Analysis
-
max time kernel
113s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
8b941fe936ae374922c90d4a855082659c8f98b27456a0623ced965d86d0059fN.exe
Resource
win10v2004-20241007-en
General
-
Target
8b941fe936ae374922c90d4a855082659c8f98b27456a0623ced965d86d0059fN.exe
-
Size
651KB
-
MD5
1d77e30d44293344767ee172b189e2a0
-
SHA1
b4b43a0d69924cd5993dbe8818e613a99c37c811
-
SHA256
8b941fe936ae374922c90d4a855082659c8f98b27456a0623ced965d86d0059f
-
SHA512
421e53095e0fe51dd7483699106dd17d1bc7ad147a1dd1ed546713a3d6dfa9e12fa723e6ed021b354b7b0a02f56780c5bc73dbd8abe0b62e1c06f697a9896363
-
SSDEEP
12288:AMrIy90jb//HOJ3g7pTHaTBD3KEYmdikaft43o3:4y4bDHqBDBYmdWft430
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x0008000000023c78-12.dat healer behavioral1/memory/2100-15-0x0000000000280000-0x000000000028A000-memory.dmp healer behavioral1/memory/3888-22-0x0000000003A90000-0x0000000003AAA000-memory.dmp healer behavioral1/memory/3888-24-0x0000000003D20000-0x0000000003D38000-memory.dmp healer behavioral1/memory/3888-25-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-30-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-52-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-51-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-48-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-46-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-45-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-43-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-40-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-38-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-36-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-34-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-32-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-28-0x0000000003D20000-0x0000000003D32000-memory.dmp healer behavioral1/memory/3888-26-0x0000000003D20000-0x0000000003D32000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cor8803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cor8803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cor8803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bu484253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bu484253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bu484253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cor8803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cor8803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cor8803.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bu484253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bu484253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bu484253.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3944-60-0x0000000002740000-0x0000000002786000-memory.dmp family_redline behavioral1/memory/3944-61-0x00000000050C0000-0x0000000005104000-memory.dmp family_redline behavioral1/memory/3944-83-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-95-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-93-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-91-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-90-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-87-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-85-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-81-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-79-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-77-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-75-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-73-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-71-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-69-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-67-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-65-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-63-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3944-62-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
pid Process 4032 kina8133.exe 2100 bu484253.exe 3888 cor8803.exe 3944 dft66s05.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bu484253.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cor8803.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cor8803.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8b941fe936ae374922c90d4a855082659c8f98b27456a0623ced965d86d0059fN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" kina8133.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1772 3888 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b941fe936ae374922c90d4a855082659c8f98b27456a0623ced965d86d0059fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kina8133.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cor8803.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dft66s05.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2100 bu484253.exe 2100 bu484253.exe 3888 cor8803.exe 3888 cor8803.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2100 bu484253.exe Token: SeDebugPrivilege 3888 cor8803.exe Token: SeDebugPrivilege 3944 dft66s05.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3224 wrote to memory of 4032 3224 8b941fe936ae374922c90d4a855082659c8f98b27456a0623ced965d86d0059fN.exe 83 PID 3224 wrote to memory of 4032 3224 8b941fe936ae374922c90d4a855082659c8f98b27456a0623ced965d86d0059fN.exe 83 PID 3224 wrote to memory of 4032 3224 8b941fe936ae374922c90d4a855082659c8f98b27456a0623ced965d86d0059fN.exe 83 PID 4032 wrote to memory of 2100 4032 kina8133.exe 85 PID 4032 wrote to memory of 2100 4032 kina8133.exe 85 PID 4032 wrote to memory of 3888 4032 kina8133.exe 98 PID 4032 wrote to memory of 3888 4032 kina8133.exe 98 PID 4032 wrote to memory of 3888 4032 kina8133.exe 98 PID 3224 wrote to memory of 3944 3224 8b941fe936ae374922c90d4a855082659c8f98b27456a0623ced965d86d0059fN.exe 109 PID 3224 wrote to memory of 3944 3224 8b941fe936ae374922c90d4a855082659c8f98b27456a0623ced965d86d0059fN.exe 109 PID 3224 wrote to memory of 3944 3224 8b941fe936ae374922c90d4a855082659c8f98b27456a0623ced965d86d0059fN.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b941fe936ae374922c90d4a855082659c8f98b27456a0623ced965d86d0059fN.exe"C:\Users\Admin\AppData\Local\Temp\8b941fe936ae374922c90d4a855082659c8f98b27456a0623ced965d86d0059fN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8133.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kina8133.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bu484253.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\bu484253.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cor8803.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\cor8803.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 10884⤵
- Program crash
PID:1772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dft66s05.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dft66s05.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3888 -ip 38881⤵PID:2332
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD531a94ee9a40155e48e979eb4a5e7852f
SHA1cdc22ef200a53bfa1d32223232519e456c302b60
SHA2568fa1b0a56c7f233109e5b51167a0e1dcf9f0d7fed36187db8e7bf4dd694a9d2f
SHA512e577af4e2594b68a6a35679ee491be6fc58a5358f21406e18adc2e529574ae26a6dce913eba63a03a1451ad6656b285a7a9d6b14aab92149e9b188a9d38dba08
-
Filesize
322KB
MD52ea07ec218e789f2c47e566c4f276166
SHA1316765f38129076233474f22cc70a22af82c54ec
SHA25639c834526c9c9ca6c3d00533175c8184ba3370973cd014afa789c1811173417b
SHA5128c149573dbf270fdc43cf162254bfff7d9e3de0d43d906cdb89855a21351c72ebcf7760d3b7f7c6a51a1fe4597689f08ffcdd9a5e908da4c3127522765dacd3d
-
Filesize
14KB
MD5080bf73ae1fe26f5243743103d4b11dc
SHA1336c624d168a88680bbe3384e15f3a6daff27590
SHA256942b75aaeaa0e784a1b150da25d483875e390d7c6f2992f438b8d7f2371cc683
SHA512377d574241908b057138bfa6d7097db713af2a4905d4d25e7e5cd03142b628701d7478ca05fb36694082275af8da855caeb27cde75e23b06aa663ccc58c5c8db
-
Filesize
276KB
MD5e677fe83f3ec53addadcce9bd19831f3
SHA11d231c65a73643bbe5276b3bcb7ed0cee748d1fa
SHA25692bfb0abc5ffd1748483b3d28b5aadfb80169bbd258e33aec01443f51b72c59d
SHA512993601e29e2de49dd905dee84a5d187bd2bf88b25c594924b71122d7df69ee1a9123ffbbfb0abc6ffd8a05741ea7855460ff12e9040647c5d4c7853cbda079b5