Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
f2ce42e91964146479b30ba1f486b0087f0cf65615a21a5a398a684d3a582a69.exe
Resource
win10v2004-20241007-en
General
-
Target
f2ce42e91964146479b30ba1f486b0087f0cf65615a21a5a398a684d3a582a69.exe
-
Size
673KB
-
MD5
db1912505bae040ceb28f3d8e69ce71c
-
SHA1
5007ac54f41d528be62dbb8b6cbc4f0e0fa214d9
-
SHA256
f2ce42e91964146479b30ba1f486b0087f0cf65615a21a5a398a684d3a582a69
-
SHA512
461bffc6d01eebbfa5ff425416979a11177ace55558650babda2990f329f14a8cf000ef2f72758ada229f048b08955da430554dfaf3d8e79d73d58a77045b0da
-
SSDEEP
12288:1Mrqy90VR5XkQgn969ZMku310EIbTu+h7b+4RTuW6uWo2Tv1EGHCvZ:LyapgOVuxK+4tu5LT1tY
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3088-19-0x0000000002460000-0x000000000247A000-memory.dmp healer behavioral1/memory/3088-21-0x0000000005020000-0x0000000005038000-memory.dmp healer behavioral1/memory/3088-49-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-47-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-45-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-43-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-41-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-39-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-37-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-35-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-33-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-31-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-29-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-27-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-25-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-23-0x0000000005020000-0x0000000005032000-memory.dmp healer behavioral1/memory/3088-22-0x0000000005020000-0x0000000005032000-memory.dmp healer -
Healer family
-
Processes:
pro9119.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9119.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9119.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3168-60-0x00000000022D0000-0x0000000002316000-memory.dmp family_redline behavioral1/memory/3168-61-0x0000000002560000-0x00000000025A4000-memory.dmp family_redline behavioral1/memory/3168-63-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-75-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-95-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-93-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-91-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-89-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-87-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-85-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-83-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-79-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-77-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-73-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-71-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-69-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-67-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-65-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-81-0x0000000002560000-0x000000000259F000-memory.dmp family_redline behavioral1/memory/3168-62-0x0000000002560000-0x000000000259F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un199969.exepro9119.exequ2098.exepid process 1660 un199969.exe 3088 pro9119.exe 3168 qu2098.exe -
Processes:
pro9119.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9119.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9119.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f2ce42e91964146479b30ba1f486b0087f0cf65615a21a5a398a684d3a582a69.exeun199969.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f2ce42e91964146479b30ba1f486b0087f0cf65615a21a5a398a684d3a582a69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un199969.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4300 3088 WerFault.exe pro9119.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f2ce42e91964146479b30ba1f486b0087f0cf65615a21a5a398a684d3a582a69.exeun199969.exepro9119.exequ2098.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2ce42e91964146479b30ba1f486b0087f0cf65615a21a5a398a684d3a582a69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un199969.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2098.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9119.exepid process 3088 pro9119.exe 3088 pro9119.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9119.exequ2098.exedescription pid process Token: SeDebugPrivilege 3088 pro9119.exe Token: SeDebugPrivilege 3168 qu2098.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f2ce42e91964146479b30ba1f486b0087f0cf65615a21a5a398a684d3a582a69.exeun199969.exedescription pid process target process PID 3896 wrote to memory of 1660 3896 f2ce42e91964146479b30ba1f486b0087f0cf65615a21a5a398a684d3a582a69.exe un199969.exe PID 3896 wrote to memory of 1660 3896 f2ce42e91964146479b30ba1f486b0087f0cf65615a21a5a398a684d3a582a69.exe un199969.exe PID 3896 wrote to memory of 1660 3896 f2ce42e91964146479b30ba1f486b0087f0cf65615a21a5a398a684d3a582a69.exe un199969.exe PID 1660 wrote to memory of 3088 1660 un199969.exe pro9119.exe PID 1660 wrote to memory of 3088 1660 un199969.exe pro9119.exe PID 1660 wrote to memory of 3088 1660 un199969.exe pro9119.exe PID 1660 wrote to memory of 3168 1660 un199969.exe qu2098.exe PID 1660 wrote to memory of 3168 1660 un199969.exe qu2098.exe PID 1660 wrote to memory of 3168 1660 un199969.exe qu2098.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2ce42e91964146479b30ba1f486b0087f0cf65615a21a5a398a684d3a582a69.exe"C:\Users\Admin\AppData\Local\Temp\f2ce42e91964146479b30ba1f486b0087f0cf65615a21a5a398a684d3a582a69.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un199969.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un199969.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9119.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 10804⤵
- Program crash
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2098.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2098.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3088 -ip 30881⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD5a0f0b91477146e41227a1ef558a81b62
SHA1ecfc41885bee2cdd60c7672e39b98b664957829f
SHA2568ecf51524cc1b84e52dd0250e3b8d94d9a1b4a781b6d137a6377bd8f80825dfe
SHA51253c717475a55196925843e3986634d0ba077e6aba61faf7a43b3559396998f1732deff6c45200970c08efe85e97c291cf1b98d53111659be4418e0bc6c6e60ea
-
Filesize
260KB
MD50056a93eb9dc5174a95b3d85fd188aef
SHA1b554ad60f7d84db2e0a0c77d8083dd753f40f92c
SHA256303b7cbcbbbfbbb08086d19e77ec403d92cf3f5a4fc30ab078291dff4f9fab1f
SHA512437b3a68ce33e16c42e3b9eca0b4a65bb07f9c69d46f1bcb53fe4c116c130dc2bf697357240af57b4d74337ea50a891bb14622e556aaadf1adc030483d3e5ea0
-
Filesize
319KB
MD52f96231ef47a39278100fd6579e3b242
SHA199795090b6a84954e43b6f6a5f176e4537fcc2bd
SHA2566ad3b5516ded679dae47697e06e277e5cc6d6348f438489febfc9021f09eaf53
SHA5124a0e93952131e25dfc017ddac1531a16483fd8a80e72eb6b907e9fcd8cafffeb937636d3aab9aff231dd558864dbf79ebac613693af92855445e80d77a986a0e