Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
278d03012659451f2b07f0f580185b8ba507fee5ec3258e776b9bfa88bd3d8af.exe
Resource
win10v2004-20241007-en
General
-
Target
278d03012659451f2b07f0f580185b8ba507fee5ec3258e776b9bfa88bd3d8af.exe
-
Size
670KB
-
MD5
1275a2ca634e5d143b631174ec80191a
-
SHA1
c8bfc5581e7d8e60936e4fe89c9dcb19f4f64cbc
-
SHA256
278d03012659451f2b07f0f580185b8ba507fee5ec3258e776b9bfa88bd3d8af
-
SHA512
0a8d688d81dbb50456b1463de8a362989c3c4f5a1a5f7c40e82b070222725316c074ba45f0ebf5485d9902becbb432ff5a35e0745fd25d184134efd811157186
-
SSDEEP
12288:gMrAy902ckyVsF6uFeim/BiyMt59TrwKSLCQf9ft/jukWFfIU:wyE7VsFX8ZiJt5htSmQ1B/WpIU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3152-19-0x0000000002350000-0x000000000236A000-memory.dmp healer behavioral1/memory/3152-21-0x00000000025E0000-0x00000000025F8000-memory.dmp healer behavioral1/memory/3152-45-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-49-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-47-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-43-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-41-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-40-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-38-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-35-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-33-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-31-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-29-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-27-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-25-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-23-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/3152-22-0x00000000025E0000-0x00000000025F2000-memory.dmp healer -
Healer family
-
Processes:
pro2399.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2399.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4980-61-0x00000000026D0000-0x0000000002716000-memory.dmp family_redline behavioral1/memory/4980-62-0x0000000004AD0000-0x0000000004B14000-memory.dmp family_redline behavioral1/memory/4980-68-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-92-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-96-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-90-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-88-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-86-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-84-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-82-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-80-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-79-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-76-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-74-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-72-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-70-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-94-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-66-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-64-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/4980-63-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un416647.exepro2399.exequ6816.exepid process 3816 un416647.exe 3152 pro2399.exe 4980 qu6816.exe -
Processes:
pro2399.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2399.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2399.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
278d03012659451f2b07f0f580185b8ba507fee5ec3258e776b9bfa88bd3d8af.exeun416647.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 278d03012659451f2b07f0f580185b8ba507fee5ec3258e776b9bfa88bd3d8af.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un416647.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3028 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3440 3152 WerFault.exe pro2399.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
278d03012659451f2b07f0f580185b8ba507fee5ec3258e776b9bfa88bd3d8af.exeun416647.exepro2399.exequ6816.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 278d03012659451f2b07f0f580185b8ba507fee5ec3258e776b9bfa88bd3d8af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un416647.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6816.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro2399.exepid process 3152 pro2399.exe 3152 pro2399.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro2399.exequ6816.exedescription pid process Token: SeDebugPrivilege 3152 pro2399.exe Token: SeDebugPrivilege 4980 qu6816.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
278d03012659451f2b07f0f580185b8ba507fee5ec3258e776b9bfa88bd3d8af.exeun416647.exedescription pid process target process PID 2640 wrote to memory of 3816 2640 278d03012659451f2b07f0f580185b8ba507fee5ec3258e776b9bfa88bd3d8af.exe un416647.exe PID 2640 wrote to memory of 3816 2640 278d03012659451f2b07f0f580185b8ba507fee5ec3258e776b9bfa88bd3d8af.exe un416647.exe PID 2640 wrote to memory of 3816 2640 278d03012659451f2b07f0f580185b8ba507fee5ec3258e776b9bfa88bd3d8af.exe un416647.exe PID 3816 wrote to memory of 3152 3816 un416647.exe pro2399.exe PID 3816 wrote to memory of 3152 3816 un416647.exe pro2399.exe PID 3816 wrote to memory of 3152 3816 un416647.exe pro2399.exe PID 3816 wrote to memory of 4980 3816 un416647.exe qu6816.exe PID 3816 wrote to memory of 4980 3816 un416647.exe qu6816.exe PID 3816 wrote to memory of 4980 3816 un416647.exe qu6816.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\278d03012659451f2b07f0f580185b8ba507fee5ec3258e776b9bfa88bd3d8af.exe"C:\Users\Admin\AppData\Local\Temp\278d03012659451f2b07f0f580185b8ba507fee5ec3258e776b9bfa88bd3d8af.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un416647.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un416647.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2399.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2399.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3152 -s 11044⤵
- Program crash
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6816.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6816.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3152 -ip 31521⤵PID:1920
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3028
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5a289d09e4bfba78dd306ca4e57b9d06f
SHA13ee16be5d174a315dd8feff4d47ebdefed8a2ec2
SHA256a7b400e18525cea18dda6fbe1bc3b01126ad171345050b3a06f676db9abe81e0
SHA512ab1cbc81870239d6d7d70dfa2626a87298a9af6798aca1266018b07fec67fcd8ed98449b5c96e6015bc12f22849ebe7bc0916ef8e1b27ecc6e09593d90c02316
-
Filesize
237KB
MD50ea152c4b1cc89834ceada97a82ed312
SHA1610f2827796dad644695b6ef1b5e28a3ce7afe3d
SHA2566bac8a61ef2452fd3abe30a24aa4623080267a7548b0a76c8cd8a342968f5475
SHA5120f84030fa6ff9d6aabf40dbf1576e36eb23b839fcc752bc14106f59b8f8386ffd6c6082bec3f9c495289dde8cacc288d1f73553c836cf76a2bc5964bdf7ad9ba
-
Filesize
295KB
MD5723892c1edbac2868bcc32332a6bf0a0
SHA1210830996b0bfa1dc6f08901f48922e628b11268
SHA25697206a38825a513b9581bf5e264c519973bbcc8dce5ffb0e1a3bc0d76d7cab04
SHA5129dc0381ece2d6c8c8ec80991960d927dbee23ccee3bb355c7d8eb86de7d2f493f2bf6cb7e8375e61d26650957a1f7e9b1691a30a8cc7c1599ba7ae5599b7ee3f