Analysis
-
max time kernel
112s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
91e42a660b40919d7bea374a586cff5322ef5ef72c54187612cfcbf0ad2815aeN.exe
Resource
win10v2004-20241007-en
General
-
Target
91e42a660b40919d7bea374a586cff5322ef5ef72c54187612cfcbf0ad2815aeN.exe
-
Size
687KB
-
MD5
a9134f4188cc0fa7e1972a885d324ff0
-
SHA1
b4f7064917c7669b58668cc35bf95bc8bdaafbb1
-
SHA256
91e42a660b40919d7bea374a586cff5322ef5ef72c54187612cfcbf0ad2815ae
-
SHA512
d4bd8120c3c868dcbc7d0af6b6f3d85e0b180b07c3813bfee3ab7b65d4b3d906f09ad5548c59b4e51cb9bb1a7189b883aea73b35237affc2488255da9785102a
-
SSDEEP
12288:MMray90FXwr5NVTps4unIzoZd/8T+cHfYdcBGMu1gN1JR2u0GyQ:OyYAlTq48EoZV8iOfYy+1gN524yQ
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000a000000023b7f-12.dat healer behavioral1/memory/4968-15-0x0000000000EC0000-0x0000000000ECA000-memory.dmp healer behavioral1/memory/3572-22-0x0000000004B70000-0x0000000004B8A000-memory.dmp healer behavioral1/memory/3572-24-0x0000000007110000-0x0000000007128000-memory.dmp healer behavioral1/memory/3572-42-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-52-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-50-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-48-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-46-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-45-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-40-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-38-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-36-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-35-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-32-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-30-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-28-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-26-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/3572-25-0x0000000007110000-0x0000000007122000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor7348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor7348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor7348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor7348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bus6596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bus6596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bus6596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bus6596.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bus6596.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bus6596.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor7348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor7348.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3244-60-0x0000000004790000-0x00000000047D6000-memory.dmp family_redline behavioral1/memory/3244-61-0x0000000004CA0000-0x0000000004CE4000-memory.dmp family_redline behavioral1/memory/3244-71-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-95-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-93-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-91-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-89-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-87-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-85-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-83-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-81-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-79-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-77-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-75-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-73-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-69-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-67-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-65-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-63-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline behavioral1/memory/3244-62-0x0000000004CA0000-0x0000000004CDE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 2288 kino2402.exe 4968 bus6596.exe 3572 cor7348.exe 3244 dvv21s66.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bus6596.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor7348.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor7348.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 91e42a660b40919d7bea374a586cff5322ef5ef72c54187612cfcbf0ad2815aeN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kino2402.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1904 3572 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91e42a660b40919d7bea374a586cff5322ef5ef72c54187612cfcbf0ad2815aeN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kino2402.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cor7348.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dvv21s66.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4968 bus6596.exe 4968 bus6596.exe 3572 cor7348.exe 3572 cor7348.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4968 bus6596.exe Token: SeDebugPrivilege 3572 cor7348.exe Token: SeDebugPrivilege 3244 dvv21s66.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3592 wrote to memory of 2288 3592 91e42a660b40919d7bea374a586cff5322ef5ef72c54187612cfcbf0ad2815aeN.exe 83 PID 3592 wrote to memory of 2288 3592 91e42a660b40919d7bea374a586cff5322ef5ef72c54187612cfcbf0ad2815aeN.exe 83 PID 3592 wrote to memory of 2288 3592 91e42a660b40919d7bea374a586cff5322ef5ef72c54187612cfcbf0ad2815aeN.exe 83 PID 2288 wrote to memory of 4968 2288 kino2402.exe 84 PID 2288 wrote to memory of 4968 2288 kino2402.exe 84 PID 2288 wrote to memory of 3572 2288 kino2402.exe 95 PID 2288 wrote to memory of 3572 2288 kino2402.exe 95 PID 2288 wrote to memory of 3572 2288 kino2402.exe 95 PID 3592 wrote to memory of 3244 3592 91e42a660b40919d7bea374a586cff5322ef5ef72c54187612cfcbf0ad2815aeN.exe 100 PID 3592 wrote to memory of 3244 3592 91e42a660b40919d7bea374a586cff5322ef5ef72c54187612cfcbf0ad2815aeN.exe 100 PID 3592 wrote to memory of 3244 3592 91e42a660b40919d7bea374a586cff5322ef5ef72c54187612cfcbf0ad2815aeN.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\91e42a660b40919d7bea374a586cff5322ef5ef72c54187612cfcbf0ad2815aeN.exe"C:\Users\Admin\AppData\Local\Temp\91e42a660b40919d7bea374a586cff5322ef5ef72c54187612cfcbf0ad2815aeN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2402.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kino2402.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bus6596.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bus6596.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4968
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cor7348.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cor7348.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 10924⤵
- Program crash
PID:1904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dvv21s66.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dvv21s66.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3244
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3572 -ip 35721⤵PID:5052
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5e788a99f1d5b63f4ac34449ff55be315
SHA1581f718e7c72a64cb5e2e63c62799ddc9b757c1f
SHA256c3ac629d6ca50737696b3aef0af5f5a2a97c70306de0e689d6485f585de51962
SHA51261f1925ddb0e2d840a762a991c8954f30478bd7a0d77eba6860529ef88c95d2db592bcfc35681342694348fcbc08cb7ce7e33fc13639276ad22eacba2ba8c1a6
-
Filesize
340KB
MD52a8b605ace4bfd94591d4809fd2e7fb7
SHA1da582724c8a27a230304d9770320c4a47ac05cf8
SHA25628466fa696170f622ea6fbe3f5e11aa057caaa3ce96a60b926ef45f1b6be0d24
SHA51249add125aff86cf7ab37511776be3b75a29cf3de927407b5357eea2e59e0aecfe6ab3d8e31f3707ed6d5b8b00d4c1c970d9b2c86ece21da737eecea9fcae734f
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
298KB
MD5a2bb60ed3606e905190f819f018b694a
SHA1b1a9f3984ffe1913c76e56c4946452ae3b8e361d
SHA25630331920c09c177a5a70a05faf5096b76c112def80923d0bc872c1ff448d6c75
SHA512488eb9faf1055ecf3b515fec1c69e65757f52e22d7c1ed933be923f18fbbe346e33f8fc6b4cafd5eba324e9faa6af098cde4e9f154613c1f06fa58e11de1d893