Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
c2b3cd4166382ac5ce0feb688d7a97fdd346afcfea9b6723123021a4fa045419.exe
Resource
win10v2004-20241007-en
General
-
Target
c2b3cd4166382ac5ce0feb688d7a97fdd346afcfea9b6723123021a4fa045419.exe
-
Size
690KB
-
MD5
67bb7e1e4452eba635ad123bc3802643
-
SHA1
261d07930886c8975d928d7f43ba755294ecd9c8
-
SHA256
c2b3cd4166382ac5ce0feb688d7a97fdd346afcfea9b6723123021a4fa045419
-
SHA512
47f2f7ed3022cd55b95971d041a969fd3cf641beb4e2f4bd2259274dbd2688183fb4174b1661e33924c41458ca434e0eb4317340b948baf7d8525fbc62558034
-
SSDEEP
12288:MMrfy9050DXjHMtJscrRTJ33y665hLueg3JEK34uSli/++vmFcffig66z1z7gt8c:TyqQTQndCJfaH5EKIuEi/ycfag6S1wtD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4408-19-0x00000000023F0000-0x000000000240A000-memory.dmp healer behavioral1/memory/4408-21-0x0000000002850000-0x0000000002868000-memory.dmp healer behavioral1/memory/4408-26-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-49-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-47-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-45-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-43-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-41-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-39-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-37-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-35-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-33-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-31-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-29-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-27-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-22-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/4408-23-0x0000000002850000-0x0000000002862000-memory.dmp healer -
Healer family
-
Processes:
pro8806.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8806.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8806.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8806.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8806.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8806.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8806.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4452-61-0x0000000003A20000-0x0000000003A66000-memory.dmp family_redline behavioral1/memory/4452-62-0x0000000006010000-0x0000000006054000-memory.dmp family_redline behavioral1/memory/4452-68-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-72-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-96-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-94-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-92-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-90-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-88-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-84-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-82-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-80-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-78-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-74-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-70-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-86-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-76-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-66-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-64-0x0000000006010000-0x000000000604F000-memory.dmp family_redline behavioral1/memory/4452-63-0x0000000006010000-0x000000000604F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un392298.exepro8806.exequ8767.exepid process 2136 un392298.exe 4408 pro8806.exe 4452 qu8767.exe -
Processes:
pro8806.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8806.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8806.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c2b3cd4166382ac5ce0feb688d7a97fdd346afcfea9b6723123021a4fa045419.exeun392298.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c2b3cd4166382ac5ce0feb688d7a97fdd346afcfea9b6723123021a4fa045419.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un392298.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1676 4408 WerFault.exe pro8806.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu8767.exec2b3cd4166382ac5ce0feb688d7a97fdd346afcfea9b6723123021a4fa045419.exeun392298.exepro8806.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8767.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2b3cd4166382ac5ce0feb688d7a97fdd346afcfea9b6723123021a4fa045419.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un392298.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8806.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8806.exepid process 4408 pro8806.exe 4408 pro8806.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8806.exequ8767.exedescription pid process Token: SeDebugPrivilege 4408 pro8806.exe Token: SeDebugPrivilege 4452 qu8767.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c2b3cd4166382ac5ce0feb688d7a97fdd346afcfea9b6723123021a4fa045419.exeun392298.exedescription pid process target process PID 1596 wrote to memory of 2136 1596 c2b3cd4166382ac5ce0feb688d7a97fdd346afcfea9b6723123021a4fa045419.exe un392298.exe PID 1596 wrote to memory of 2136 1596 c2b3cd4166382ac5ce0feb688d7a97fdd346afcfea9b6723123021a4fa045419.exe un392298.exe PID 1596 wrote to memory of 2136 1596 c2b3cd4166382ac5ce0feb688d7a97fdd346afcfea9b6723123021a4fa045419.exe un392298.exe PID 2136 wrote to memory of 4408 2136 un392298.exe pro8806.exe PID 2136 wrote to memory of 4408 2136 un392298.exe pro8806.exe PID 2136 wrote to memory of 4408 2136 un392298.exe pro8806.exe PID 2136 wrote to memory of 4452 2136 un392298.exe qu8767.exe PID 2136 wrote to memory of 4452 2136 un392298.exe qu8767.exe PID 2136 wrote to memory of 4452 2136 un392298.exe qu8767.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2b3cd4166382ac5ce0feb688d7a97fdd346afcfea9b6723123021a4fa045419.exe"C:\Users\Admin\AppData\Local\Temp\c2b3cd4166382ac5ce0feb688d7a97fdd346afcfea9b6723123021a4fa045419.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un392298.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un392298.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8806.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8806.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 10804⤵
- Program crash
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8767.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8767.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4408 -ip 44081⤵PID:3384
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD5dd21b889eefbd9491b0193658b7f86d1
SHA11459692a18647e9e0a2a704271dffdd9ee9d1a55
SHA256e23060ffbbf9566298f227a7e2e04782edd93f147e82b1d00db46af99805d93c
SHA5122abded9537f04b4a40a98ce808a954f75a0d3678df5ede1474ca20fdb869f59f2597026cfaa4e1895c8d1577142069b0d1a0ea337a9b8ad205c45a141282e905
-
Filesize
291KB
MD573abb64ca7ca923ebc437c5d56ad3752
SHA1a058ea134baaa5915afd8840c02c8f0d104c051d
SHA25692ccc37b9c1a55810842afe64a6eb6c8b2441d52e1649ea9b4246011db9fb290
SHA5125f4f47c66390be94db939a222640fdcfb450f5906b9668ec271025c77d04b21072f0920bfa43e3f5f459c263ac4c9115d7afa18dac02e1f58a6c111176316587
-
Filesize
345KB
MD501314137699f4e56bc1dee221fb6a793
SHA1ace6f66a1d43bdb6b4154ce2d6beb1028ba7a707
SHA2564280505a9389c014a4c68bc8164f5cb2f43443d64dbb60ae490b62daccc32633
SHA5128ca0e9bb119f513323fd9f1a6e44dc0eabb027442c777a01efddb5e86463bcafcfe263e1e8a51eaf97b11ac9d15df25221ebab31ed521bffd382096fe0d9bfba