Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 08:48
Static task
static1
Behavioral task
behavioral1
Sample
b0c1a40e1c977d8bc06231ee9853469656adf8479cb68f3a4bbdc97f9fe00eb1.exe
Resource
win10v2004-20241007-en
General
-
Target
b0c1a40e1c977d8bc06231ee9853469656adf8479cb68f3a4bbdc97f9fe00eb1.exe
-
Size
659KB
-
MD5
ecfb356ea15846b423f2eaf6860251d3
-
SHA1
7c5ac759e5cb335ab2fbf4a0a62806fc4e4a7627
-
SHA256
b0c1a40e1c977d8bc06231ee9853469656adf8479cb68f3a4bbdc97f9fe00eb1
-
SHA512
5aa394897539553638da1db82537f189c675e06ffcf02e1db8246dc4c77cd51e7f69e5edaead6a8294277e239979cac3203d3dcd40992a13a6df9f51a6690649
-
SSDEEP
12288:OMrky90dQE+am44HgfemozYlomdgoXGgOYJ0FhlRp3eaOKaZw+FZQ:GyA5GINk0h/0Fj5OKaS+fQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3652-19-0x00000000025C0000-0x00000000025DA000-memory.dmp healer behavioral1/memory/3652-21-0x0000000002780000-0x0000000002798000-memory.dmp healer behavioral1/memory/3652-45-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-49-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-47-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-41-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-43-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-39-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-37-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-35-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-29-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-27-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-26-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-23-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-22-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-33-0x0000000002780000-0x0000000002792000-memory.dmp healer behavioral1/memory/3652-31-0x0000000002780000-0x0000000002792000-memory.dmp healer -
Healer family
-
Processes:
pro9186.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9186.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2484-61-0x0000000004D80000-0x0000000004DC6000-memory.dmp family_redline behavioral1/memory/2484-62-0x0000000005400000-0x0000000005444000-memory.dmp family_redline behavioral1/memory/2484-74-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-86-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-96-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-94-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-90-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-88-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-84-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-82-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-80-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-78-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-76-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-72-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-70-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-68-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-92-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-66-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-64-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/2484-63-0x0000000005400000-0x000000000543F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un677311.exepro9186.exequ0233.exepid process 4628 un677311.exe 3652 pro9186.exe 2484 qu0233.exe -
Processes:
pro9186.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9186.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b0c1a40e1c977d8bc06231ee9853469656adf8479cb68f3a4bbdc97f9fe00eb1.exeun677311.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b0c1a40e1c977d8bc06231ee9853469656adf8479cb68f3a4bbdc97f9fe00eb1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un677311.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3472 3652 WerFault.exe pro9186.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b0c1a40e1c977d8bc06231ee9853469656adf8479cb68f3a4bbdc97f9fe00eb1.exeun677311.exepro9186.exequ0233.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0c1a40e1c977d8bc06231ee9853469656adf8479cb68f3a4bbdc97f9fe00eb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un677311.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9186.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0233.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9186.exepid process 3652 pro9186.exe 3652 pro9186.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9186.exequ0233.exedescription pid process Token: SeDebugPrivilege 3652 pro9186.exe Token: SeDebugPrivilege 2484 qu0233.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b0c1a40e1c977d8bc06231ee9853469656adf8479cb68f3a4bbdc97f9fe00eb1.exeun677311.exedescription pid process target process PID 3188 wrote to memory of 4628 3188 b0c1a40e1c977d8bc06231ee9853469656adf8479cb68f3a4bbdc97f9fe00eb1.exe un677311.exe PID 3188 wrote to memory of 4628 3188 b0c1a40e1c977d8bc06231ee9853469656adf8479cb68f3a4bbdc97f9fe00eb1.exe un677311.exe PID 3188 wrote to memory of 4628 3188 b0c1a40e1c977d8bc06231ee9853469656adf8479cb68f3a4bbdc97f9fe00eb1.exe un677311.exe PID 4628 wrote to memory of 3652 4628 un677311.exe pro9186.exe PID 4628 wrote to memory of 3652 4628 un677311.exe pro9186.exe PID 4628 wrote to memory of 3652 4628 un677311.exe pro9186.exe PID 4628 wrote to memory of 2484 4628 un677311.exe qu0233.exe PID 4628 wrote to memory of 2484 4628 un677311.exe qu0233.exe PID 4628 wrote to memory of 2484 4628 un677311.exe qu0233.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0c1a40e1c977d8bc06231ee9853469656adf8479cb68f3a4bbdc97f9fe00eb1.exe"C:\Users\Admin\AppData\Local\Temp\b0c1a40e1c977d8bc06231ee9853469656adf8479cb68f3a4bbdc97f9fe00eb1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un677311.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un677311.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9186.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9186.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3652 -s 10844⤵
- Program crash
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0233.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0233.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3652 -ip 36521⤵PID:632
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD5d8d4f44d7e4e985cdd959edb6cd012c3
SHA1c28b7f646166a32809a42e1995c529994290e372
SHA256fb90080dfcb0d6ca43a18bf95ccadebf9bdeb7c1ecc06e111f8c5b660e9f5468
SHA51221bfe6150975b23b72e84fba4fc3fd981f86e8fda36a2464cbba3ca83fa57c6aaad66c786c908722660193ee3d536a922ca01ddcb3d5556a0c0f3918ff5b3de7
-
Filesize
295KB
MD55e0f1180225d94ef6bc40b5dd3ac2a0c
SHA1c0c903173c89a54efe6071d9f9cf0a5f413b6da1
SHA2568f2e40b4ba447533602d9df83f80ca69fa7a00f31aa3a0f5894b476db4955a4d
SHA512e72226e0a2b7a68e0f0fa9c038de4f3ed94d015b43555797e9978def957ae093832b354ef5f909506ccbeec52f37e42cde2a170f62d585033dad83acb09ec8ae
-
Filesize
353KB
MD5483096dcf815eeb08cc3c06894202434
SHA171fe4d43b9b632fadbb4fb31b3cb320f15d737a0
SHA256a3f5ac9d059dcff4a3f0edb537e921b7c918dfb92abdbe818dc7416e1b5266d3
SHA512bc38699eef55bfd495ba5af0fa377249dfe446d3f467d55439e4efebb8403cf1e4d524ec62f3be1f87d162d8315e818dc26e66412b890c47ad8bcc39a2cc3990