Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02.exe
Resource
win10v2004-20241007-en
General
-
Target
dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02.exe
-
Size
662KB
-
MD5
d4fff079c53894f98aff34cc28e8d77d
-
SHA1
a63b87f88d0dfdfc48ec80119c00df38f226afe7
-
SHA256
dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02
-
SHA512
50ed616d5f567d210ec9482cd3fc97cd14765bc79a0fbe5a39d59205e3b822c8d335d9451997d1dd6751e50cfc6af0e500d20524bf21ccf0b774471918003c98
-
SSDEEP
12288:ZMrQy9029p8FoiXje9S5cmkR1imM2l83BzV7A2qc4qgFryCYU:pyV9mFMten2lIV7A2qc4JrwU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4984-19-0x0000000002360000-0x000000000237A000-memory.dmp healer behavioral1/memory/4984-21-0x0000000002480000-0x0000000002498000-memory.dmp healer behavioral1/memory/4984-43-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-49-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-47-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-45-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-41-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-39-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-37-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-35-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-33-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-31-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-29-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-27-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-25-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-23-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4984-22-0x0000000002480000-0x0000000002492000-memory.dmp healer -
Healer family
-
Processes:
pro8738.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8738.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8738.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2192-61-0x00000000049F0000-0x0000000004A36000-memory.dmp family_redline behavioral1/memory/2192-62-0x0000000005040000-0x0000000005084000-memory.dmp family_redline behavioral1/memory/2192-72-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-80-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-96-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-94-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-92-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-90-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-88-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-84-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-83-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-78-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-76-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-74-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-70-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-66-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-64-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-86-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-68-0x0000000005040000-0x000000000507F000-memory.dmp family_redline behavioral1/memory/2192-63-0x0000000005040000-0x000000000507F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un135104.exepro8738.exequ0279.exepid process 2344 un135104.exe 4984 pro8738.exe 2192 qu0279.exe -
Processes:
pro8738.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8738.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8738.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un135104.exedcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un135104.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro8738.exequ0279.exedcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02.exeun135104.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8738.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0279.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un135104.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8738.exepid process 4984 pro8738.exe 4984 pro8738.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8738.exequ0279.exedescription pid process Token: SeDebugPrivilege 4984 pro8738.exe Token: SeDebugPrivilege 2192 qu0279.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02.exeun135104.exedescription pid process target process PID 2204 wrote to memory of 2344 2204 dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02.exe un135104.exe PID 2204 wrote to memory of 2344 2204 dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02.exe un135104.exe PID 2204 wrote to memory of 2344 2204 dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02.exe un135104.exe PID 2344 wrote to memory of 4984 2344 un135104.exe pro8738.exe PID 2344 wrote to memory of 4984 2344 un135104.exe pro8738.exe PID 2344 wrote to memory of 4984 2344 un135104.exe pro8738.exe PID 2344 wrote to memory of 2192 2344 un135104.exe qu0279.exe PID 2344 wrote to memory of 2192 2344 un135104.exe qu0279.exe PID 2344 wrote to memory of 2192 2344 un135104.exe qu0279.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02.exe"C:\Users\Admin\AppData\Local\Temp\dcd1d60488703e676c1434930e375dfddf7a81585e8618ef14d611f1a2597b02.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un135104.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un135104.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8738.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8738.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0279.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0279.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2192
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD54ccbd43f08617659b18a36e98cac836a
SHA1f4628b12b44751be0b9f57a72d4369959270afb6
SHA256b33f6dd5ec3739a3b8a70108cd0416642e5f2308d86feb539b1de9e63a03fe52
SHA5120c99b602fc32effa5e77b3f8ede02e52cd6a504ed1bd409bf8d96f5583de4120acac970452eee206fc1946108aa8d5238d2e1f127842106884b3f412ca4a3170
-
Filesize
236KB
MD55ce3bb46b61c475593f7bf1509cbd8cf
SHA1a6b8ee04cd8b2aae55587f2fe0cc8c378274d86a
SHA2562b7cdff46350d1f3d62190f3b049ee4dcd3993792e0ca1123bba3d0479122469
SHA51288f11c07ea1c4f17dbe38ba857952295672f637e2bd084c8e73fc6be12658a9631c66b97aff843ebfca08955ee8ff1f05e163f19dae69e7ca45ac1bc9a17e4b6
-
Filesize
295KB
MD5e8757aa2fde63b884f200575fa5b8f1e
SHA1f18b48889f6a0e5bcbd8a78aa666ddfa80d74d57
SHA2568fe69652f04fa40b1764e688fd11888096f98c8f239a4187d539a91bbaa4ee39
SHA512735b198ef2fae13b06d9622550d312060dca03813545915a605e2b12435d665543cc34fbfe22dd581a9a99494afba71a909082be3cc583adb6da0d50c31d1a55