Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:41
Static task
static1
Behavioral task
behavioral1
Sample
ec4b430f1890cc2ebc086659ac4214cb07d6bb7f33b265df10093f4cdb5ac647.exe
Resource
win10v2004-20241007-en
General
-
Target
ec4b430f1890cc2ebc086659ac4214cb07d6bb7f33b265df10093f4cdb5ac647.exe
-
Size
658KB
-
MD5
8da156d8e88f342649107125edab00b3
-
SHA1
06946abe6dc1d08574b11ff067ad30742cadbeda
-
SHA256
ec4b430f1890cc2ebc086659ac4214cb07d6bb7f33b265df10093f4cdb5ac647
-
SHA512
1a3f4c3bc1a4673343093ecf9624bbe5d6072699bf927332dd56ef75c3ab5ec9a7561d74636635eb4fb4c11c87a47130026993e325442800e882120b57a3d1df
-
SSDEEP
12288:hMrsy90/WUKAN1RiikMkrXezjf9ohUqhGcYxSgoWu8WRqg6xAtY:NyoWUKAN1RiHdTezknfYsWrQqdxA2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1920-19-0x00000000023B0000-0x00000000023CA000-memory.dmp healer behavioral1/memory/1920-21-0x0000000002600000-0x0000000002618000-memory.dmp healer behavioral1/memory/1920-49-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-47-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-45-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-43-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-41-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-39-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-37-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-35-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-33-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-31-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-29-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-27-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-25-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-23-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1920-22-0x0000000002600000-0x0000000002612000-memory.dmp healer -
Healer family
-
Processes:
pro9098.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9098.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9098.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9098.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9098.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9098.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9098.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/828-61-0x0000000002450000-0x0000000002496000-memory.dmp family_redline behavioral1/memory/828-62-0x0000000004AF0000-0x0000000004B34000-memory.dmp family_redline behavioral1/memory/828-66-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-77-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-94-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-92-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-90-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-88-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-86-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-84-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-82-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-78-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-74-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-72-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-70-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-68-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-96-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-80-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-64-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/828-63-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un221410.exepro9098.exequ6829.exepid process 4876 un221410.exe 1920 pro9098.exe 828 qu6829.exe -
Processes:
pro9098.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9098.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9098.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ec4b430f1890cc2ebc086659ac4214cb07d6bb7f33b265df10093f4cdb5ac647.exeun221410.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ec4b430f1890cc2ebc086659ac4214cb07d6bb7f33b265df10093f4cdb5ac647.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un221410.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 540 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3440 1920 WerFault.exe pro9098.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro9098.exequ6829.exeec4b430f1890cc2ebc086659ac4214cb07d6bb7f33b265df10093f4cdb5ac647.exeun221410.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9098.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6829.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec4b430f1890cc2ebc086659ac4214cb07d6bb7f33b265df10093f4cdb5ac647.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un221410.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9098.exepid process 1920 pro9098.exe 1920 pro9098.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9098.exequ6829.exedescription pid process Token: SeDebugPrivilege 1920 pro9098.exe Token: SeDebugPrivilege 828 qu6829.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ec4b430f1890cc2ebc086659ac4214cb07d6bb7f33b265df10093f4cdb5ac647.exeun221410.exedescription pid process target process PID 2028 wrote to memory of 4876 2028 ec4b430f1890cc2ebc086659ac4214cb07d6bb7f33b265df10093f4cdb5ac647.exe un221410.exe PID 2028 wrote to memory of 4876 2028 ec4b430f1890cc2ebc086659ac4214cb07d6bb7f33b265df10093f4cdb5ac647.exe un221410.exe PID 2028 wrote to memory of 4876 2028 ec4b430f1890cc2ebc086659ac4214cb07d6bb7f33b265df10093f4cdb5ac647.exe un221410.exe PID 4876 wrote to memory of 1920 4876 un221410.exe pro9098.exe PID 4876 wrote to memory of 1920 4876 un221410.exe pro9098.exe PID 4876 wrote to memory of 1920 4876 un221410.exe pro9098.exe PID 4876 wrote to memory of 828 4876 un221410.exe qu6829.exe PID 4876 wrote to memory of 828 4876 un221410.exe qu6829.exe PID 4876 wrote to memory of 828 4876 un221410.exe qu6829.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec4b430f1890cc2ebc086659ac4214cb07d6bb7f33b265df10093f4cdb5ac647.exe"C:\Users\Admin\AppData\Local\Temp\ec4b430f1890cc2ebc086659ac4214cb07d6bb7f33b265df10093f4cdb5ac647.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un221410.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un221410.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9098.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9098.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 11004⤵
- Program crash
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6829.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6829.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1920 -ip 19201⤵PID:3916
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:540
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD51e73af0e36fbc464e8244b6b65534067
SHA1574b989315b6073109be40adbd469f93c3f3e898
SHA25631db87f0178bf39fccec9014630e99b36751425c0480efe6c171fb4ec517c219
SHA512a3f23167467bb84c6f31fde04a6dfdc7a2d2e3db069dcdccbf9b31a0141b1f5c7d919e86bb2e3a69443329c4efeffd7099b6ab10f1804d6a07d538ba48d96846
-
Filesize
236KB
MD5f5bd0ff9db3e49525ed345e2bdef4269
SHA1368741950f3754a1592660bad5a5cbb937d27a89
SHA256a32c2040d905ab0cc54451e765c3b95a8c999432d989da3df1bf6d57db63c392
SHA512f65127da64b28d8cb208ad28e5bc76866d234524df78376e5844de7aea20eb9e1b9044436b2d191a2a1e7ff831731e16f721d8af1bb2ad1842b18d983326467c
-
Filesize
294KB
MD5ca7d01186ede3ae48642d8777731f8dd
SHA13abd825aece2a3af27b49f74b4c9ad1cf89c5bc2
SHA256cfc751a9fabdd99d0517ecc7e8792354edfa14e525192a7d61d32440572a8ced
SHA512cf2cf5be54333e20e6bcd1c965da10234e39c38adc69f2248b2be839cd395b432917c3669684feedf19ac3a954f790d31284b9e6a59a637e27423800b1e6a4db