Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe
Resource
win10v2004-20241007-en
General
-
Target
38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe
-
Size
700KB
-
MD5
564ef4f33e292db523ee73745cd639f3
-
SHA1
5c0743cdfa73b2ed2a5ff1a6a1fed63ec915aca4
-
SHA256
38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016
-
SHA512
2280131677d0afc2bcbff6a7a927ab2250b9f80a6f2302a29cc3a2e23e414e95201ddaa5049b29fbbc86d360e6f063478b015be272b1c970a2cd3302bbd5cb0b
-
SSDEEP
12288:4MrJy90U/NYYGumU79D/pcA38F5OMhkkhqV4TALXGyG98kD6mp6:ByfYLe38zOMhk7dRG9vDz6
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2260-19-0x00000000026D0000-0x00000000026EA000-memory.dmp healer behavioral1/memory/2260-21-0x0000000004CB0000-0x0000000004CC8000-memory.dmp healer behavioral1/memory/2260-22-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-49-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-47-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-45-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-43-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-42-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-39-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-37-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-35-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-33-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-31-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-29-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-27-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-25-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer behavioral1/memory/2260-23-0x0000000004CB0000-0x0000000004CC2000-memory.dmp healer -
Healer family
-
Processes:
pro6346.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6346.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6346.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4536-61-0x0000000004C90000-0x0000000004CD6000-memory.dmp family_redline behavioral1/memory/4536-62-0x0000000004D10000-0x0000000004D54000-memory.dmp family_redline behavioral1/memory/4536-74-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-78-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-94-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-92-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-91-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-88-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-86-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-84-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-82-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-80-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-76-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-72-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-70-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-69-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-96-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-66-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-64-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/4536-63-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un028378.exepro6346.exequ5770.exepid process 4608 un028378.exe 2260 pro6346.exe 4536 qu5770.exe -
Processes:
pro6346.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6346.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6346.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exeun028378.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un028378.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4876 2260 WerFault.exe pro6346.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu5770.exe38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exeun028378.exepro6346.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5770.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un028378.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6346.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6346.exepid process 2260 pro6346.exe 2260 pro6346.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6346.exequ5770.exedescription pid process Token: SeDebugPrivilege 2260 pro6346.exe Token: SeDebugPrivilege 4536 qu5770.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exeun028378.exedescription pid process target process PID 2688 wrote to memory of 4608 2688 38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe un028378.exe PID 2688 wrote to memory of 4608 2688 38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe un028378.exe PID 2688 wrote to memory of 4608 2688 38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe un028378.exe PID 4608 wrote to memory of 2260 4608 un028378.exe pro6346.exe PID 4608 wrote to memory of 2260 4608 un028378.exe pro6346.exe PID 4608 wrote to memory of 2260 4608 un028378.exe pro6346.exe PID 4608 wrote to memory of 4536 4608 un028378.exe qu5770.exe PID 4608 wrote to memory of 4536 4608 un028378.exe qu5770.exe PID 4608 wrote to memory of 4536 4608 un028378.exe qu5770.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe"C:\Users\Admin\AppData\Local\Temp\38cac9fdf70069bd726f3c4e9a7d07ac5fadce337311e7b45e1abf3dbfbe4016.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un028378.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un028378.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6346.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6346.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2260 -s 11004⤵
- Program crash
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5770.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5770.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2260 -ip 22601⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
558KB
MD5cb62255625332a59801da17f68f3e092
SHA1e1e93b39b60b000af91633f534814e73f286a63a
SHA256c3c8b9f6cadd1d2ba5d6bb96f9b5d87397da842364a4244095cb1b6346fcfb00
SHA512bec02b6eae5abb977073a0a58ece689d38d1a7c76c4acf284efe6b6bc20f246fe42890924498e440f9565d0fa78330abc3d74f2159b0d84c535d39c6052eac0f
-
Filesize
307KB
MD5208a34f309752a32db9ca5509d6bb56e
SHA10f87befd20d49af851177c826dc883cdd46ffa7e
SHA2561c28b89501d1feb3ed1514bf495f3cd09f4adf18db51b1364579600152e4be03
SHA512de3699d51d2f4c5cb3fa81e2420f9aca3eda517da21cf1c0d30f0e709901e248a48f85360f14bf2a3ade96a54efb54b258cd0d880f60a72490f6b2ff89d1b49e
-
Filesize
365KB
MD5bc4c6235747d3c89d4d1fb7717887886
SHA152eefe44bb2d2b16cf3aae41119a4021b6fa0ea1
SHA2565de81f9d1f5ed871d7f523226b8eeb6363c1be39b722a18ea012d1460b7d9e21
SHA512fc3c9d7c5b87f778d1a1770d8d39313a5e49254eef344a6450bf5569d13b64a29b8cd65f5e8f6125fe4bf5e85175a517ed12348d3e02faf7c6911f08b8af1842