Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:26
Static task
static1
Behavioral task
behavioral1
Sample
5cb1e4d2618585c179bc55e17d78914dd3fcc6d1b579f0355eba1b56d1f6c7af.exe
Resource
win10v2004-20241007-en
General
-
Target
5cb1e4d2618585c179bc55e17d78914dd3fcc6d1b579f0355eba1b56d1f6c7af.exe
-
Size
689KB
-
MD5
d6c50befb73cd9e1bc55f4a81d618764
-
SHA1
7d715230bd884950b83e65c63a529f9fd21206c9
-
SHA256
5cb1e4d2618585c179bc55e17d78914dd3fcc6d1b579f0355eba1b56d1f6c7af
-
SHA512
0b5582559dce7b01f0f1b37476672529c12b3c86c148acb0965e7ac3b445bbc938e63b4a0ab646d32ed02a9e06052c670b3571476dec230f283f48ce4f54e7b6
-
SSDEEP
12288:0Mrsy90rBjUjP77A3BpEVrgUH30aDYWA80Pszz9hOZf0jjDwi:IyAGXgBpEZgUX0Gb+Uf9WcjnH
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3472-19-0x00000000026A0000-0x00000000026BA000-memory.dmp healer behavioral1/memory/3472-21-0x0000000002840000-0x0000000002858000-memory.dmp healer behavioral1/memory/3472-27-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-43-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-49-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-45-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-41-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-39-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-37-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-35-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-33-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-31-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-29-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-25-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-23-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-22-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/3472-47-0x0000000002840000-0x0000000002852000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5574.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5574.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2008-60-0x0000000002460000-0x00000000024A6000-memory.dmp family_redline behavioral1/memory/2008-61-0x0000000002660000-0x00000000026A4000-memory.dmp family_redline behavioral1/memory/2008-69-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-73-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-95-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-91-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-89-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-87-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-85-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-83-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-81-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-79-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-77-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-75-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-71-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-93-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-67-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-65-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-63-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/2008-62-0x0000000002660000-0x000000000269F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4920 un943626.exe 3472 pro5574.exe 2008 qu8327.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5574.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5574.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un943626.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5cb1e4d2618585c179bc55e17d78914dd3fcc6d1b579f0355eba1b56d1f6c7af.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3080 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4460 3472 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5cb1e4d2618585c179bc55e17d78914dd3fcc6d1b579f0355eba1b56d1f6c7af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un943626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5574.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8327.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3472 pro5574.exe 3472 pro5574.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3472 pro5574.exe Token: SeDebugPrivilege 2008 qu8327.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3312 wrote to memory of 4920 3312 5cb1e4d2618585c179bc55e17d78914dd3fcc6d1b579f0355eba1b56d1f6c7af.exe 84 PID 3312 wrote to memory of 4920 3312 5cb1e4d2618585c179bc55e17d78914dd3fcc6d1b579f0355eba1b56d1f6c7af.exe 84 PID 3312 wrote to memory of 4920 3312 5cb1e4d2618585c179bc55e17d78914dd3fcc6d1b579f0355eba1b56d1f6c7af.exe 84 PID 4920 wrote to memory of 3472 4920 un943626.exe 85 PID 4920 wrote to memory of 3472 4920 un943626.exe 85 PID 4920 wrote to memory of 3472 4920 un943626.exe 85 PID 4920 wrote to memory of 2008 4920 un943626.exe 97 PID 4920 wrote to memory of 2008 4920 un943626.exe 97 PID 4920 wrote to memory of 2008 4920 un943626.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\5cb1e4d2618585c179bc55e17d78914dd3fcc6d1b579f0355eba1b56d1f6c7af.exe"C:\Users\Admin\AppData\Local\Temp\5cb1e4d2618585c179bc55e17d78914dd3fcc6d1b579f0355eba1b56d1f6c7af.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un943626.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un943626.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5574.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5574.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 10804⤵
- Program crash
PID:4460
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8327.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8327.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3472 -ip 34721⤵PID:1152
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3080
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD59fa60f04ffc456904dea0dda75c1c221
SHA1365a5fea1ab1796b602b33159e353452809d75ce
SHA256b6b748700b7057af9e90dcb22b19eb76fc0d295aff94bcc53004d530397dee3a
SHA512a5ea44125b1d2eb2acea59de80efad43804cb72252f2493fe7c0d340d4f4f6e270aadbc5ba06cc94d72f4c78a686f2a0a0d8fbaab74994163eb2531caa8d0900
-
Filesize
314KB
MD552f006102ed459475a61e0ab04335222
SHA1254efda7c2585e6a36100292982e28ee25198510
SHA2564d12f0aa10e7c5bdfb0c270c89d6e38dfbfa4652161ef0fc6e1477757caab270
SHA5128efed9476606f6015c930b493844a1e1c5970e89dfb3d027fd19667659265873ee3e70dda1998a088c1d477a9ef7bfa113047a1f9498fd461a88b68573e67552
-
Filesize
372KB
MD5c262fe05f466724e22439184a1728145
SHA1338e8bc813ef8dbddd02deef0b7b2d23561b26b2
SHA256cc7f7d695951a914be7fc92c2675058c8ece998099a4697178fa6e9cfa7da476
SHA512928aa0ab2a8f64fea7a80aa96abc07ff937f8b834874bcced8794e96931f2d8993c71d697e1e02ffd8370fc9beb54c27e4d937ae89b815d1961cdb17306dc98b