Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:34
Static task
static1
Behavioral task
behavioral1
Sample
7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea.exe
Resource
win10v2004-20241007-en
General
-
Target
7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea.exe
-
Size
673KB
-
MD5
16cbc1c59c400eeb3c36adc7adaf1cc1
-
SHA1
c0f71e175b5af47aed28e274b8b1f856ff05a328
-
SHA256
7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea
-
SHA512
e2f661f48f0336cfbb4d40e5a186d26bf12d8c8fccafd528f11355b51885259d37bbc3ff82b62481ad12dabee8534442046608998623a3d924a8ed0849a026c0
-
SSDEEP
12288:gMrGy90JSfXA8tIXVuu52MeFWIa+UdirxuWphuPzbrh:2yuUQ8oua2ra1KuSCB
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4820-19-0x0000000002280000-0x000000000229A000-memory.dmp healer behavioral1/memory/4820-21-0x0000000002660000-0x0000000002678000-memory.dmp healer behavioral1/memory/4820-47-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-49-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-45-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-43-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-41-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-39-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-37-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-35-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-33-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-31-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-29-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-27-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-25-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-23-0x0000000002660000-0x0000000002672000-memory.dmp healer behavioral1/memory/4820-22-0x0000000002660000-0x0000000002672000-memory.dmp healer -
Healer family
-
Processes:
pro9616.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9616.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9616.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2804-61-0x00000000023F0000-0x0000000002436000-memory.dmp family_redline behavioral1/memory/2804-62-0x00000000025B0000-0x00000000025F4000-memory.dmp family_redline behavioral1/memory/2804-68-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-78-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-96-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-92-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-90-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-88-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-86-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-84-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-82-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-80-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-76-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-74-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-72-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-70-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-66-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-94-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-64-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline behavioral1/memory/2804-63-0x00000000025B0000-0x00000000025EF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un792288.exepro9616.exequ0170.exepid process 3180 un792288.exe 4820 pro9616.exe 2804 qu0170.exe -
Processes:
pro9616.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9616.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea.exeun792288.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un792288.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1756 4820 WerFault.exe pro9616.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea.exeun792288.exepro9616.exequ0170.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un792288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9616.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0170.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9616.exepid process 4820 pro9616.exe 4820 pro9616.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9616.exequ0170.exedescription pid process Token: SeDebugPrivilege 4820 pro9616.exe Token: SeDebugPrivilege 2804 qu0170.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea.exeun792288.exedescription pid process target process PID 2224 wrote to memory of 3180 2224 7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea.exe un792288.exe PID 2224 wrote to memory of 3180 2224 7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea.exe un792288.exe PID 2224 wrote to memory of 3180 2224 7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea.exe un792288.exe PID 3180 wrote to memory of 4820 3180 un792288.exe pro9616.exe PID 3180 wrote to memory of 4820 3180 un792288.exe pro9616.exe PID 3180 wrote to memory of 4820 3180 un792288.exe pro9616.exe PID 3180 wrote to memory of 2804 3180 un792288.exe qu0170.exe PID 3180 wrote to memory of 2804 3180 un792288.exe qu0170.exe PID 3180 wrote to memory of 2804 3180 un792288.exe qu0170.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea.exe"C:\Users\Admin\AppData\Local\Temp\7603fca97eded6adbb1cd1341e20ca993f3bec42689882c856cfe5e2415f71ea.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un792288.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un792288.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9616.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9616.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 10044⤵
- Program crash
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0170.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0170.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4820 -ip 48201⤵PID:1524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD56b8e8dc4df4ec86d075b26c25bd50833
SHA111bf26e72b40a8b94510deb464a232e4aa277cf6
SHA256a52a3cf5e3c2d456e971c685dfe5c3d66f49dad21ed53776218bb087dffcc5fd
SHA5129cdd5fb3f76e61d74780dfe42e28919caa2f41ec46bb29d7c3541910b231846c7c301cc0e48d2a222dcef77b1434358e5d34584cbd796abf8e513706d316e0c8
-
Filesize
260KB
MD5a0a19b1ea30a1381e2ebc9bc595cdd6b
SHA199df4743ea6dcca7d2ec612d5801417095eb2518
SHA256cac9e66d2e2e8669e1b1397c5c21787b777da45dd8d1dc74fc445549f086dab4
SHA512edda57c84005c38672655bdb4d970fed75d3d1ad52e9a66ae370827864110a53c91e7e31cd576ac48e2c7cc3380640a0056bef29107edcbea13065790f03e06f
-
Filesize
319KB
MD5bf951c6978de1370c7196fa886d02167
SHA13d8ef4542f82212d56071d0f4f24e05ea154349d
SHA2567c914a5bf4525dea89f3eac2360d2f3c9a0643a10358f4ea05319964c8b717b8
SHA512790ddc002e7719aad68d3ea3324b8b7ba4ba25ba56e22fc14259598e63b4234a939ab108f7410bdb17483e98dd0752af80324505287b67eb871e4a967560323d