Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:33
Static task
static1
Behavioral task
behavioral1
Sample
1d283cc040c678119d64518ff3d494b4498cb7191f777cd05c221440a7bb10b8.exe
Resource
win10v2004-20241007-en
General
-
Target
1d283cc040c678119d64518ff3d494b4498cb7191f777cd05c221440a7bb10b8.exe
-
Size
658KB
-
MD5
991abcb1778173580425643d08b21266
-
SHA1
e088315dd5dc813e1399b5026387e9f162281fc8
-
SHA256
1d283cc040c678119d64518ff3d494b4498cb7191f777cd05c221440a7bb10b8
-
SHA512
250ec70994cf6a38329fbb924c3c38db80d4c0d71d8b9098b312302785e4782389b07bee9a8ada8069470165967a0cb1b96b2f7cde6b5366b83541affb84cb43
-
SSDEEP
12288:/Mryy902gYt2ZWon8hBts9FQnqk/0VMTWUIf44CzWK4Q8v98Ec0T:FyOkooBtC2b9IA47Kk8EcC
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3868-19-0x00000000023B0000-0x00000000023CA000-memory.dmp healer behavioral1/memory/3868-21-0x0000000004A50000-0x0000000004A68000-memory.dmp healer behavioral1/memory/3868-43-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-22-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-49-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-47-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-45-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-41-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-40-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-37-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-36-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-33-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-31-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-29-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-27-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-25-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3868-23-0x0000000004A50000-0x0000000004A62000-memory.dmp healer -
Healer family
-
Processes:
pro4016.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4016.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4016.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4016.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4016.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4016.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4016.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4308-61-0x00000000025D0000-0x0000000002616000-memory.dmp family_redline behavioral1/memory/4308-62-0x0000000004AA0000-0x0000000004AE4000-memory.dmp family_redline behavioral1/memory/4308-90-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-92-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-96-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-94-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-88-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-86-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-84-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-82-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-80-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-78-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-76-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-74-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-72-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-70-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-68-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-66-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-64-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4308-63-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un355974.exepro4016.exequ5406.exepid process 2736 un355974.exe 3868 pro4016.exe 4308 qu5406.exe -
Processes:
pro4016.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4016.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4016.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1d283cc040c678119d64518ff3d494b4498cb7191f777cd05c221440a7bb10b8.exeun355974.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1d283cc040c678119d64518ff3d494b4498cb7191f777cd05c221440a7bb10b8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un355974.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4024 3868 WerFault.exe pro4016.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1d283cc040c678119d64518ff3d494b4498cb7191f777cd05c221440a7bb10b8.exeun355974.exepro4016.exequ5406.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d283cc040c678119d64518ff3d494b4498cb7191f777cd05c221440a7bb10b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un355974.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4016.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5406.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4016.exepid process 3868 pro4016.exe 3868 pro4016.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4016.exequ5406.exedescription pid process Token: SeDebugPrivilege 3868 pro4016.exe Token: SeDebugPrivilege 4308 qu5406.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1d283cc040c678119d64518ff3d494b4498cb7191f777cd05c221440a7bb10b8.exeun355974.exedescription pid process target process PID 644 wrote to memory of 2736 644 1d283cc040c678119d64518ff3d494b4498cb7191f777cd05c221440a7bb10b8.exe un355974.exe PID 644 wrote to memory of 2736 644 1d283cc040c678119d64518ff3d494b4498cb7191f777cd05c221440a7bb10b8.exe un355974.exe PID 644 wrote to memory of 2736 644 1d283cc040c678119d64518ff3d494b4498cb7191f777cd05c221440a7bb10b8.exe un355974.exe PID 2736 wrote to memory of 3868 2736 un355974.exe pro4016.exe PID 2736 wrote to memory of 3868 2736 un355974.exe pro4016.exe PID 2736 wrote to memory of 3868 2736 un355974.exe pro4016.exe PID 2736 wrote to memory of 4308 2736 un355974.exe qu5406.exe PID 2736 wrote to memory of 4308 2736 un355974.exe qu5406.exe PID 2736 wrote to memory of 4308 2736 un355974.exe qu5406.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d283cc040c678119d64518ff3d494b4498cb7191f777cd05c221440a7bb10b8.exe"C:\Users\Admin\AppData\Local\Temp\1d283cc040c678119d64518ff3d494b4498cb7191f777cd05c221440a7bb10b8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355974.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4016.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4016.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3868 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 10844⤵
- Program crash
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5406.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5406.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3868 -ip 38681⤵PID:1864
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD50b05c0e64e885247555e008bf3bca287
SHA18b5f66110c66d46a053065aade08e3f43cf0ec92
SHA256897a7e46fc70e3a28ea08648772ed283efc7e328435e65afb1f224e0d44acf4f
SHA5125234a9aae1c77aea7e9041f012b0985e66b6abaa06c1247c618dcf4233b6616666689fb90682bb2d780ea033856c20d9ab87b7649a9936db17c24884455147bc
-
Filesize
235KB
MD533756fae58f59e58f6d500d9a56a8a03
SHA1bec161347442b8b89638368b0b4f7de7da73ee7e
SHA2566fb68ec52b7e1a44e5e4f3aa346d7838f89f415cf7dad381e0d2d44b5d448dd6
SHA51235f0172d8ec196f1142d0d0d51b6935f724ad8424aa58713c3ce66c2a7e089c06a8746f792e778059b5e57b12df44e69671962e1909acdf9be91b9336458c9db
-
Filesize
294KB
MD5b56bed95e3baf18a2007f17915f00355
SHA19458437f65a00dc86cbaa0bbe1159ce1a8e0e1eb
SHA25661c4d3bf85d5f91b1a293af625aca5a1033917b2493522b699e43252b5533da8
SHA51277b52e92c5483c90eff8bffb0c534a12c373ba5de48558eebe5c140cb1180fefd20536aacabdacae25f90f6ac5333101ac2d7d7df6841508013d7160797ef686