Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:55
Static task
static1
Behavioral task
behavioral1
Sample
f747cf1a77cf4635a548d1910d6b78bd3f029f7f311e0eafad415b781853e475.exe
Resource
win10v2004-20241007-en
General
-
Target
f747cf1a77cf4635a548d1910d6b78bd3f029f7f311e0eafad415b781853e475.exe
-
Size
659KB
-
MD5
fdf162e96ad04f7db8b2aa205ecaca63
-
SHA1
2239cc5b842dea96c62117dbd9bbe89aebe05fdc
-
SHA256
f747cf1a77cf4635a548d1910d6b78bd3f029f7f311e0eafad415b781853e475
-
SHA512
409d52e884666d7c52fbc6cdbd224dd85fa5b1b65751a159ff45a9b20322a4c1db802ae77d406ea1a0302fb3bf9de531d46f39b0c95365955da79086531868bf
-
SSDEEP
12288:LMrIy904qy+2hLigsf6Nx0MkRJstRhL50o0t6LC7:HyHqy+UEk0ahLyaLE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4652-18-0x00000000047A0000-0x00000000047BA000-memory.dmp healer behavioral1/memory/4652-20-0x0000000007120000-0x0000000007138000-memory.dmp healer behavioral1/memory/4652-46-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-48-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-44-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-42-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-40-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-38-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-36-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-34-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-32-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-30-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-28-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-26-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-24-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-22-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/4652-21-0x0000000007120000-0x0000000007132000-memory.dmp healer -
Healer family
-
Processes:
pro5860.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5860.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5860.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/872-60-0x0000000004B00000-0x0000000004B46000-memory.dmp family_redline behavioral1/memory/872-61-0x0000000007740000-0x0000000007784000-memory.dmp family_redline behavioral1/memory/872-79-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-85-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-95-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-91-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-89-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-87-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-83-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-81-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-77-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-76-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-74-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-71-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-70-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-93-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-67-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-65-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-63-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/872-62-0x0000000007740000-0x000000000777F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un611101.exepro5860.exequ1199.exepid process 1788 un611101.exe 4652 pro5860.exe 872 qu1199.exe -
Processes:
pro5860.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5860.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5860.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f747cf1a77cf4635a548d1910d6b78bd3f029f7f311e0eafad415b781853e475.exeun611101.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f747cf1a77cf4635a548d1910d6b78bd3f029f7f311e0eafad415b781853e475.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un611101.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1056 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2420 4652 WerFault.exe pro5860.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f747cf1a77cf4635a548d1910d6b78bd3f029f7f311e0eafad415b781853e475.exeun611101.exepro5860.exequ1199.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f747cf1a77cf4635a548d1910d6b78bd3f029f7f311e0eafad415b781853e475.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un611101.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1199.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5860.exepid process 4652 pro5860.exe 4652 pro5860.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5860.exequ1199.exedescription pid process Token: SeDebugPrivilege 4652 pro5860.exe Token: SeDebugPrivilege 872 qu1199.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f747cf1a77cf4635a548d1910d6b78bd3f029f7f311e0eafad415b781853e475.exeun611101.exedescription pid process target process PID 2444 wrote to memory of 1788 2444 f747cf1a77cf4635a548d1910d6b78bd3f029f7f311e0eafad415b781853e475.exe un611101.exe PID 2444 wrote to memory of 1788 2444 f747cf1a77cf4635a548d1910d6b78bd3f029f7f311e0eafad415b781853e475.exe un611101.exe PID 2444 wrote to memory of 1788 2444 f747cf1a77cf4635a548d1910d6b78bd3f029f7f311e0eafad415b781853e475.exe un611101.exe PID 1788 wrote to memory of 4652 1788 un611101.exe pro5860.exe PID 1788 wrote to memory of 4652 1788 un611101.exe pro5860.exe PID 1788 wrote to memory of 4652 1788 un611101.exe pro5860.exe PID 1788 wrote to memory of 872 1788 un611101.exe qu1199.exe PID 1788 wrote to memory of 872 1788 un611101.exe qu1199.exe PID 1788 wrote to memory of 872 1788 un611101.exe qu1199.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f747cf1a77cf4635a548d1910d6b78bd3f029f7f311e0eafad415b781853e475.exe"C:\Users\Admin\AppData\Local\Temp\f747cf1a77cf4635a548d1910d6b78bd3f029f7f311e0eafad415b781853e475.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un611101.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un611101.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5860.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5860.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 10844⤵
- Program crash
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1199.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1199.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4652 -ip 46521⤵PID:2596
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1056
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD592474c043bc9aee9784f4239f0d77384
SHA1fffcfe4082c7fddbf4ba1372bfe31005c5203db6
SHA25642cce99a9a94c9081ea595d72656b646966d3a36e91335f4660736e406624900
SHA5120b2236d745569fa253ca324d53919a3a0dea2d984b304a7f8b016ec99527661a34763835523f65c75df7da0582e08a82c8e0453b017a328c08e0887131d20582
-
Filesize
296KB
MD5a00dee68d73309a166b6a30b253fcf6c
SHA16a1ea6276c18d22a95162be1cff3802b3f72da0a
SHA256c3a1f489b7d32be71dbf74444be8a2daee95f0f4d77f0392c4d2adece530693f
SHA51294fb66289bd14e0a38757f480a62c19cbac54c2b97636780f94f1604a41ca04a6ec68060337572623bf77a91f8515712e069e6aa92a4f8682c1e8f7b154d4134
-
Filesize
355KB
MD5e356737fca66b0e1a3b9abf7d4206e3c
SHA1d481703a6342da96bb9d96c1461b0438ab2313db
SHA256238aaad1613363a7a5708777e00b726333439d948727922cab35cc19fdac12d8
SHA512943aa02a55a9b02c103fc0aab3a89224e2e59d557b37cc2f121127417d421cc63885054e1ebf56952144bb0ad1fb29b6fe446d40ae96f908f2341e69db04cb9d