Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:38
Static task
static1
Behavioral task
behavioral1
Sample
cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76.exe
Resource
win10v2004-20241007-en
General
-
Target
cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76.exe
-
Size
690KB
-
MD5
be9b041e2130c6e1581b48aa1324bbef
-
SHA1
eafff7350f613c9ea9b7df9a089dd91ce53c9355
-
SHA256
cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76
-
SHA512
63f155964ca5d241853582ca72e70a98a7b991ad6cfd2e59a3ec31454cbc9c0396382a5ff8150a788896ba7509f911573153549352fc9451e50e7b4a18958d95
-
SSDEEP
12288:1Mrky90mqxoQSYzGH8TmKNdCEsVh5R7MiEgHFKduhXNx8tcLrXGWBqsGoL:xyO1ShymSFOhLtFlxdx8tcvFGoL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3048-19-0x00000000027D0000-0x00000000027EA000-memory.dmp healer behavioral1/memory/3048-21-0x0000000002A60000-0x0000000002A78000-memory.dmp healer behavioral1/memory/3048-49-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-47-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-45-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-43-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-41-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-40-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-38-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-35-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-33-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-31-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-29-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-27-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-25-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-23-0x0000000002A60000-0x0000000002A72000-memory.dmp healer behavioral1/memory/3048-22-0x0000000002A60000-0x0000000002A72000-memory.dmp healer -
Healer family
-
Processes:
pro1945.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1945.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1640-61-0x00000000029D0000-0x0000000002A16000-memory.dmp family_redline behavioral1/memory/1640-62-0x00000000053C0000-0x0000000005404000-memory.dmp family_redline behavioral1/memory/1640-70-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-96-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-94-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-93-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-90-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-88-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-86-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-84-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-80-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-78-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-76-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-74-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-72-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-68-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-66-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-82-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-64-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/1640-63-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un852770.exepro1945.exequ3602.exepid process 3408 un852770.exe 3048 pro1945.exe 1640 qu3602.exe -
Processes:
pro1945.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1945.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76.exeun852770.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un852770.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1340 3048 WerFault.exe pro1945.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un852770.exepro1945.exequ3602.execc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un852770.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1945.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3602.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1945.exepid process 3048 pro1945.exe 3048 pro1945.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1945.exequ3602.exedescription pid process Token: SeDebugPrivilege 3048 pro1945.exe Token: SeDebugPrivilege 1640 qu3602.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76.exeun852770.exedescription pid process target process PID 1948 wrote to memory of 3408 1948 cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76.exe un852770.exe PID 1948 wrote to memory of 3408 1948 cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76.exe un852770.exe PID 1948 wrote to memory of 3408 1948 cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76.exe un852770.exe PID 3408 wrote to memory of 3048 3408 un852770.exe pro1945.exe PID 3408 wrote to memory of 3048 3408 un852770.exe pro1945.exe PID 3408 wrote to memory of 3048 3408 un852770.exe pro1945.exe PID 3408 wrote to memory of 1640 3408 un852770.exe qu3602.exe PID 3408 wrote to memory of 1640 3408 un852770.exe qu3602.exe PID 3408 wrote to memory of 1640 3408 un852770.exe qu3602.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76.exe"C:\Users\Admin\AppData\Local\Temp\cc0849062132b09b0525f8ce66debc8d04d91d90a9f8c040994893b5ea8ffa76.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un852770.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un852770.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1945.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1945.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 10804⤵
- Program crash
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3602.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3602.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3048 -ip 30481⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD5f8ccf58b0ad3ff1b6a3749c124b8f97f
SHA1b31c2827e5df5d129c49b1975cd3f9fd9b36f23f
SHA25608e1a183c91be8469c03b586e5c32a2237e1f6a345c60568e6f810ef946a46de
SHA512c14f4a9a0878777074010031cab852698d57d98c926bc5419a61c2c725bed7a9ca492d8d5a36050924e4e84126ddf7a27b6048122c8c94a98ba123dcc0b4cfd1
-
Filesize
312KB
MD5cc951d78426183f650c53c856233715e
SHA139c3330972f5b3420e64d9ab6c7221d5db900cbf
SHA25666ba050688d3c2b9ed13549aefe77fa06622842cc8e1bc0ff95fdf9e53229885
SHA512979f1d7d9b97f96ab4cb03d2f480c481bb2bbb5e5dddc57438d5cc405f65f80091cef13b571ddf30a3c56612566e0ab05b88c3bd376ce78877463d4426dfb408
-
Filesize
370KB
MD5eefe8b23ad257f2720f90745d10edeca
SHA1ef4f9869859db7f249ae0a0bf1e8df90bc8b1188
SHA256e964eabb260575edd11e43c4b2f20083509bb617058364d59d4133427bb666d3
SHA512d2433ef006c20df28e7f9bfe71850af8e0e94063b3edc2e672e8ff655059feb026c110656e2b687f644c04a8883b1bd63bf6a2eddc5a1e007941e340e89cca6b