Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 08:33
Static task
static1
Behavioral task
behavioral1
Sample
0bfcaee4415aa0b0a2bd3c1c86cc74a7aa6331c0f69583857afd3b767214b685.exe
Resource
win10v2004-20241007-en
General
-
Target
0bfcaee4415aa0b0a2bd3c1c86cc74a7aa6331c0f69583857afd3b767214b685.exe
-
Size
660KB
-
MD5
4e441133301c37537d89cfd81c222b4d
-
SHA1
74b9775e5cf6148ef5a05fd8262477210201422f
-
SHA256
0bfcaee4415aa0b0a2bd3c1c86cc74a7aa6331c0f69583857afd3b767214b685
-
SHA512
25fbec0a4ffb385cc20ced583c05c6f5c5d86d27aeae3f5e3ce1adca44008b831463fdef5e9e5cd72030cd294530910624cae710dc4816d324ec9c959315415b
-
SSDEEP
12288:AMray90JMQ7Zqmg7qjKcufeUbT3O3oHZwtf2TN2J:qyglC7Yw24+cwtf2xQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4984-19-0x00000000024E0000-0x00000000024FA000-memory.dmp healer behavioral1/memory/4984-21-0x0000000002650000-0x0000000002668000-memory.dmp healer behavioral1/memory/4984-22-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-49-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-48-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-45-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-44-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-41-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-39-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-37-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-35-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-33-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-27-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-25-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-31-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-29-0x0000000002650000-0x0000000002662000-memory.dmp healer behavioral1/memory/4984-23-0x0000000002650000-0x0000000002662000-memory.dmp healer -
Healer family
-
Processes:
pro7062.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7062.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7062.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/396-61-0x00000000024B0000-0x00000000024F6000-memory.dmp family_redline behavioral1/memory/396-62-0x0000000002560000-0x00000000025A4000-memory.dmp family_redline behavioral1/memory/396-64-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-74-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-96-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-94-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-92-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-90-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-88-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-87-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-84-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-82-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-78-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-76-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-72-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-70-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-68-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-66-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-80-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/396-63-0x0000000002560000-0x000000000259F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un494325.exepro7062.exequ3305.exepid process 2900 un494325.exe 4984 pro7062.exe 396 qu3305.exe -
Processes:
pro7062.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7062.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7062.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0bfcaee4415aa0b0a2bd3c1c86cc74a7aa6331c0f69583857afd3b767214b685.exeun494325.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0bfcaee4415aa0b0a2bd3c1c86cc74a7aa6331c0f69583857afd3b767214b685.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un494325.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2964 4984 WerFault.exe pro7062.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0bfcaee4415aa0b0a2bd3c1c86cc74a7aa6331c0f69583857afd3b767214b685.exeun494325.exepro7062.exequ3305.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0bfcaee4415aa0b0a2bd3c1c86cc74a7aa6331c0f69583857afd3b767214b685.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un494325.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3305.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7062.exepid process 4984 pro7062.exe 4984 pro7062.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7062.exequ3305.exedescription pid process Token: SeDebugPrivilege 4984 pro7062.exe Token: SeDebugPrivilege 396 qu3305.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
0bfcaee4415aa0b0a2bd3c1c86cc74a7aa6331c0f69583857afd3b767214b685.exeun494325.exedescription pid process target process PID 2672 wrote to memory of 2900 2672 0bfcaee4415aa0b0a2bd3c1c86cc74a7aa6331c0f69583857afd3b767214b685.exe un494325.exe PID 2672 wrote to memory of 2900 2672 0bfcaee4415aa0b0a2bd3c1c86cc74a7aa6331c0f69583857afd3b767214b685.exe un494325.exe PID 2672 wrote to memory of 2900 2672 0bfcaee4415aa0b0a2bd3c1c86cc74a7aa6331c0f69583857afd3b767214b685.exe un494325.exe PID 2900 wrote to memory of 4984 2900 un494325.exe pro7062.exe PID 2900 wrote to memory of 4984 2900 un494325.exe pro7062.exe PID 2900 wrote to memory of 4984 2900 un494325.exe pro7062.exe PID 2900 wrote to memory of 396 2900 un494325.exe qu3305.exe PID 2900 wrote to memory of 396 2900 un494325.exe qu3305.exe PID 2900 wrote to memory of 396 2900 un494325.exe qu3305.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bfcaee4415aa0b0a2bd3c1c86cc74a7aa6331c0f69583857afd3b767214b685.exe"C:\Users\Admin\AppData\Local\Temp\0bfcaee4415aa0b0a2bd3c1c86cc74a7aa6331c0f69583857afd3b767214b685.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un494325.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un494325.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7062.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7062.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 10964⤵
- Program crash
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3305.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3305.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4984 -ip 49841⤵PID:1616
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD58293ab124750f9bd28cab69664a313db
SHA19df57335c3fea414ef6556f94c36cbd2e7598bc9
SHA256817685aa75729b1b245b1e67e4295631df613f06687838756b18ed77280e7b53
SHA512f6b48e47bc64f02e26381531beb8c1aca17a646691b92fa98f0353ae55ea45d9ecaee1ff98762883b75b4c545e074b0229107e4d920c921962ef997724b7f090
-
Filesize
237KB
MD50646de0f53b0702dc2fd16e85ca730a3
SHA1132a2aee4c61a3392e6e676bd509019c04c942b0
SHA2567780ca690a6dff0fe408513d20ccabff301371b5514f32f214a8324b7595cf8b
SHA512a68536adb0266f334a392dd685ab687b8f4d820a1e7f1a3ec9229c47d9eb21511dfa34608ac404e228e1581d8acec92c1c018c850624205c6fc0984d896b8c27
-
Filesize
295KB
MD5216d6cdcbd319a7241b36eb3e134637c
SHA12d16d1cf5c3cca02fd98763e415201a7a0f80383
SHA25646af30a941f082cbb483e0a9121b2909f8e47b4a18d2d03d55aea329bfb79037
SHA5127795e64fd48cce74b75d66a15698a994d569aa27ceb2c507e227d7994e4b9b9c523dd66d8cfb681bdce464b3d05ddd20c7048861656a7b5d235b75dd46b61908