Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:47
Static task
static1
Behavioral task
behavioral1
Sample
3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe
Resource
win10v2004-20241007-en
General
-
Target
3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe
-
Size
697KB
-
MD5
a87733f3ce7e4e4b35d7b241d0bfb745
-
SHA1
6d03f8323768c740afe097d19caaf6581695a7f9
-
SHA256
3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d
-
SHA512
59e523a08eb61d286b294c3636e2cbede489dcae18b048dfab56044d17748922dca531ac0bbf6d238fb0833b3559605ea9e2dfa824a2474b18c26e0abda54bde
-
SSDEEP
12288:7Mrty90oxnVgoiiTOMk/WVhknKOiGGHv8Ikp8HOMJbL6nbGjTAxI9gTB9igz6eN6:uyXJVgfim/9nKONsv8RcOqGGjwI92r6r
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/816-17-0x0000000004840000-0x000000000485A000-memory.dmp healer behavioral1/memory/816-20-0x0000000004D60000-0x0000000004D78000-memory.dmp healer behavioral1/memory/816-48-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-46-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-44-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-42-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-40-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-38-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-36-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-34-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-32-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-30-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-28-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-26-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-24-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-22-0x0000000004D60000-0x0000000004D72000-memory.dmp healer behavioral1/memory/816-21-0x0000000004D60000-0x0000000004D72000-memory.dmp healer -
Healer family
-
Processes:
pro3650.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3650.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3650.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1132-59-0x00000000070E0000-0x0000000007126000-memory.dmp family_redline behavioral1/memory/1132-60-0x0000000007780000-0x00000000077C4000-memory.dmp family_redline behavioral1/memory/1132-80-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-94-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-93-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-90-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-88-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-86-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-84-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-82-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-78-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-76-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-72-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-70-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-68-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-66-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-64-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-62-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-61-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/1132-74-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un453041.exepro3650.exequ8171.exepid process 5084 un453041.exe 816 pro3650.exe 1132 qu8171.exe -
Processes:
pro3650.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3650.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exeun453041.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un453041.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4584 816 WerFault.exe pro3650.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exeun453041.exepro3650.exequ8171.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un453041.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3650.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8171.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro3650.exepid process 816 pro3650.exe 816 pro3650.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro3650.exequ8171.exedescription pid process Token: SeDebugPrivilege 816 pro3650.exe Token: SeDebugPrivilege 1132 qu8171.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exeun453041.exedescription pid process target process PID 4944 wrote to memory of 5084 4944 3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe un453041.exe PID 4944 wrote to memory of 5084 4944 3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe un453041.exe PID 4944 wrote to memory of 5084 4944 3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe un453041.exe PID 5084 wrote to memory of 816 5084 un453041.exe pro3650.exe PID 5084 wrote to memory of 816 5084 un453041.exe pro3650.exe PID 5084 wrote to memory of 816 5084 un453041.exe pro3650.exe PID 5084 wrote to memory of 1132 5084 un453041.exe qu8171.exe PID 5084 wrote to memory of 1132 5084 un453041.exe qu8171.exe PID 5084 wrote to memory of 1132 5084 un453041.exe qu8171.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe"C:\Users\Admin\AppData\Local\Temp\3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453041.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453041.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3650.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3650.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 10124⤵
- Program crash
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8171.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8171.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 816 -ip 8161⤵PID:876
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
555KB
MD5f5d093bd6319bffd16285c668ef67853
SHA1ad5370b873cbc8ee9ea2873ffe00364867bc52b8
SHA2561b86bbcb1b28487b39bf3b8843a39727f6cbc32f21a68582c84c577db9ed58d5
SHA512f745355c191712abfc86062cb7f5f4db921e6aa5bcb9b43362169784e1c9b6af59cb762a3aed2ae69b221a80fce6751fa0e0d4b2f42404272064f233c1cdabba
-
Filesize
347KB
MD59dfbb3893368b5089036af7e6625ab80
SHA1f2edbd6007b5f7be07094a9384a85081c7d4887f
SHA256b22532c1e13e483cf21701c3198eb02407546de62fc5bc6c32e50347aaf58042
SHA5124ba479ea0c83522c9367c27dcbfe559809f765ed790cf6e10081d10ed8de1a8fd6dc4200c73a4ea897dbd36ff9d68c8e104b3d5be545d5040b6502828a642035
-
Filesize
406KB
MD5e8a7197f17b06297bc01095609f07a1a
SHA17bfae2ddc6144d41f6271e50211d231eddb360e0
SHA256ba6b5572c32b2797ab17e605f8dd4a566da51d051a32706624ef35c0008170ab
SHA512789ba62ed617750d57337045245b74e05eb8eb27601d968a962960800d1b51aa724d5168f6e819aec44ac30c072ff593f668ecb63cf7f8a07516a424e2b64cc7