Analysis
-
max time kernel
118s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 05:31
Static task
static1
Behavioral task
behavioral1
Sample
30e7f8c8220d7d198cccddae8e5947d5c9e985097e0c58b54f19afd76cc1b6a9.exe
Resource
win10v2004-20241007-en
General
-
Target
30e7f8c8220d7d198cccddae8e5947d5c9e985097e0c58b54f19afd76cc1b6a9.exe
-
Size
662KB
-
MD5
4684d7155a9f05b57714b3447c7a210f
-
SHA1
f382b300da4bd5355f5cc181b99e9d8345e3de82
-
SHA256
30e7f8c8220d7d198cccddae8e5947d5c9e985097e0c58b54f19afd76cc1b6a9
-
SHA512
2db40c8f0a623599b91594e17eb3187eeec55fe10468fe6b81ad83b2cb646e5875ce7a9a331ed632eaf2366b7e5dba8e4ae6695f6f8235276f53a7b04232ba47
-
SSDEEP
12288:UMrYy90aH5qRzrcx+y8naAcUOPB3By3+L2qJZexGf7HOKp05N:syjHQzrpBneUB3+L2qJYxw7HOKm5N
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4224-19-0x00000000023B0000-0x00000000023CA000-memory.dmp healer behavioral1/memory/4224-21-0x0000000002540000-0x0000000002558000-memory.dmp healer behavioral1/memory/4224-49-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-47-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-45-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-43-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-41-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-39-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-37-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-35-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-33-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-31-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-29-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-27-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-25-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-23-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4224-22-0x0000000002540000-0x0000000002552000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7292.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7292.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2952-61-0x00000000023D0000-0x0000000002416000-memory.dmp family_redline behavioral1/memory/2952-62-0x0000000005060000-0x00000000050A4000-memory.dmp family_redline behavioral1/memory/2952-68-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-74-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-96-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-94-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-92-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-90-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-88-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-86-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-84-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-80-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-78-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-76-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-72-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-70-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-82-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-66-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-64-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2952-63-0x0000000005060000-0x000000000509F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1744 un660895.exe 4224 pro7292.exe 2952 qu6537.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7292.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7292.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30e7f8c8220d7d198cccddae8e5947d5c9e985097e0c58b54f19afd76cc1b6a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un660895.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30e7f8c8220d7d198cccddae8e5947d5c9e985097e0c58b54f19afd76cc1b6a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un660895.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7292.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6537.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4224 pro7292.exe 4224 pro7292.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4224 pro7292.exe Token: SeDebugPrivilege 2952 qu6537.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4460 wrote to memory of 1744 4460 30e7f8c8220d7d198cccddae8e5947d5c9e985097e0c58b54f19afd76cc1b6a9.exe 83 PID 4460 wrote to memory of 1744 4460 30e7f8c8220d7d198cccddae8e5947d5c9e985097e0c58b54f19afd76cc1b6a9.exe 83 PID 4460 wrote to memory of 1744 4460 30e7f8c8220d7d198cccddae8e5947d5c9e985097e0c58b54f19afd76cc1b6a9.exe 83 PID 1744 wrote to memory of 4224 1744 un660895.exe 84 PID 1744 wrote to memory of 4224 1744 un660895.exe 84 PID 1744 wrote to memory of 4224 1744 un660895.exe 84 PID 1744 wrote to memory of 2952 1744 un660895.exe 93 PID 1744 wrote to memory of 2952 1744 un660895.exe 93 PID 1744 wrote to memory of 2952 1744 un660895.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\30e7f8c8220d7d198cccddae8e5947d5c9e985097e0c58b54f19afd76cc1b6a9.exe"C:\Users\Admin\AppData\Local\Temp\30e7f8c8220d7d198cccddae8e5947d5c9e985097e0c58b54f19afd76cc1b6a9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un660895.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un660895.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7292.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7292.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4224
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6537.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6537.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD5d5115721a2ba61f2347179f632f67845
SHA1fcc081980a4fc5847529ac0d8ec5447c1e3265f4
SHA256529c5858377ac20799e334d6adfc71324a2f7748fc8c5ef514cd901c23aa161e
SHA5128541d4d71949472d631cd6e3b3ac4c80c39cdcba65559949e6dab6424c57cb8c691a7a3fdd579435d27a7ab196c2073e0ec6261e42d814333a2c3dadc22cfbcd
-
Filesize
236KB
MD52b3a59a3aa6555268ba642e473171129
SHA1f6fcd9c287afc3e41171ef66dbaff9e9c6ee7083
SHA2560ac39b669e71ca69e72366051bf04d6a5751e093f5b9cc41fa3a5868fd6f3b37
SHA512efdfe00adbbb6299fd683676680e242cd35662ff8c58ebe58e781160d8543f82ac6d1dd14c6ad38a7d203ac32adff1c6a0c81f543daa9b0bd39a2828cd779bc6
-
Filesize
295KB
MD50da150385ecd7aa27f3804912d711e47
SHA146b07c4289b417f333d1ccd50e4159349a166e32
SHA256452c996fe5527b113dfd62ba5bd79d1235786e85698773a3b39befd530c1eb94
SHA512f28693d62ecb3c8da404eea3b30d1e37b4ceda6ca25c25daf251e2225383fadfa3a80ab512f5522507a8153e9b8b37db24a5fc25c170344f42e82356f0b13d8b