Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:24
Static task
static1
Behavioral task
behavioral1
Sample
ce2373eb00e91bcf491c51c00c7e99c7de21127189be5571bf187b60c2675b85.exe
Resource
win10v2004-20241007-en
General
-
Target
ce2373eb00e91bcf491c51c00c7e99c7de21127189be5571bf187b60c2675b85.exe
-
Size
658KB
-
MD5
8c381dbfdba2e8586ff5a96066588f90
-
SHA1
84b00d799e261bf2237fcd20606608d1cce4f2f1
-
SHA256
ce2373eb00e91bcf491c51c00c7e99c7de21127189be5571bf187b60c2675b85
-
SHA512
f14b2a61a946d27ba90c634773b9b8e2210cd82b5a32718798a43894a7fd7c380427df69e46460eb098c16584c3004657724622435171d1d856aca912155872f
-
SSDEEP
12288:jMrMy90khg0f9sGeSz/Klm+jBWriQXCgFtckX+EvZxxvnz52Jn2k:3yPZ0ZQZX+EvzxvnQVN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3324-17-0x0000000004BF0000-0x0000000004C0A000-memory.dmp healer behavioral1/memory/3324-20-0x0000000004DD0000-0x0000000004DE8000-memory.dmp healer behavioral1/memory/3324-24-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-46-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-45-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-42-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-40-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-38-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-36-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-34-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-48-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-32-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-30-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-28-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-26-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-22-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer behavioral1/memory/3324-21-0x0000000004DD0000-0x0000000004DE2000-memory.dmp healer -
Healer family
-
Processes:
pro5192.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5192.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5192.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5192.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5192.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5192.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5192.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2452-60-0x0000000004B30000-0x0000000004B76000-memory.dmp family_redline behavioral1/memory/2452-61-0x0000000004D40000-0x0000000004D84000-memory.dmp family_redline behavioral1/memory/2452-79-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-89-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-95-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-93-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-91-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-87-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-85-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-83-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-81-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-77-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-73-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-69-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-67-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-65-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-63-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-62-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-75-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline behavioral1/memory/2452-71-0x0000000004D40000-0x0000000004D7F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un713937.exepro5192.exequ4966.exepid process 4508 un713937.exe 3324 pro5192.exe 2452 qu4966.exe -
Processes:
pro5192.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5192.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5192.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ce2373eb00e91bcf491c51c00c7e99c7de21127189be5571bf187b60c2675b85.exeun713937.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce2373eb00e91bcf491c51c00c7e99c7de21127189be5571bf187b60c2675b85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un713937.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2484 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4896 3324 WerFault.exe pro5192.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ce2373eb00e91bcf491c51c00c7e99c7de21127189be5571bf187b60c2675b85.exeun713937.exepro5192.exequ4966.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce2373eb00e91bcf491c51c00c7e99c7de21127189be5571bf187b60c2675b85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un713937.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5192.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4966.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5192.exepid process 3324 pro5192.exe 3324 pro5192.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5192.exequ4966.exedescription pid process Token: SeDebugPrivilege 3324 pro5192.exe Token: SeDebugPrivilege 2452 qu4966.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
ce2373eb00e91bcf491c51c00c7e99c7de21127189be5571bf187b60c2675b85.exeun713937.exedescription pid process target process PID 4452 wrote to memory of 4508 4452 ce2373eb00e91bcf491c51c00c7e99c7de21127189be5571bf187b60c2675b85.exe un713937.exe PID 4452 wrote to memory of 4508 4452 ce2373eb00e91bcf491c51c00c7e99c7de21127189be5571bf187b60c2675b85.exe un713937.exe PID 4452 wrote to memory of 4508 4452 ce2373eb00e91bcf491c51c00c7e99c7de21127189be5571bf187b60c2675b85.exe un713937.exe PID 4508 wrote to memory of 3324 4508 un713937.exe pro5192.exe PID 4508 wrote to memory of 3324 4508 un713937.exe pro5192.exe PID 4508 wrote to memory of 3324 4508 un713937.exe pro5192.exe PID 4508 wrote to memory of 2452 4508 un713937.exe qu4966.exe PID 4508 wrote to memory of 2452 4508 un713937.exe qu4966.exe PID 4508 wrote to memory of 2452 4508 un713937.exe qu4966.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce2373eb00e91bcf491c51c00c7e99c7de21127189be5571bf187b60c2675b85.exe"C:\Users\Admin\AppData\Local\Temp\ce2373eb00e91bcf491c51c00c7e99c7de21127189be5571bf187b60c2675b85.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un713937.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un713937.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5192.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5192.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 10204⤵
- Program crash
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4966.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4966.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3324 -ip 33241⤵PID:5108
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2484
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD527e755c8387c84c05eb0ee2728c92568
SHA136c6245edd91320dfa29ee4c347eba83cb800667
SHA2565dfb60f0bb10bd310cc0bffd1405e7ddc99b837a48f1d171c1f9218fd1cd6faf
SHA512bc09145116342da61d0d269387d2d0c40fd83be883dd067972222f9d438cd6546a5c6c4bc6e339ce35555cf11a279f7bd38d5c3d558e40a4c19dc178515b3ae6
-
Filesize
295KB
MD53ee35d829259498f8bf5d3286f0ab83d
SHA19ad4141cb7981b3893ef11b6bf11f99834f86ef3
SHA256705b5db1f57c96e6411e4bfac547f1f998c5dac5d7bb5dcd5b5ab39cce84b3b9
SHA51281ecb6f7eca23c59fb77777293ca7c77012f6b8e407340fa6cb4801a6ad2beaaeb23081dd059d93e1fa1b51fa7aa33127eaea05ab6a51c35368d7861f77d9717
-
Filesize
354KB
MD572a33293fdede87a931961a0383c542b
SHA1db0323f7f4101db2ab38b867bb841fefd741d11d
SHA2569c8a2670af254ea852aadb14ba2dca4a5841efd5fa1565883f0d357489357dd3
SHA51281476225525069e59b7c91b6a29217daf9f5406027c8af732875be0733e100819dddf8eac1bc6f12a5ec14d1d2271d8796bb01059da28116788fd5b99cb87121