Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:04
Static task
static1
Behavioral task
behavioral1
Sample
c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exe
Resource
win10v2004-20241007-en
General
-
Target
c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exe
-
Size
659KB
-
MD5
6969a91dee48caf07782bcf83ac0349b
-
SHA1
830eaac276d0086368a8f46e14f7fa2d94cf1bfc
-
SHA256
c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7
-
SHA512
466f697882b2e708e58ca7beeb65d0d759130dd9b0682786bdc2b7e880556fe9085d9eead141d8a8b23a2c41100f8d5ef674e0c370bb58d8a3e0157089e25fdc
-
SSDEEP
12288:9Mrgy904EW2hTu9kcYAlomgXi5V8NNLMJtJ5FslRSdsON8/KpaB9FEbQ:hylQhy9zh9DUgJtJ5Fqn99
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4640-19-0x0000000004E10000-0x0000000004E2A000-memory.dmp healer behavioral1/memory/4640-21-0x00000000054A0000-0x00000000054B8000-memory.dmp healer behavioral1/memory/4640-33-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-49-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-47-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-45-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-43-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-41-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-39-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-37-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-35-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-32-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-29-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-27-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-25-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-23-0x00000000054A0000-0x00000000054B2000-memory.dmp healer behavioral1/memory/4640-22-0x00000000054A0000-0x00000000054B2000-memory.dmp healer -
Healer family
-
Processes:
pro6311.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6311.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6311.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6311.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6311.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6311.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6311.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1536-61-0x00000000025D0000-0x0000000002616000-memory.dmp family_redline behavioral1/memory/1536-62-0x0000000004E10000-0x0000000004E54000-memory.dmp family_redline behavioral1/memory/1536-68-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-79-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-96-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-94-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-92-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-90-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-86-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-84-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-82-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-80-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-76-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-74-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-72-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-70-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-88-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-66-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-64-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1536-63-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un433093.exepro6311.exequ4171.exepid process 3860 un433093.exe 4640 pro6311.exe 1536 qu4171.exe -
Processes:
pro6311.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6311.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6311.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exeun433093.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un433093.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3700 4640 WerFault.exe pro6311.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exeun433093.exepro6311.exequ4171.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un433093.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6311.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4171.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6311.exepid process 4640 pro6311.exe 4640 pro6311.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6311.exequ4171.exedescription pid process Token: SeDebugPrivilege 4640 pro6311.exe Token: SeDebugPrivilege 1536 qu4171.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exeun433093.exedescription pid process target process PID 3524 wrote to memory of 3860 3524 c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exe un433093.exe PID 3524 wrote to memory of 3860 3524 c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exe un433093.exe PID 3524 wrote to memory of 3860 3524 c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exe un433093.exe PID 3860 wrote to memory of 4640 3860 un433093.exe pro6311.exe PID 3860 wrote to memory of 4640 3860 un433093.exe pro6311.exe PID 3860 wrote to memory of 4640 3860 un433093.exe pro6311.exe PID 3860 wrote to memory of 1536 3860 un433093.exe qu4171.exe PID 3860 wrote to memory of 1536 3860 un433093.exe qu4171.exe PID 3860 wrote to memory of 1536 3860 un433093.exe qu4171.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exe"C:\Users\Admin\AppData\Local\Temp\c6f8119e72d9562011c971fb0291fb7b0edaaefd2abc113323926b26272f41a7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433093.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433093.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6311.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6311.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 10804⤵
- Program crash
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4171.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4171.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4640 -ip 46401⤵PID:5112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD51bd54478c01c926fba6f1a328e9898b7
SHA1f5bea5eb774450da8974354f7243fa130a6ab382
SHA25600632bc5f6ce49dfc43587c7fb2b58fef0161d2199c693031b31e591fde03c97
SHA512843906d1e264ab0510b51be05211a43ff229c95ec7f86139d1633fa39d72f97145518a2f03cb50169845362bb2ba8ce93df7bdff2836702f57f7ceb9bce22f51
-
Filesize
295KB
MD5d9728b843608399f0d708051bd4c9f75
SHA19fb9301cc4ab7be6e83e61a9ce57526cd1b22f48
SHA2564b4885e5110b451094596903040b78a09191a0c281b4c3224ea981ed5d54453f
SHA512e2e9a9e78e07e61d02c767b9d1d2226d280ac8d0c3b8c9a8f8f9fdd1ed3c571179d635b839ee027e4de119399a387dae7ec94f631b0fa6fe4ed6649e73557e92
-
Filesize
353KB
MD501c53fde37e881847610777ca9567825
SHA1f302995c9e0f14ec60438b65135f36197a601b0b
SHA2568cd672e0ef7b0df7b31e2bdfa7f86433356dc0ab8f25d917d9a22b597b14872c
SHA512d54b9db38f1dcc34933a3d75b113f3f1210d4658d210e2d62a806ae475436a85153f01b7372194d31d6faea8d807891193f9a976c1b565a690d0796af263590b