Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 11:33
Static task
static1
Behavioral task
behavioral1
Sample
c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exe
Resource
win10v2004-20241007-en
General
-
Target
c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exe
-
Size
660KB
-
MD5
fa0b27c89e82d2252bdb78ca09ec6528
-
SHA1
2dd932bb822e49759d91f0348701e0e48f36b0e1
-
SHA256
c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb
-
SHA512
d6be8bd9a770272402c114f9221811ac8c82b8f024199e19b7af421ae794b9199421b5ca654b5fb05c0124a2d3b0b68152c714e8d8822f768fe5a07f7b287aa8
-
SSDEEP
12288:GMriy90dltTfl5ESzstivbRyL3PAWQ5JCX5JnD63K90fs3rLiiiraWPWBYNSE8Cr:wy4/ESOgyL3pQ5IVD669Gs36iir5vNT9
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4952-19-0x0000000004B10000-0x0000000004B2A000-memory.dmp healer behavioral1/memory/4952-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/4952-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4952-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro0905.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0905.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0905.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0905.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0905.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0905.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0905.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2328-61-0x00000000026D0000-0x0000000002716000-memory.dmp family_redline behavioral1/memory/2328-62-0x0000000002750000-0x0000000002794000-memory.dmp family_redline behavioral1/memory/2328-78-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-86-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-96-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-94-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-92-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-90-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-84-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-82-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-80-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-76-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-74-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-72-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-70-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-88-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-68-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-66-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-64-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/2328-63-0x0000000002750000-0x000000000278F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un204051.exepro0905.exequ8921.exepid process 3124 un204051.exe 4952 pro0905.exe 2328 qu8921.exe -
Processes:
pro0905.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0905.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0905.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un204051.exec1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un204051.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 664 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1468 4952 WerFault.exe pro0905.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exeun204051.exepro0905.exequ8921.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un204051.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0905.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8921.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0905.exepid process 4952 pro0905.exe 4952 pro0905.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0905.exequ8921.exedescription pid process Token: SeDebugPrivilege 4952 pro0905.exe Token: SeDebugPrivilege 2328 qu8921.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exeun204051.exedescription pid process target process PID 2552 wrote to memory of 3124 2552 c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exe un204051.exe PID 2552 wrote to memory of 3124 2552 c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exe un204051.exe PID 2552 wrote to memory of 3124 2552 c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exe un204051.exe PID 3124 wrote to memory of 4952 3124 un204051.exe pro0905.exe PID 3124 wrote to memory of 4952 3124 un204051.exe pro0905.exe PID 3124 wrote to memory of 4952 3124 un204051.exe pro0905.exe PID 3124 wrote to memory of 2328 3124 un204051.exe qu8921.exe PID 3124 wrote to memory of 2328 3124 un204051.exe qu8921.exe PID 3124 wrote to memory of 2328 3124 un204051.exe qu8921.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exe"C:\Users\Admin\AppData\Local\Temp\c1cec3840500d60d554eb7ca045c79321c47ba47e4109d49a8215116c39e07fb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un204051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un204051.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0905.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0905.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 10844⤵
- Program crash
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8921.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8921.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4952 -ip 49521⤵PID:1712
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:664
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD5e8ad577690873209550adfc4f7fbb08b
SHA158babf20b357d251adb1ed8179ba18fb5b7ff5e5
SHA2562133803361cdc785e77eb12a86a5816483f80585eada07f785cedf751676a9da
SHA512758cb11ecc49d41298a215c1c42e01759f56fd196d5175d77db16fd75026fd6261f9c3ffe380dc62d3511c2d6d0f22ec69c6531bd3308aa87f08ae8687036adf
-
Filesize
236KB
MD5c6e2dfd13feea5544582422b27f4dc60
SHA1e6452f9f426c76b36ef11b34d6629b1edc34d58e
SHA256a02d760962fa62b2131c40e194cb237f3289855c5bb17d6f0c8a8aaacadc0678
SHA512761cd98a02f5118d81c68a928775be652176bb2ea3a48d71c52ffb08018135a1dcbdeb22d79f89d2f32fcb2fe32128b61433dd43c1ed274379ccab7b36f652f9
-
Filesize
295KB
MD5b567c3e1332e8954f9df8fdad31d8434
SHA180f6afb0f61802d2df2273e19e8fd50b5bbf042f
SHA256a56eeb8a0d783045350a6f3551c532dbd1226f2a2016ff094b5e7167ac75d33c
SHA5124695b582a947f3f2aeb554e2895dbb5e8c6fec7224850b0f4f21d6f8dd52437adf8123fe05d84c6dadba850a3b69bdfc1a14631b32490111be7e8e523e8c963c