Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c.exe
Resource
win10v2004-20241007-en
General
-
Target
c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c.exe
-
Size
689KB
-
MD5
4d4dfa914d21ce50d8641531f1c7210d
-
SHA1
3ede63fe926c872db47138acfb3b6739aab1cde9
-
SHA256
c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c
-
SHA512
6aab008ecdef67fabf60e0b0e2cc980637fad90438731311364ed73aaa511a9cdf2ef0057418c981cdbfd296eacbe66d822ad7462eb0a2e529d5ad4b9d8adf23
-
SSDEEP
12288:0Mrsy90OM9MIpGWDSxPqMhQKDF+IStCP/aQeaSEmErxJgO0vH3Wx:oyLGpGWDynuGF+IhP/aHazmErkO0PI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2476-19-0x0000000000BA0000-0x0000000000BBA000-memory.dmp healer behavioral1/memory/2476-21-0x0000000002610000-0x0000000002628000-memory.dmp healer behavioral1/memory/2476-49-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-47-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-45-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-43-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-41-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-39-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-37-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-35-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-33-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-31-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-29-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-27-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-25-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-23-0x0000000002610000-0x0000000002622000-memory.dmp healer behavioral1/memory/2476-22-0x0000000002610000-0x0000000002622000-memory.dmp healer -
Healer family
-
Processes:
pro1687.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1687.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1687.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1000-60-0x0000000004D80000-0x0000000004DC6000-memory.dmp family_redline behavioral1/memory/1000-61-0x0000000005420000-0x0000000005464000-memory.dmp family_redline behavioral1/memory/1000-65-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-71-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-95-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-93-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-91-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-87-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-85-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-83-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-81-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-79-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-77-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-75-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-73-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-69-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-67-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-89-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-63-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/1000-62-0x0000000005420000-0x000000000545F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un415598.exepro1687.exequ8825.exepid process 4140 un415598.exe 2476 pro1687.exe 1000 qu8825.exe -
Processes:
pro1687.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1687.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1687.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c.exeun415598.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un415598.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2652 2476 WerFault.exe pro1687.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c.exeun415598.exepro1687.exequ8825.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un415598.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1687.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8825.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1687.exepid process 2476 pro1687.exe 2476 pro1687.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1687.exequ8825.exedescription pid process Token: SeDebugPrivilege 2476 pro1687.exe Token: SeDebugPrivilege 1000 qu8825.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c.exeun415598.exedescription pid process target process PID 1764 wrote to memory of 4140 1764 c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c.exe un415598.exe PID 1764 wrote to memory of 4140 1764 c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c.exe un415598.exe PID 1764 wrote to memory of 4140 1764 c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c.exe un415598.exe PID 4140 wrote to memory of 2476 4140 un415598.exe pro1687.exe PID 4140 wrote to memory of 2476 4140 un415598.exe pro1687.exe PID 4140 wrote to memory of 2476 4140 un415598.exe pro1687.exe PID 4140 wrote to memory of 1000 4140 un415598.exe qu8825.exe PID 4140 wrote to memory of 1000 4140 un415598.exe qu8825.exe PID 4140 wrote to memory of 1000 4140 un415598.exe qu8825.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c.exe"C:\Users\Admin\AppData\Local\Temp\c8fd26c89a2d70c50fb57163f7f30601c12c3ff7a658c5e0def2b73f2955be2c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un415598.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un415598.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1687.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1687.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 10844⤵
- Program crash
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8825.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8825.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1000
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2476 -ip 24761⤵PID:652
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD554c379029fd51710040a5b0eff6afa5f
SHA13b0a87b6150d6f81cc4f4180313d89e34c8873fb
SHA256f3c861994c7852d811b02d5b73c9825d83e4e58ef4ade325b95c2e31cd463610
SHA512d7d4c1c592629b44785d0e8763b88321cbdfc26b8fa73f395e196be366b195112779d7c54221da0defcc00d997494a1b016417f66bf6d966178f04372a9b9ece
-
Filesize
314KB
MD521ec461cb0ad840dd57be3b17d30de75
SHA1bcd381f1cbc9197449bb03cc5638b754bfce8374
SHA256a9015107eb73977a0af98636686290cc433e57bc0f66cfe092251fb2f188a380
SHA5127ed9a295c80d0a1d478e4a4717f9aaac64fe72211af10d95ce72865d6459e26091243e94e1dced58f5445578ab6705b2308a24a24349bf7d9e8959bcb446d25a
-
Filesize
372KB
MD5eda3a353ff12e6d3c83d3efd6d670fb7
SHA126728b52fe2e2087311640ead261eb096204b962
SHA256da61a8de0937ea3470d5f013be10e71fc87f0dafeacfe68469650a033effd2ad
SHA5123479f1c20d2a28eebcc2ac5b41bae422b854ec128becdfcfc6675f9cffa40f3ac40df215046081ebc6204bccc3aaedffe26e1d1badc54e256244fc07d282d2c7