Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 17:17
Static task
static1
Behavioral task
behavioral1
Sample
4300ecbbc22a4cf65176717a2c78107616d58be34c12befa01ccd80599698c1e.exe
Resource
win10v2004-20241007-en
General
-
Target
4300ecbbc22a4cf65176717a2c78107616d58be34c12befa01ccd80599698c1e.exe
-
Size
698KB
-
MD5
dc4b7b8687b652d7c3f58dd91397247f
-
SHA1
d89244be1bb00c1aa4b4cdaafb92a6abdec73699
-
SHA256
4300ecbbc22a4cf65176717a2c78107616d58be34c12befa01ccd80599698c1e
-
SHA512
57bd05207c1c7727d73c92893d3cb6243f25462c218bbf657ab88f00bae57feffa47f8ad7378cc3e5208d9f52e185ddaef23833e7d2b3a6b766508a5f9d40e39
-
SSDEEP
12288:MMrxy90Ia215UAJF3dA7ujMJk12i1U1DgZD3i9LAV/m:NyygzJw5Jk12i14S+MV+
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4080-19-0x00000000026F0000-0x000000000270A000-memory.dmp healer behavioral1/memory/4080-21-0x0000000004EE0000-0x0000000004EF8000-memory.dmp healer behavioral1/memory/4080-23-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-47-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-45-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-43-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-41-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-40-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-37-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-35-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-33-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-31-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-29-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-27-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-25-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-49-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4080-22-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer -
Healer family
-
Processes:
pro7407.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7407.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7407.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/988-61-0x00000000026E0000-0x0000000002726000-memory.dmp family_redline behavioral1/memory/988-62-0x0000000002760000-0x00000000027A4000-memory.dmp family_redline behavioral1/memory/988-66-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-76-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-96-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-94-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-92-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-90-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-88-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-86-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-84-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-80-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-78-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-74-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-72-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-70-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-68-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-82-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-64-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/988-63-0x0000000002760000-0x000000000279F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un776804.exepro7407.exequ9039.exepid process 4292 un776804.exe 4080 pro7407.exe 988 qu9039.exe -
Processes:
pro7407.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7407.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7407.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4300ecbbc22a4cf65176717a2c78107616d58be34c12befa01ccd80599698c1e.exeun776804.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4300ecbbc22a4cf65176717a2c78107616d58be34c12befa01ccd80599698c1e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un776804.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 832 4080 WerFault.exe pro7407.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4300ecbbc22a4cf65176717a2c78107616d58be34c12befa01ccd80599698c1e.exeun776804.exepro7407.exequ9039.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4300ecbbc22a4cf65176717a2c78107616d58be34c12befa01ccd80599698c1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un776804.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7407.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9039.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7407.exepid process 4080 pro7407.exe 4080 pro7407.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7407.exequ9039.exedescription pid process Token: SeDebugPrivilege 4080 pro7407.exe Token: SeDebugPrivilege 988 qu9039.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
4300ecbbc22a4cf65176717a2c78107616d58be34c12befa01ccd80599698c1e.exeun776804.exedescription pid process target process PID 3480 wrote to memory of 4292 3480 4300ecbbc22a4cf65176717a2c78107616d58be34c12befa01ccd80599698c1e.exe un776804.exe PID 3480 wrote to memory of 4292 3480 4300ecbbc22a4cf65176717a2c78107616d58be34c12befa01ccd80599698c1e.exe un776804.exe PID 3480 wrote to memory of 4292 3480 4300ecbbc22a4cf65176717a2c78107616d58be34c12befa01ccd80599698c1e.exe un776804.exe PID 4292 wrote to memory of 4080 4292 un776804.exe pro7407.exe PID 4292 wrote to memory of 4080 4292 un776804.exe pro7407.exe PID 4292 wrote to memory of 4080 4292 un776804.exe pro7407.exe PID 4292 wrote to memory of 988 4292 un776804.exe qu9039.exe PID 4292 wrote to memory of 988 4292 un776804.exe qu9039.exe PID 4292 wrote to memory of 988 4292 un776804.exe qu9039.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4300ecbbc22a4cf65176717a2c78107616d58be34c12befa01ccd80599698c1e.exe"C:\Users\Admin\AppData\Local\Temp\4300ecbbc22a4cf65176717a2c78107616d58be34c12befa01ccd80599698c1e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un776804.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un776804.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7407.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7407.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 10844⤵
- Program crash
PID:832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9039.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9039.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4080 -ip 40801⤵PID:2664
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556KB
MD5935da2e3a14c6e4b9e3db022f2229448
SHA155c8dbd8925d7dc44cc896df037293ce059c3960
SHA2562da40298ce52ef731baeeec994208a60e5423dc3bd6f969544a153be64748ea9
SHA512a186b3b99f6a1b736a6f34e9f9cd68eb5b68f5b75464b20713f7368c145834bf06aced138430ebc0cfc69ec0045c41543d7c42886f4ea5bacfca114cf247b36d
-
Filesize
294KB
MD55f1f912a17a9739583443d0b89344bdf
SHA164064eb583c62fe39325cccd2644a806af798855
SHA256970736662047083b6b68ee1ca0a01dda83c2df86472d6b0ae0d0702f0439e7ab
SHA51221f3adcce7f9dea1516f3eae33b42719e82690a95afded8aaefa03525e026daaa8b4eea37df8cf8101630d6a226906723f8df051c5b557b70bc2d5ef2fb041b6
-
Filesize
295KB
MD5f7801482cafe3e70a5f9389dae9cc6d5
SHA10ce5d3a18b3d71d2d1a1928d821c0e8fa144bd17
SHA2565c48cad7f14705865f9bf02bb1bf02d28306a27ca406b81434e627ce211af0e4
SHA51230ba152ad1b8913376e299e098514aced5cbd2a401fd11507eb9a2993497b1670a15030e1e76948f35cae1537a6daafdd787aded571d6a6c86f1e15e842052da