Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 23:09
Static task
static1
Behavioral task
behavioral1
Sample
11608ca26b72774f66dc61909e2b201f38ea63b559b31a60e7ca2a82dceacfc0.exe
Resource
win10v2004-20241007-en
General
-
Target
11608ca26b72774f66dc61909e2b201f38ea63b559b31a60e7ca2a82dceacfc0.exe
-
Size
672KB
-
MD5
70a6b14e4c64e892a77b7bfb153cfb72
-
SHA1
d0a693aaca5e02e57870934059d84a6bf192662e
-
SHA256
11608ca26b72774f66dc61909e2b201f38ea63b559b31a60e7ca2a82dceacfc0
-
SHA512
e3d2aee0ad986cd3067a1750eb721b1bbef02ad6469d9e915e2d94d69a2b12aa253bbd2f8d22c70281d01013d3debd4ba6d47620266eb40863e97ed5458c4ef6
-
SSDEEP
12288:JMroy90FQYyZEvZKqF2B+iTUrIxVLewrm4djiyy0smzy9kcs1JqlzG:pyj/ZEvZKqdfrIxVxdmyy0smz0DqV
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3084-19-0x0000000002280000-0x000000000229A000-memory.dmp healer behavioral1/memory/3084-21-0x00000000024D0000-0x00000000024E8000-memory.dmp healer behavioral1/memory/3084-49-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-22-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-47-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-45-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-44-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-42-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-39-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-37-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-35-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-33-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-32-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-30-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-27-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-25-0x00000000024D0000-0x00000000024E2000-memory.dmp healer behavioral1/memory/3084-23-0x00000000024D0000-0x00000000024E2000-memory.dmp healer -
Healer family
-
Processes:
pro7104.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7104.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7104.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1648-61-0x0000000002290000-0x00000000022D6000-memory.dmp family_redline behavioral1/memory/1648-62-0x00000000024A0000-0x00000000024E4000-memory.dmp family_redline behavioral1/memory/1648-76-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-78-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-96-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-94-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-92-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-90-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-88-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-86-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-84-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-82-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-80-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-74-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-72-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-70-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-68-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-66-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-64-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline behavioral1/memory/1648-63-0x00000000024A0000-0x00000000024DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un176691.exepro7104.exequ5696.exepid process 1820 un176691.exe 3084 pro7104.exe 1648 qu5696.exe -
Processes:
pro7104.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7104.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7104.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
11608ca26b72774f66dc61909e2b201f38ea63b559b31a60e7ca2a82dceacfc0.exeun176691.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 11608ca26b72774f66dc61909e2b201f38ea63b559b31a60e7ca2a82dceacfc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un176691.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4088 3084 WerFault.exe pro7104.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
11608ca26b72774f66dc61909e2b201f38ea63b559b31a60e7ca2a82dceacfc0.exeun176691.exepro7104.exequ5696.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11608ca26b72774f66dc61909e2b201f38ea63b559b31a60e7ca2a82dceacfc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un176691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7104.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5696.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7104.exepid process 3084 pro7104.exe 3084 pro7104.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7104.exequ5696.exedescription pid process Token: SeDebugPrivilege 3084 pro7104.exe Token: SeDebugPrivilege 1648 qu5696.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
11608ca26b72774f66dc61909e2b201f38ea63b559b31a60e7ca2a82dceacfc0.exeun176691.exedescription pid process target process PID 5064 wrote to memory of 1820 5064 11608ca26b72774f66dc61909e2b201f38ea63b559b31a60e7ca2a82dceacfc0.exe un176691.exe PID 5064 wrote to memory of 1820 5064 11608ca26b72774f66dc61909e2b201f38ea63b559b31a60e7ca2a82dceacfc0.exe un176691.exe PID 5064 wrote to memory of 1820 5064 11608ca26b72774f66dc61909e2b201f38ea63b559b31a60e7ca2a82dceacfc0.exe un176691.exe PID 1820 wrote to memory of 3084 1820 un176691.exe pro7104.exe PID 1820 wrote to memory of 3084 1820 un176691.exe pro7104.exe PID 1820 wrote to memory of 3084 1820 un176691.exe pro7104.exe PID 1820 wrote to memory of 1648 1820 un176691.exe qu5696.exe PID 1820 wrote to memory of 1648 1820 un176691.exe qu5696.exe PID 1820 wrote to memory of 1648 1820 un176691.exe qu5696.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11608ca26b72774f66dc61909e2b201f38ea63b559b31a60e7ca2a82dceacfc0.exe"C:\Users\Admin\AppData\Local\Temp\11608ca26b72774f66dc61909e2b201f38ea63b559b31a60e7ca2a82dceacfc0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un176691.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un176691.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7104.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7104.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 10804⤵
- Program crash
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5696.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5696.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3084 -ip 30841⤵PID:4524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
530KB
MD579ee75c981a5f2fc8ceea1127daf9ebf
SHA1ca717b52dd8ae5e5fc5a5c5c0653e3c6088956d4
SHA256b94853956061c898a6342ce4ff205c9ff951646ad640123c0a280820753d1749
SHA512d6ed86e3f23be06828cdb0f2fea66445acf278ec9f7a3f3af77db0ed36a4c968ca17feaa8c03c76b5a6652ad2d644244a85acb39773c70cdf283e17e466754ea
-
Filesize
260KB
MD543cbe39084c63a6d949e92594119e989
SHA1ad443cf21985f923873ad299370cefb78f059c04
SHA2566281cba2d39279a9b2bb37d877f36f76ab06dca27a21779510a03c80b5398ea5
SHA51203792a1be4720617ee9f3bc6baaf10579061a667998efa54639c83fe961cec7ad01ab93e78203b4c94a915f6ec2118daf23a11c4a5e4d219d210134b6e08d79b
-
Filesize
319KB
MD5402648b11f3d1c35e0927ec4287b0cc2
SHA13050a4757c19b12f4cc286e4485406eb0c7425e2
SHA256589a797a7ab2159eb7507ec4bc6b2968d1fcefa6a3cff857340750d8cb76a6e2
SHA51272f408a3646168fc05585c32b2561c202297499d8960e2645c2fff33977332c2991ebd2004f2f7cfd4ae9f9a97a09db84d6a8ab448ab9febb24374c65d1abc65