Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:37
Static task
static1
Behavioral task
behavioral1
Sample
dd0215d684e60f00b1d0e32a0dd31116eef0b413574be1d0ed643dc4b917aa61.exe
Resource
win10v2004-20241007-en
General
-
Target
dd0215d684e60f00b1d0e32a0dd31116eef0b413574be1d0ed643dc4b917aa61.exe
-
Size
673KB
-
MD5
dc5ed79fe44343fbd650e791b51c2f9b
-
SHA1
d57f5e34bd2a1cf6daffd4f5ce2d2c3947955acb
-
SHA256
dd0215d684e60f00b1d0e32a0dd31116eef0b413574be1d0ed643dc4b917aa61
-
SHA512
1abd8f822f1ead96faeca073ee26e016e8ce6bbafa9fe11028ac2ad4f9c8fc2fe00b4e47e151319f58bb4a8d8ef1df9e1c93bd065c1c08b77333e76a8b9f9c42
-
SSDEEP
12288:2Mrsy90jnJZBmY3tpa4bCMV6rS31UXmjETtqibuWVE1tLXe:WyY/aTM82S8KuCn
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4052-19-0x00000000024E0000-0x00000000024FA000-memory.dmp healer behavioral1/memory/4052-21-0x0000000004A50000-0x0000000004A68000-memory.dmp healer behavioral1/memory/4052-31-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-49-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-47-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-45-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-43-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-41-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-39-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-37-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-35-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-33-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-29-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-27-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-25-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-23-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4052-22-0x0000000004A50000-0x0000000004A62000-memory.dmp healer -
Healer family
-
Processes:
pro0052.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0052.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0052.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3972-61-0x00000000025F0000-0x0000000002636000-memory.dmp family_redline behavioral1/memory/3972-62-0x0000000004AC0000-0x0000000004B04000-memory.dmp family_redline behavioral1/memory/3972-63-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-78-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-76-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-74-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-72-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-70-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-68-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-66-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-64-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-80-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-82-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-84-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-96-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-94-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-92-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-90-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-88-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline behavioral1/memory/3972-86-0x0000000004AC0000-0x0000000004AFF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un369234.exepro0052.exequ8878.exepid process 5100 un369234.exe 4052 pro0052.exe 3972 qu8878.exe -
Processes:
pro0052.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0052.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
dd0215d684e60f00b1d0e32a0dd31116eef0b413574be1d0ed643dc4b917aa61.exeun369234.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dd0215d684e60f00b1d0e32a0dd31116eef0b413574be1d0ed643dc4b917aa61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un369234.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2736 4052 WerFault.exe pro0052.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dd0215d684e60f00b1d0e32a0dd31116eef0b413574be1d0ed643dc4b917aa61.exeun369234.exepro0052.exequ8878.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dd0215d684e60f00b1d0e32a0dd31116eef0b413574be1d0ed643dc4b917aa61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un369234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0052.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8878.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0052.exepid process 4052 pro0052.exe 4052 pro0052.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0052.exequ8878.exedescription pid process Token: SeDebugPrivilege 4052 pro0052.exe Token: SeDebugPrivilege 3972 qu8878.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
dd0215d684e60f00b1d0e32a0dd31116eef0b413574be1d0ed643dc4b917aa61.exeun369234.exedescription pid process target process PID 1104 wrote to memory of 5100 1104 dd0215d684e60f00b1d0e32a0dd31116eef0b413574be1d0ed643dc4b917aa61.exe un369234.exe PID 1104 wrote to memory of 5100 1104 dd0215d684e60f00b1d0e32a0dd31116eef0b413574be1d0ed643dc4b917aa61.exe un369234.exe PID 1104 wrote to memory of 5100 1104 dd0215d684e60f00b1d0e32a0dd31116eef0b413574be1d0ed643dc4b917aa61.exe un369234.exe PID 5100 wrote to memory of 4052 5100 un369234.exe pro0052.exe PID 5100 wrote to memory of 4052 5100 un369234.exe pro0052.exe PID 5100 wrote to memory of 4052 5100 un369234.exe pro0052.exe PID 5100 wrote to memory of 3972 5100 un369234.exe qu8878.exe PID 5100 wrote to memory of 3972 5100 un369234.exe qu8878.exe PID 5100 wrote to memory of 3972 5100 un369234.exe qu8878.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd0215d684e60f00b1d0e32a0dd31116eef0b413574be1d0ed643dc4b917aa61.exe"C:\Users\Admin\AppData\Local\Temp\dd0215d684e60f00b1d0e32a0dd31116eef0b413574be1d0ed643dc4b917aa61.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un369234.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un369234.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0052.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0052.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 10804⤵
- Program crash
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8878.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8878.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4052 -ip 40521⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD59a65602d0c9759374da5189c75f9a82a
SHA183e7aa8fc951a892186f8c5ed0a6771337aded84
SHA256a71950abdaa1ba9f383757aa2fe586815e80e79419469d168294ab899fb0ef6c
SHA5121c79aeb33162a22e628f0e38fb9398c209bf49a545c6d11d9c2028bafdb4a9250092904ca9f8f34540bc3aabf0dc612d1e042e4a1f7ce8a705df6c072dafb8d1
-
Filesize
260KB
MD55e9b3abb9ce978a91b8ea0c622d14310
SHA10e4573e6c649316da9028c7c7ec7d751bcf699b6
SHA25630a03c30cb5a06829cb9167c821e96be6ce05391376808509f8f0c3103543724
SHA5127b679cb68cb922410014c44cc84996683cef883d010d78cb381f10525cfc1dd5a00085a052df7c3b22ce1928bbc23d9308fc30479a64ab4315aeac8162090de0
-
Filesize
319KB
MD500a1fd2c5152d7d299b25958c70fc319
SHA1acc9bf1ca6101b1d7c676e1e1e6dda622ede98f2
SHA2561883d486c8e055537f5f021be241d8f632765fac906e340005534970ee1c4007
SHA5123f94423acba4c71c61f233eca5dcffd33f90dcdd17485d3669113be495298891aab332dde4a79c308dab6e5ecb88e836bdf98f54b738d65f1c8a7dfd610dcc01