Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 14:27
Static task
static1
Behavioral task
behavioral1
Sample
1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764.exe
Resource
win10v2004-20241007-en
General
-
Target
1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764.exe
-
Size
677KB
-
MD5
9ac75fc25de237d143f7c9fc4f1a0851
-
SHA1
f8e30586455def71072c63a163a76c369b3b5ffa
-
SHA256
1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764
-
SHA512
c41ee972a31f85a9b929a1ed79c0dff196a631f4424455f58c6ed4338c596eb8c81552177296507fb18cff413fa252aa7c011d4d0f6bb98120a3c8644723e086
-
SSDEEP
12288:MMr4y908iIennFwUh++up0WV+rU6eCTxtUkyy0y5Kxep7upUuK8FIh0Ypit:EyziNFww+RiWIrUMTxW0Exep/uGpit
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2984-19-0x0000000002440000-0x000000000245A000-memory.dmp healer behavioral1/memory/2984-21-0x00000000029D0000-0x00000000029E8000-memory.dmp healer behavioral1/memory/2984-49-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-47-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-45-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-43-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-41-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-39-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-37-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-35-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-33-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-31-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-29-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-27-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-25-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-23-0x00000000029D0000-0x00000000029E2000-memory.dmp healer behavioral1/memory/2984-22-0x00000000029D0000-0x00000000029E2000-memory.dmp healer -
Healer family
-
Processes:
pro8787.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8787.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8787.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8787.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8787.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8787.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8787.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2344-61-0x00000000026E0000-0x0000000002726000-memory.dmp family_redline behavioral1/memory/2344-62-0x0000000005390000-0x00000000053D4000-memory.dmp family_redline behavioral1/memory/2344-70-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-78-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-96-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-94-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-92-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-90-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-86-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-84-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-82-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-80-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-76-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-74-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-72-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-88-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-68-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-66-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-64-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline behavioral1/memory/2344-63-0x0000000005390000-0x00000000053CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un901992.exepro8787.exequ2134.exepid process 1324 un901992.exe 2984 pro8787.exe 2344 qu2134.exe -
Processes:
pro8787.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8787.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8787.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764.exeun901992.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un901992.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3924 2984 WerFault.exe pro8787.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu2134.exe1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764.exeun901992.exepro8787.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un901992.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8787.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8787.exepid process 2984 pro8787.exe 2984 pro8787.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8787.exequ2134.exedescription pid process Token: SeDebugPrivilege 2984 pro8787.exe Token: SeDebugPrivilege 2344 qu2134.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764.exeun901992.exedescription pid process target process PID 3152 wrote to memory of 1324 3152 1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764.exe un901992.exe PID 3152 wrote to memory of 1324 3152 1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764.exe un901992.exe PID 3152 wrote to memory of 1324 3152 1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764.exe un901992.exe PID 1324 wrote to memory of 2984 1324 un901992.exe pro8787.exe PID 1324 wrote to memory of 2984 1324 un901992.exe pro8787.exe PID 1324 wrote to memory of 2984 1324 un901992.exe pro8787.exe PID 1324 wrote to memory of 2344 1324 un901992.exe qu2134.exe PID 1324 wrote to memory of 2344 1324 un901992.exe qu2134.exe PID 1324 wrote to memory of 2344 1324 un901992.exe qu2134.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764.exe"C:\Users\Admin\AppData\Local\Temp\1cc6c6a8d406d9db4d70737d9900ef72246ef34d0fe0fd7f537255f93b545764.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901992.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901992.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8787.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8787.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2984 -s 10964⤵
- Program crash
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2134.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2134.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2984 -ip 29841⤵PID:4436
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
523KB
MD5c4672c3e304b01bd9cd41cbcfdd3f8be
SHA13d6683359ccae948824ce9d269db7d81815e3898
SHA2567c3172bca2a0f9d6391e542509c5122a9f4976c6bd7b4fcacca23c8b04362192
SHA51205c6eac7a158429faaa89d7aaed17557a601de82279641a97a7472242555fd53ca6543f9a5f5d373e67efdc4cf9e9e5d38c6eb3284de7015af8c5833d276ee5a
-
Filesize
290KB
MD5631440ec15903366baff934b44e520d5
SHA1a5c3de630011c9c74317700f10ae6753ebb70a44
SHA2568becb85ae9615d9725e425962597d14a31f8f665acf69413181c746d24c1f5d6
SHA51257fb30af1028ac177050de1a424fa7c04c12ca0bd4f4957340ddd0768482559242f014a8a7a80fd322a795301af07c7dcc31786af3bcf87ae82aa9d644a7b4c1
-
Filesize
348KB
MD50e85583ce72d8fd3cc4027a5930edcd2
SHA1de10fd6dacab6e3bcd0672c542512debf51dcb4f
SHA256d871f925fcf9b3344dca89422330a36cb9b7cf91268213b62e9b29e238d816c7
SHA5129443b416606ec8bed1b87fcb6f2a9a4e5d6c478641951f4f25281b336cbb592ea30adc9359f222b4c7b238907bde3089dac6e2fd2de5b6c54c7f1fa0e6c48cd3