Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
c01916a59c797b9bef53b47be0899abdc66d361767371e8ce008038e3e3a492a.exe
Resource
win10v2004-20241007-en
General
-
Target
c01916a59c797b9bef53b47be0899abdc66d361767371e8ce008038e3e3a492a.exe
-
Size
659KB
-
MD5
73a558e657dbc3b2202360d264bdc76d
-
SHA1
a0f606521fc20f3791bcdec3c9201a9fcdd975eb
-
SHA256
c01916a59c797b9bef53b47be0899abdc66d361767371e8ce008038e3e3a492a
-
SHA512
f521067d44e6e4f5af685c6e3869c28bbc5e2a73785d25167b99e8be2728de1fc43f7125051696d5823a8450b1f86a0b91e124e08239934600fd40938becde3b
-
SSDEEP
12288:nMrby90nneqfbl9GNFGWvmJtwWRr0B5V8MZqltHag6pFjlRgSaR1GoR3w:0ySeqfblAGWozWDZ6HagMFm6oS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/100-19-0x00000000027E0000-0x00000000027FA000-memory.dmp healer behavioral1/memory/100-21-0x0000000004D90000-0x0000000004DA8000-memory.dmp healer behavioral1/memory/100-41-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-47-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-45-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-43-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-49-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-40-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-37-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-35-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-33-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-31-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-29-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-27-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-25-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-23-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer behavioral1/memory/100-22-0x0000000004D90000-0x0000000004DA2000-memory.dmp healer -
Healer family
-
Processes:
pro2103.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2103.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2103.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2736-61-0x0000000004D80000-0x0000000004DC6000-memory.dmp family_redline behavioral1/memory/2736-62-0x0000000004E40000-0x0000000004E84000-memory.dmp family_redline behavioral1/memory/2736-66-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-76-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-96-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-94-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-92-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-90-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-88-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-86-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-84-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-82-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-80-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-74-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-72-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-70-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-68-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-78-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-64-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2736-63-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un217734.exepro2103.exequ2984.exepid process 1736 un217734.exe 100 pro2103.exe 2736 qu2984.exe -
Processes:
pro2103.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2103.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2103.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c01916a59c797b9bef53b47be0899abdc66d361767371e8ce008038e3e3a492a.exeun217734.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c01916a59c797b9bef53b47be0899abdc66d361767371e8ce008038e3e3a492a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un217734.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4672 100 WerFault.exe pro2103.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c01916a59c797b9bef53b47be0899abdc66d361767371e8ce008038e3e3a492a.exeun217734.exepro2103.exequ2984.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c01916a59c797b9bef53b47be0899abdc66d361767371e8ce008038e3e3a492a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un217734.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2103.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2984.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro2103.exepid process 100 pro2103.exe 100 pro2103.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro2103.exequ2984.exedescription pid process Token: SeDebugPrivilege 100 pro2103.exe Token: SeDebugPrivilege 2736 qu2984.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c01916a59c797b9bef53b47be0899abdc66d361767371e8ce008038e3e3a492a.exeun217734.exedescription pid process target process PID 1996 wrote to memory of 1736 1996 c01916a59c797b9bef53b47be0899abdc66d361767371e8ce008038e3e3a492a.exe un217734.exe PID 1996 wrote to memory of 1736 1996 c01916a59c797b9bef53b47be0899abdc66d361767371e8ce008038e3e3a492a.exe un217734.exe PID 1996 wrote to memory of 1736 1996 c01916a59c797b9bef53b47be0899abdc66d361767371e8ce008038e3e3a492a.exe un217734.exe PID 1736 wrote to memory of 100 1736 un217734.exe pro2103.exe PID 1736 wrote to memory of 100 1736 un217734.exe pro2103.exe PID 1736 wrote to memory of 100 1736 un217734.exe pro2103.exe PID 1736 wrote to memory of 2736 1736 un217734.exe qu2984.exe PID 1736 wrote to memory of 2736 1736 un217734.exe qu2984.exe PID 1736 wrote to memory of 2736 1736 un217734.exe qu2984.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c01916a59c797b9bef53b47be0899abdc66d361767371e8ce008038e3e3a492a.exe"C:\Users\Admin\AppData\Local\Temp\c01916a59c797b9bef53b47be0899abdc66d361767371e8ce008038e3e3a492a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un217734.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un217734.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2103.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2103.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 10844⤵
- Program crash
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2984.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2984.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2736
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 100 -ip 1001⤵PID:3596
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5320b61bea41e4a498a157f7ee3dbc857
SHA17e7cb7e92a33afedfbae406ffcfaff4b7c12f64a
SHA25692944b84e4755add34b71b0f8d4ff52436b5ce773c84c19607c2fbf0ca1b7468
SHA512f4977c7fc2e07fd9ee32a722349aed2a6e3a86f69eb605b70b6edeb4c7076330aee8e5455c7c68aaa965bba856de2ea00d1388db31756563a828c0f0c95acc11
-
Filesize
295KB
MD52a9a5ecc352611e302c2c06439f6028f
SHA11d7802cbfd715a032b8b97ab7ca3f26b40b97025
SHA2562ce332b7c64b9faf02911a864e383a5197b7ece342fe63cea03257e65842bc91
SHA51286922bb7cde8507d6fb69295c0a6bbb096541e94ab5e6832afc7014dd687603101818643ca5a2dc8e8abf14a85a400659cd968cedcb83373656b6aae78e790d8
-
Filesize
353KB
MD50cdd7e5bbf86a0596b8ac34ad7563675
SHA1921c92f58f68c91ff3d467fbbdebf93ea756407c
SHA256883f230fd8ec78ae8329adbc1034c348ab36b95c302ba40f1b514c624f20168a
SHA51205d9c33bc6a9a6aa98c9719d674771908b87b4038e5a248b1fe5b9bb6c0640da1c49e897033d4ba690e94008f2c64c4b0c62950cde3149ee8775a1c6f31b39fd