Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:44
Static task
static1
Behavioral task
behavioral1
Sample
ce9212340751134327e84166b3912826c87570fd5c9469305a19366eb1921749.exe
Resource
win10v2004-20241007-en
General
-
Target
ce9212340751134327e84166b3912826c87570fd5c9469305a19366eb1921749.exe
-
Size
666KB
-
MD5
2036b856af564e894006ebf6998562e6
-
SHA1
2df535b5c12b8b89422c1c52ac57e17c70bf17d9
-
SHA256
ce9212340751134327e84166b3912826c87570fd5c9469305a19366eb1921749
-
SHA512
ef95c75d9819221387fbe8571dfcd0ff3610cfbcc1cf8fd5640945cbb359c8bc27e2a5bb26d8c98feff10ea2c5693644592c4ef4a1fc340143bfa8ff88178a72
-
SSDEEP
12288:gMrly90wMcKdvyGUbGHVK6XUlRnJtPjki4UB7OZmtbNQbwlC:1y1McKdvj3ARnJVjkilB7OZmFNQz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1836-19-0x0000000002750000-0x000000000276A000-memory.dmp healer behavioral1/memory/1836-21-0x00000000028C0000-0x00000000028D8000-memory.dmp healer behavioral1/memory/1836-25-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-49-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-48-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-45-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-41-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-43-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-39-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-37-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-35-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-33-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-31-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-29-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-27-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-23-0x00000000028C0000-0x00000000028D2000-memory.dmp healer behavioral1/memory/1836-22-0x00000000028C0000-0x00000000028D2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9664.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9664.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/732-61-0x0000000004D70000-0x0000000004DB6000-memory.dmp family_redline behavioral1/memory/732-62-0x00000000053E0000-0x0000000005424000-memory.dmp family_redline behavioral1/memory/732-66-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-70-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-68-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-80-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-64-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-63-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-96-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-94-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-92-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-90-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-88-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-86-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-84-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-82-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-78-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-76-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-74-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/732-72-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4972 un086645.exe 1836 pro9664.exe 732 qu4453.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9664.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9664.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce9212340751134327e84166b3912826c87570fd5c9469305a19366eb1921749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un086645.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5896 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2436 1836 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9664.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4453.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce9212340751134327e84166b3912826c87570fd5c9469305a19366eb1921749.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un086645.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1836 pro9664.exe 1836 pro9664.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1836 pro9664.exe Token: SeDebugPrivilege 732 qu4453.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2520 wrote to memory of 4972 2520 ce9212340751134327e84166b3912826c87570fd5c9469305a19366eb1921749.exe 84 PID 2520 wrote to memory of 4972 2520 ce9212340751134327e84166b3912826c87570fd5c9469305a19366eb1921749.exe 84 PID 2520 wrote to memory of 4972 2520 ce9212340751134327e84166b3912826c87570fd5c9469305a19366eb1921749.exe 84 PID 4972 wrote to memory of 1836 4972 un086645.exe 85 PID 4972 wrote to memory of 1836 4972 un086645.exe 85 PID 4972 wrote to memory of 1836 4972 un086645.exe 85 PID 4972 wrote to memory of 732 4972 un086645.exe 97 PID 4972 wrote to memory of 732 4972 un086645.exe 97 PID 4972 wrote to memory of 732 4972 un086645.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce9212340751134327e84166b3912826c87570fd5c9469305a19366eb1921749.exe"C:\Users\Admin\AppData\Local\Temp\ce9212340751134327e84166b3912826c87570fd5c9469305a19366eb1921749.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un086645.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un086645.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9664.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9664.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 10844⤵
- Program crash
PID:2436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4453.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4453.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1836 -ip 18361⤵PID:1072
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5896
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD53257c59577e4c09d1c4479f180d10951
SHA1f36912b2db29331fdf242ab3ee0ccc9c78e96bad
SHA256e4fdce9ab8447704faaf26ad4fb8de380143f46edba78660cc1f934957d090de
SHA51250becdac1fe6bdaa8852dadcf103b1a1349a4f6992dd5427ee5119f940668d6f0acb5182cf7c6d7ad3ca903ece74e12c0ff9663a157d5e4f1ef22fc3d2716c3a
-
Filesize
294KB
MD5bf6b727c06715ec3dbcfb7b6f2c94691
SHA1b790fd69d783cd43303f46a3a3163e75494945c4
SHA25607077ff4fcb468bba0659e46dbada1b47054325450e3c28b03ca76ac57cd2432
SHA5122829d073ae574117025f25630e5595afbc08cfcba1baf4765b55ccb80c4e56641d195e7581386a1e10f716f1cade3a36dcf43481a0411a9df76aee903b48e831
-
Filesize
353KB
MD577a53560d65f10c90f484ffc0b5a3dd8
SHA150b06d3ab364f085b3de9749596680e57e21bc71
SHA2567b011833eea56518a478c2540f890b45ad1ea90ff9d4da9399a60174181492cb
SHA5126f780c21aec1a35a639dc42dd7c88b0490ac4e31458bf399717f0c0c0c56497f6d9cff7d935b2b4b9d1d869c7bdde8fb12c4b1d67158868ea412f5d14e83fbf1