Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad.exe
Resource
win10v2004-20241007-en
General
-
Target
09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad.exe
-
Size
673KB
-
MD5
817111ba05979ab9dd7ced975be4c9f8
-
SHA1
af8cd68310a8a01c009564723c3987a1f51d8e0c
-
SHA256
09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad
-
SHA512
9ba1d18987064a4ab81181e9db2b63b85fc39d60c5f5af6ea03060ed63faae30047b6fe210c4cc3f90a213d7b5ca59209924c82744cf5fa3c587766197e163d6
-
SSDEEP
12288:LMrgy90Cj2Q6FCzgwJZoyxq8H74fWgJPyXiJ1A61GW/F8jB:7y76rFC57tzHY5JyqAup/2jB
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3040-19-0x00000000023B0000-0x00000000023CA000-memory.dmp healer behavioral1/memory/3040-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/3040-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-41-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3040-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pro0765.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0765.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4476-61-0x00000000025C0000-0x0000000002606000-memory.dmp family_redline behavioral1/memory/4476-62-0x0000000002670000-0x00000000026B4000-memory.dmp family_redline behavioral1/memory/4476-66-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-74-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-96-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-94-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-92-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-91-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-86-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-84-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-82-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-80-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-79-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-77-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-72-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-70-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-68-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-88-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-64-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline behavioral1/memory/4476-63-0x0000000002670000-0x00000000026AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un396688.exepro0765.exequ9796.exepid process 2100 un396688.exe 3040 pro0765.exe 4476 qu9796.exe -
Processes:
pro0765.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0765.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad.exeun396688.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un396688.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1260 3040 WerFault.exe pro0765.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad.exeun396688.exepro0765.exequ9796.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un396688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0765.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9796.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0765.exepid process 3040 pro0765.exe 3040 pro0765.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0765.exequ9796.exedescription pid process Token: SeDebugPrivilege 3040 pro0765.exe Token: SeDebugPrivilege 4476 qu9796.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad.exeun396688.exedescription pid process target process PID 3648 wrote to memory of 2100 3648 09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad.exe un396688.exe PID 3648 wrote to memory of 2100 3648 09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad.exe un396688.exe PID 3648 wrote to memory of 2100 3648 09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad.exe un396688.exe PID 2100 wrote to memory of 3040 2100 un396688.exe pro0765.exe PID 2100 wrote to memory of 3040 2100 un396688.exe pro0765.exe PID 2100 wrote to memory of 3040 2100 un396688.exe pro0765.exe PID 2100 wrote to memory of 4476 2100 un396688.exe qu9796.exe PID 2100 wrote to memory of 4476 2100 un396688.exe qu9796.exe PID 2100 wrote to memory of 4476 2100 un396688.exe qu9796.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad.exe"C:\Users\Admin\AppData\Local\Temp\09ac2a8ccd0e3bbe935e2b6819927dc89257041d1db3ee565eb98b869ed97cad.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396688.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396688.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0765.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0765.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3040 -s 9644⤵
- Program crash
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9796.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9796.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3040 -ip 30401⤵PID:3532
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520KB
MD56157451cb832a54f468819fac620a67d
SHA165898cefd90e5c65516393069b6d89904e1712d9
SHA256f51c7e37e97ae6b6cc8579af980f569289af1de2a126498cafe07c626d8609d2
SHA51211a1296e27d7dea89ca521f9259ee2e082872c31c8370551ea09579f1861251e732880ece59698391ba27303523dfd7882b511267fb8cb3f1b59765697a2aa07
-
Filesize
253KB
MD57ce8cdd241a64957504d71667f012c43
SHA13415c1cd5c43c3c17d8fabd443063bb9f7d7a9ad
SHA256030fc9f9c0c53d70cf54806ed870a2afcd40855b41c3d747081985b1925b7547
SHA51230e06c8a923249f00ea865790a9a6eb51fca249a809aed101b32558bff2c66c14a69e961960d2d99e12e696c8f73556f0f2902fff526b576d84e7b53d9e4ab5e
-
Filesize
311KB
MD51b50a5fffc5d877dc520a50be6e2a91c
SHA1aba24cbb040c0e4ed54f7516ca5d6bdf240f4eb9
SHA256b77fc6d854b9fa867d9568cb43a404caa5d62e3c459648d849ba1c678d3eb9fe
SHA512f1c163b6640f302d5160c4cfe364a96fc561eaee3bb6ee7cc4945fa0967f71f246dd0dbcd374a306985b051bc21e225d872ac5f1a17b8f6097e6c67c44357282