Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exe
Resource
win10v2004-20241007-en
General
-
Target
cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exe
-
Size
660KB
-
MD5
0176f3e09d5ff729b329317c2c8a0a55
-
SHA1
1da78ac7ec01fe95675ddbeda72d9f6e72ec33c0
-
SHA256
cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d
-
SHA512
d32da1caf2000d42d50d9bd3ad2138c7bedf8c687d1a18b1e2ffdcd66c2c37b8ae0a1f19a2c3c48d01749fe669148cba268486013c538ff0bba1efdbb42cc9c6
-
SSDEEP
12288:fMr+y90ESmAwcvi/1hIR8UHNIu+5ZlmXcct4L9ENwu:hyl3Pk01yph+nlTct4L9m
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1272-18-0x0000000003AB0000-0x0000000003ACA000-memory.dmp healer behavioral1/memory/1272-21-0x0000000003B40000-0x0000000003B58000-memory.dmp healer behavioral1/memory/1272-47-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-49-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-45-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-43-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-41-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-39-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-37-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-35-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-33-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-25-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-23-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-22-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-31-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-29-0x0000000003B40000-0x0000000003B52000-memory.dmp healer behavioral1/memory/1272-27-0x0000000003B40000-0x0000000003B52000-memory.dmp healer -
Healer family
-
Processes:
pro6395.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6395.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4084-61-0x00000000022D0000-0x0000000002316000-memory.dmp family_redline behavioral1/memory/4084-62-0x0000000002760000-0x00000000027A4000-memory.dmp family_redline behavioral1/memory/4084-88-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-92-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-96-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-94-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-90-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-86-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-84-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-82-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-80-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-78-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-77-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-74-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-66-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-64-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-63-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-72-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-70-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/4084-68-0x0000000002760000-0x000000000279F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un183555.exepro6395.exequ8861.exepid process 1108 un183555.exe 1272 pro6395.exe 4084 qu8861.exe -
Processes:
pro6395.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6395.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6395.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exeun183555.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un183555.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 888 1272 WerFault.exe pro6395.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro6395.exequ8861.execc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exeun183555.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6395.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8861.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un183555.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6395.exepid process 1272 pro6395.exe 1272 pro6395.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6395.exequ8861.exedescription pid process Token: SeDebugPrivilege 1272 pro6395.exe Token: SeDebugPrivilege 4084 qu8861.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exeun183555.exedescription pid process target process PID 4472 wrote to memory of 1108 4472 cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exe un183555.exe PID 4472 wrote to memory of 1108 4472 cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exe un183555.exe PID 4472 wrote to memory of 1108 4472 cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exe un183555.exe PID 1108 wrote to memory of 1272 1108 un183555.exe pro6395.exe PID 1108 wrote to memory of 1272 1108 un183555.exe pro6395.exe PID 1108 wrote to memory of 1272 1108 un183555.exe pro6395.exe PID 1108 wrote to memory of 4084 1108 un183555.exe qu8861.exe PID 1108 wrote to memory of 4084 1108 un183555.exe qu8861.exe PID 1108 wrote to memory of 4084 1108 un183555.exe qu8861.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exe"C:\Users\Admin\AppData\Local\Temp\cc14c66d5a86fb8bb8302a7424a5472e4e1d6d9f09affeadc71de3ec0af9f89d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un183555.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un183555.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6395.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6395.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 10844⤵
- Program crash
PID:888 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8861.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8861.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1272 -ip 12721⤵PID:396
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD52bf3d32c2fad06581566894ca6434294
SHA18635e559f525a933fd234e90b061f3cd1b177182
SHA2564c0cdd3298b364301e8462568438f2e63192be81586f5fd3daa64d8604b23b70
SHA5120fdcc11698065388116d0ad57c3d8b4bb7a96a3fa9eadc69cb5e3d88da3c7bafa6d94a9af42ef9d618b490692cd4c47f24d903b16871f6f8d5619125bfe01fa5
-
Filesize
276KB
MD55d702b58724c5f2bcd46408aa50bd086
SHA13f9f45523f1b6dbb19e66db89cb523f65a567ec8
SHA256a2aec9eb2913f28e24d91d04da81ffab282903ac56cc836679d1cccce8b7657a
SHA5121bab5f66f8dbfcf57e1d8bbbca808781663b397fa494b1325fbe952a729de268b4822e22b385391cc97c8e6a9fc92e74fda8444d8d2b4a417259d001be54c39c
-
Filesize
295KB
MD5463aa549c86888c35600e920c614ad47
SHA143217b7cb5011e164e76e5bd1157f9bef42153b2
SHA2566f4c6ae0308834b2c95dfcd356d37bad18399912b3866961978f99e57d4ee631
SHA5126db45e4b454e91602237d483b70a771e78ac88c0a0d46e9870909f455bc7c05e555da36723e0817a1252a6c964ab9e89c58d3fce656d730c528a857d34184222