9ad06118b1d442095351d18755f2eaee5d25a6c4cec84e136bc341e967dc2c93323a55353e26b05d7da3cbaf7934d6
-
SSDEEP
12288:kMrEy90pAvcAPxDYVJbCMoldkZfnv7qE+gq4O4eh4SL8ILjX13cTAZ:YyMIcG6JGMoLkN9jgSo8iFsTY
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3776-18-0x00000000046D0000-0x00000000046EA000-memory.dmp healer behavioral1/memory/3776-20-0x00000000047B0000-0x00000000047C8000-memory.dmp healer behavioral1/memory/3776-48-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-46-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-44-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-42-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-41-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-39-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-36-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-34-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-33-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-30-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-28-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-26-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-24-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-22-0x00000000047B0000-0x00000000047C2000-memory.dmp healer behavioral1/memory/3776-21-0x00000000047B0000-0x00000000047C2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8902.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8902.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8902.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8902.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8902.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8902.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3268-61-0x0000000007050000-0x0000000007094000-memory.dmp family_redline behavioral1/memory/3268-60-0x0000000004AE0000-0x0000000004B26000-memory.dmp family_redline behavioral1/memory/3268-73-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-81-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-85-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-95-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-93-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-91-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-89-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-87-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-83-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-79-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-77-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-75-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-71-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-69-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-67-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-65-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-63-0x0000000007050000-0x000000000708F000-memory.dmp family_redline behavioral1/memory/3268-62-0x0000000007050000-0x000000000708F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3148 un181389.exe 3776 pro8902.exe 3268 qu7664.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8902.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8902.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" de7b4c8c5f53ab98573503897cf708ae0c802c3d37fcd918ab619cb10c3e35af.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un181389.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1932 3776 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de7b4c8c5f53ab98573503897cf708ae0c802c3d37fcd918ab619cb10c3e35af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un181389.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8902.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7664.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3776 pro8902.exe 3776 pro8902.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3776 pro8902.exe Token: SeDebugPrivilege 3268 qu7664.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4588 wrote to memory of 3148 4588 de7b4c8c5f53ab98573503897cf708ae0c802c3d37fcd918ab619cb10c3e35af.exe 84 PID 4588 wrote to memory of 3148 4588 de7b4c8c5f53ab98573503897cf708ae0c802c3d37fcd918ab619cb10c3e35af.exe 84 PID 4588 wrote to memory of 3148 4588 de7b4c8c5f53ab98573503897cf708ae0c802c3d37fcd918ab619cb10c3e35af.exe 84 PID 3148 wrote to memory of 3776 3148 un181389.exe 85 PID 3148 wrote to memory of 3776 3148 un181389.exe 85 PID 3148 wrote to memory of 3776 3148 un181389.exe 85 PID 3148 wrote to memory of 3268 3148 un181389.exe 95 PID 3148 wrote to memory of 3268 3148 un181389.exe 95 PID 3148 wrote to memory of 3268 3148 un181389.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\de7b4c8c5f53ab98573503897cf708ae0c802c3d37fcd918ab619cb10c3e35af.exe"C:\Users\Admin\AppData\Local\Temp\de7b4c8c5f53ab98573503897cf708ae0c802c3d37fcd918ab619cb10c3e35af.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un181389.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un181389.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8902.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8902.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 10804⤵
- Program crash
PID:1932
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7664.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7664.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3776 -ip 37761⤵PID:4884
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
543KB
MD5bb1c9f45d26583fd4bb2589978267594
SHA1346a2b8329ebe7c0bb0dc968f4b62d0bf09c3664
SHA256ac8d1d34f6191286c02e753594bc4546dceb8310b6710eb987cfeda964d1541c
SHA512fd9f83aa7c2afc76539e2652f10b4bbe20bab53173352832527ab8c52569c8f1b0f20e07e6e2d330698c4897653d22c0d60ed928699d1309744acbd78120fdc3
-
Filesize
322KB
MD5f7b6eac84b13fc28e73c2276c1911a5c
SHA1935a8ecb41420c7c6dd67a297819e554396d1337
SHA25686ee878a1a68a530eec345bc3a062437c8e4c5987402113ae13134e5333ea6cc
SHA5122146b9fd143312c2daab9e6dab00220a172f45803a957fc334097ecb4880acc7b21e780ae5b1238cc822741bf55795313ff1334f19db57ab9b9cb76782d0c5f6
-
Filesize
379KB
MD5ec6ce819caf397bb74462491e8aba7b2
SHA155e8d817b42abc9dcebaabc07d2007a934312995
SHA256907c6418a5b6cbf9473d81756b4e2e6b134268116d142db41f663cbb59965676
SHA5123008e25011e72526681accfeeb41b49416a5f50bb0542c38c6bb4939886eea576be554960fd3a57622c8af7e24d470924547a15518e2a2bf11469f9ee5e5cf09