Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:14
Static task
static1
Behavioral task
behavioral1
Sample
c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae.exe
Resource
win10v2004-20241007-en
General
-
Target
c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae.exe
-
Size
671KB
-
MD5
f45b72f6ea229c63decfbfc2cd862233
-
SHA1
7ad127dd41c0bc9488da27f945c08c880eaf51cc
-
SHA256
c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae
-
SHA512
8a55381153590f26d7ee26185cae02a5e928d9f0d9c941ddba85ab39bbf16c6358d6d469f6b05232f479dec3d337d5bae1c044514ff09b93d6e7ac03be32c95f
-
SSDEEP
12288:gMr+y906lWY/Tas6ivb6DI2gviGvrIwVLLPGunbOaiyy0emzyi1os1kDlLpY/:OyDsJsLS6xrIwVv+vdyy0emzT2qk3Y
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2924-19-0x0000000002560000-0x000000000257A000-memory.dmp healer behavioral1/memory/2924-21-0x00000000025C0000-0x00000000025D8000-memory.dmp healer behavioral1/memory/2924-35-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-49-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-47-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-45-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-43-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-41-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-38-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-33-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-31-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-30-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-28-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-25-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-23-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-22-0x00000000025C0000-0x00000000025D2000-memory.dmp healer behavioral1/memory/2924-39-0x00000000025C0000-0x00000000025D2000-memory.dmp healer -
Healer family
-
Processes:
pro3515.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3515.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3515.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4852-61-0x0000000002500000-0x0000000002546000-memory.dmp family_redline behavioral1/memory/4852-62-0x0000000004AA0000-0x0000000004AE4000-memory.dmp family_redline behavioral1/memory/4852-82-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-88-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-96-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-94-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-92-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-90-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-86-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-84-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-80-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-78-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-76-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-74-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-72-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-70-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-68-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-66-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-64-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4852-63-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un526739.exepro3515.exequ5603.exepid process 3064 un526739.exe 2924 pro3515.exe 4852 qu5603.exe -
Processes:
pro3515.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3515.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae.exeun526739.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un526739.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 316 2924 WerFault.exe pro3515.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro3515.exequ5603.exec569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae.exeun526739.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3515.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un526739.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro3515.exepid process 2924 pro3515.exe 2924 pro3515.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro3515.exequ5603.exedescription pid process Token: SeDebugPrivilege 2924 pro3515.exe Token: SeDebugPrivilege 4852 qu5603.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae.exeun526739.exedescription pid process target process PID 2000 wrote to memory of 3064 2000 c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae.exe un526739.exe PID 2000 wrote to memory of 3064 2000 c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae.exe un526739.exe PID 2000 wrote to memory of 3064 2000 c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae.exe un526739.exe PID 3064 wrote to memory of 2924 3064 un526739.exe pro3515.exe PID 3064 wrote to memory of 2924 3064 un526739.exe pro3515.exe PID 3064 wrote to memory of 2924 3064 un526739.exe pro3515.exe PID 3064 wrote to memory of 4852 3064 un526739.exe qu5603.exe PID 3064 wrote to memory of 4852 3064 un526739.exe qu5603.exe PID 3064 wrote to memory of 4852 3064 un526739.exe qu5603.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae.exe"C:\Users\Admin\AppData\Local\Temp\c569018662e01ee3adf56bbbf83e0111bc6460ccc92d6a8b65da6c7fc2c88bae.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un526739.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un526739.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3515.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3515.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 10804⤵
- Program crash
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5603.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5603.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2924 -ip 29241⤵PID:2028
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
530KB
MD57c8fb80246df8f4ca245be858df945cd
SHA1a620c848653637a8b8e56e87e75aa84b92d7a58a
SHA256410e3a68edc5376fb5d9eda8d2964c7980dc8523702cac5e005e8e41a74745da
SHA5125d9198cc67225cddd444933dc66faec01c3b0c480bb93a8170197d43a11f032be666ad1ffdd033ec78f3659bdbf43d54dfb12fc248459c2d0ab9ad9823a73a01
-
Filesize
260KB
MD55a16661a257052f9aca362f689eb473f
SHA15d3d5ae45be9e8f8fa36fe008fcad1d981245eb7
SHA256db9c35366d2bab65f073d8c75ba96a3e1436119132d882f8272a5a41dc510ca1
SHA512271e0d0b947e5eb266fe7a87c81c87799efb7402c8473e78541a9051fff0d9ca9748d85396d83dff4378fdfa813efde91213ed26b3e13b266914eca5681b4a76
-
Filesize
319KB
MD5d75a010459aac97f9eddaf7ed2bca1d3
SHA17a170e18eba545837d0b81ae32713d728fc3f4c3
SHA256b56a17fc6ba3ae37c94190ad875fc87ab0ac2c1b9b89280dc75094de8a40f54a
SHA51295f0f20c55a735ecd7c9d049ed52a296c0367a8626038259ad677c3cbf39d6cd573f53ecc3afa86ebb7f865d567a35d784fb32e5921cfc1e744adc7bfdeeb570