Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe
Resource
win10v2004-20241007-en
General
-
Target
72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe
-
Size
700KB
-
MD5
5323916590f6d2996a5aa2eca8d4ffab
-
SHA1
b3be78789c18dc0ac41b39474b5756818c26281a
-
SHA256
72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969
-
SHA512
40351b2aaa72e65bec1e5325ef4715cad61b8598cc788c434b957df9fa36bdaa3101ea966d707eaf0482659cb8612226db24b9359816ff8d10e6dabaf7eb67aa
-
SSDEEP
12288:6Mruy90xoMzlpW2k8WR5ujJxuQbDXanC3F81ei2EZNwPghLA3M7Y9IFqNk8:Uywzl8/5ulUQbDKnC2xBZNAgxcM7Y9Gk
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4180-19-0x0000000000960000-0x000000000097A000-memory.dmp healer behavioral1/memory/4180-21-0x0000000002750000-0x0000000002768000-memory.dmp healer behavioral1/memory/4180-43-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-49-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-47-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-45-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-41-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-39-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-37-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-35-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-33-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-31-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-29-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-27-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-25-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-23-0x0000000002750000-0x0000000002762000-memory.dmp healer behavioral1/memory/4180-22-0x0000000002750000-0x0000000002762000-memory.dmp healer -
Healer family
-
Processes:
pro6055.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6055.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/5012-61-0x0000000002600000-0x0000000002646000-memory.dmp family_redline behavioral1/memory/5012-62-0x00000000052B0000-0x00000000052F4000-memory.dmp family_redline behavioral1/memory/5012-72-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-76-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-96-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-92-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-90-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-88-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-86-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-84-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-82-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-80-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-78-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-74-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-70-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-68-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-94-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-66-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-64-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline behavioral1/memory/5012-63-0x00000000052B0000-0x00000000052EF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un591297.exepro6055.exequ5700.exepid process 1008 un591297.exe 4180 pro6055.exe 5012 qu5700.exe -
Processes:
pro6055.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6055.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6055.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exeun591297.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un591297.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1684 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2336 4180 WerFault.exe pro6055.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exeun591297.exepro6055.exequ5700.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un591297.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6055.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5700.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6055.exepid process 4180 pro6055.exe 4180 pro6055.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6055.exequ5700.exedescription pid process Token: SeDebugPrivilege 4180 pro6055.exe Token: SeDebugPrivilege 5012 qu5700.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exeun591297.exedescription pid process target process PID 4912 wrote to memory of 1008 4912 72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe un591297.exe PID 4912 wrote to memory of 1008 4912 72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe un591297.exe PID 4912 wrote to memory of 1008 4912 72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe un591297.exe PID 1008 wrote to memory of 4180 1008 un591297.exe pro6055.exe PID 1008 wrote to memory of 4180 1008 un591297.exe pro6055.exe PID 1008 wrote to memory of 4180 1008 un591297.exe pro6055.exe PID 1008 wrote to memory of 5012 1008 un591297.exe qu5700.exe PID 1008 wrote to memory of 5012 1008 un591297.exe qu5700.exe PID 1008 wrote to memory of 5012 1008 un591297.exe qu5700.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe"C:\Users\Admin\AppData\Local\Temp\72736c6fde8d6ec3ff75cbc12671db1694ef9b77aa58ad7d9c9c744154eca969.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un591297.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un591297.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6055.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6055.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 10204⤵
- Program crash
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5700.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5700.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4180 -ip 41801⤵PID:740
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5a4ff460c93ef82b563eaedd34fda4e3a
SHA1654ae9f11fca4ab08c365e32bad250bc4ccae85f
SHA256e8d9284fd6e9e87213b54ae02453f388cc6d6fda19a86772986ca030f4a0670a
SHA5127d97f1ed6f4eb73ff65f6326475b22d5b17bd15b5838a20cb0f82e94661896dde4e05aaf2961aa21cb695f65e22e1b83e36bc5eb9d72c9aa104f19868772f89b
-
Filesize
307KB
MD5877ff81b5e2eb817c8a60af3c5bf5d1a
SHA1220aea98931da761cd8c0e753dae26ab12c93875
SHA256b0bc365068984301b5fc4c720af07615801eff13dbce9f3b8c0a97811c04ca39
SHA512cdbe788854397550b580cd313a6c3fe7332f98c497205006e041717ea46a31f88280dcf06213715bf8cd25f1959c119b90de74610871a8c578b108330fbb76d2
-
Filesize
366KB
MD525526b7310af385e9af6021721941205
SHA10261c40d0429580c3bd5b1de3f53643bfa672ee2
SHA256b02a42b95bb5ff08d1657072b37e2302433754e0cd4cc773b1c4dbb7d6c2fddd
SHA512e9897b785c86c96bed6078ade61cfd26541ce562efe9425b32ebf5e1292bcbed408d512a8b0eee29d4e70b0aa1567254b65a2e9b595d174cf9660ddc6102f51c