Analysis
-
max time kernel
116s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exe
Resource
win10v2004-20241007-en
General
-
Target
a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exe
-
Size
677KB
-
MD5
d2226c5739721a1b10b747e423d69960
-
SHA1
08367841a8c44e5e6254a0f371890c89b738c3cb
-
SHA256
a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84
-
SHA512
248b7cb67b3e74b9f1db02fcdbeb90ea711267604fdbb55300a463a68d6e30e718f735c5935f32210a5bc735e25241658733e2307a73fd6182a262abecb13e84
-
SSDEEP
12288:pMrNy90O8pkLfBKLJnP2WJLzIVlGsgADiqFvaoz/8UioEzV6zgaH:wy0pe8P2W1aQsgADiQ/8U+zkz7
Malware Config
Extracted
redline
gena
193.233.20.30:4125
-
auth_value
93c20961cb6b06b2d5781c212db6201e
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f3663nq.exe healer behavioral1/memory/5040-15-0x0000000000400000-0x000000000040A000-memory.dmp healer behavioral1/memory/3548-22-0x0000000002720000-0x000000000273A000-memory.dmp healer behavioral1/memory/3548-24-0x0000000002860000-0x0000000002878000-memory.dmp healer behavioral1/memory/3548-25-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-30-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-52-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-50-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-48-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-46-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-44-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-42-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-40-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-38-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-36-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-34-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-32-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-28-0x0000000002860000-0x0000000002872000-memory.dmp healer behavioral1/memory/3548-26-0x0000000002860000-0x0000000002872000-memory.dmp healer -
Healer family
-
Processes:
h97Yn81.exef3663nq.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" h97Yn81.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f3663nq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f3663nq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f3663nq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" h97Yn81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" h97Yn81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" h97Yn81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" h97Yn81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f3663nq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f3663nq.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f3663nq.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection h97Yn81.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1124-60-0x0000000002730000-0x0000000002776000-memory.dmp family_redline behavioral1/memory/1124-61-0x0000000002920000-0x0000000002964000-memory.dmp family_redline behavioral1/memory/1124-67-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-77-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-95-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-93-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-91-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-89-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-87-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-85-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-81-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-79-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-75-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-73-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-71-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-69-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-83-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-65-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-63-0x0000000002920000-0x000000000295E000-memory.dmp family_redline behavioral1/memory/1124-62-0x0000000002920000-0x000000000295E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
niba4309.exef3663nq.exeh97Yn81.exeiIgFy31.exepid process 1900 niba4309.exe 5040 f3663nq.exe 3548 h97Yn81.exe 1124 iIgFy31.exe -
Processes:
f3663nq.exeh97Yn81.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" f3663nq.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features h97Yn81.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" h97Yn81.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exeniba4309.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" niba4309.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4548 3548 WerFault.exe h97Yn81.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exeniba4309.exeh97Yn81.exeiIgFy31.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language niba4309.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language h97Yn81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iIgFy31.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
f3663nq.exeh97Yn81.exepid process 5040 f3663nq.exe 5040 f3663nq.exe 3548 h97Yn81.exe 3548 h97Yn81.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
f3663nq.exeh97Yn81.exeiIgFy31.exedescription pid process Token: SeDebugPrivilege 5040 f3663nq.exe Token: SeDebugPrivilege 3548 h97Yn81.exe Token: SeDebugPrivilege 1124 iIgFy31.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exeniba4309.exedescription pid process target process PID 2160 wrote to memory of 1900 2160 a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exe niba4309.exe PID 2160 wrote to memory of 1900 2160 a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exe niba4309.exe PID 2160 wrote to memory of 1900 2160 a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exe niba4309.exe PID 1900 wrote to memory of 5040 1900 niba4309.exe f3663nq.exe PID 1900 wrote to memory of 5040 1900 niba4309.exe f3663nq.exe PID 1900 wrote to memory of 3548 1900 niba4309.exe h97Yn81.exe PID 1900 wrote to memory of 3548 1900 niba4309.exe h97Yn81.exe PID 1900 wrote to memory of 3548 1900 niba4309.exe h97Yn81.exe PID 2160 wrote to memory of 1124 2160 a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exe iIgFy31.exe PID 2160 wrote to memory of 1124 2160 a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exe iIgFy31.exe PID 2160 wrote to memory of 1124 2160 a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exe iIgFy31.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exe"C:\Users\Admin\AppData\Local\Temp\a8e859f692671f8d3579abdd1e21086ec4deadd49542ae66dff1d733f6209e84N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba4309.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\niba4309.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f3663nq.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\f3663nq.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h97Yn81.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h97Yn81.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 10844⤵
- Program crash
PID:4548
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iIgFy31.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\iIgFy31.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3548 -ip 35481⤵PID:3332
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD55ab1ffcfbbb76c55849c282c0a28cec4
SHA19ed13e74100283f9e326ef0f84e9fbdd4e0b0fee
SHA2569a2559103149105e4099c56a2a1447c3c74e1dbe1d5d2f1ae83d4b4316dd24d5
SHA5129deef025618b4adacac7231890319fb525ac88574eaa2a418325512eaa0eb1974839a0236e1a90f3c9224be8eb96c907323018011d90ca594b924a9370931671
-
Filesize
334KB
MD5390389ff041997f7a7ff767bcdec3f1e
SHA17d1107feba5d5bacd2b5637716518cea52bae4fd
SHA2569903708fce384de12a0a718e29aed055ad4a8dfccd612d8bb5ed96539b23ff46
SHA5124d0dd9891cfe077d67b86cad3b53780461f7b693cea87eba1d097ae13bdccc7b4d0d824ebb90f61b153baab94ac6c4457c801e523df01404fff9ec052e93567a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
290KB
MD5ee961d04f26e9194e51452c05fc6ef80
SHA10684e28256498e2d678b92e9a54b0ff7d654f54c
SHA25651abd8e648db8edf44d3c8a479aaecc1b6817b1f232934a42d0b2d7b5b310b3b
SHA512cdab02f1ce971fc2894e2f68650130d85b9317b5eba7ba9f7d5f58f0911cf4b5bf2b3409d677628a893896407e270d0600d9dea09a2b52eb6923caee3ddf4b06