Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
cbcd03abc247042f97201be93bbf06f62ac72fbacea4a009281802d3f0d94fec.exe
Resource
win10v2004-20241007-en
General
-
Target
cbcd03abc247042f97201be93bbf06f62ac72fbacea4a009281802d3f0d94fec.exe
-
Size
658KB
-
MD5
c3415f43ee8fe9758efc2bed5ca3a61b
-
SHA1
61de3a6a6efa71ac1b65f298268189dfdf100102
-
SHA256
cbcd03abc247042f97201be93bbf06f62ac72fbacea4a009281802d3f0d94fec
-
SHA512
148368121b5eb5945ef6fda35603336d17a7bf98e8414292f4acca57386b3b3c4c784a1c4e1b3906ac23f167166e6cf92391e086620ff2d482f8d5a5de3de522
-
SSDEEP
12288:mMroy90GScGPRH7ylsKQCbWi/d7Mp/CPGzcocltODtZ+EIZxS/WnQ76r3:CynpGJ+lLQliFAp/4orZZ+EIz+76b
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/5016-18-0x0000000004C70000-0x0000000004C8A000-memory.dmp healer behavioral1/memory/5016-20-0x0000000007250000-0x0000000007268000-memory.dmp healer behavioral1/memory/5016-22-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-48-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-46-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-45-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-42-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-41-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-38-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-36-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-34-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-32-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-30-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-28-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-26-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-24-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/5016-21-0x0000000007250000-0x0000000007262000-memory.dmp healer -
Healer family
-
Processes:
pro6381.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6381.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6381.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2488-60-0x0000000004C10000-0x0000000004C56000-memory.dmp family_redline behavioral1/memory/2488-61-0x0000000004E00000-0x0000000004E44000-memory.dmp family_redline behavioral1/memory/2488-81-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-95-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-93-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-91-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-89-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-87-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-85-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-83-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-79-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-77-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-75-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-73-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-71-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-69-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-67-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-65-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-63-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2488-62-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un610494.exepro6381.exequ2036.exepid process 1164 un610494.exe 5016 pro6381.exe 2488 qu2036.exe -
Processes:
pro6381.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6381.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6381.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cbcd03abc247042f97201be93bbf06f62ac72fbacea4a009281802d3f0d94fec.exeun610494.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cbcd03abc247042f97201be93bbf06f62ac72fbacea4a009281802d3f0d94fec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un610494.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 392 5016 WerFault.exe pro6381.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cbcd03abc247042f97201be93bbf06f62ac72fbacea4a009281802d3f0d94fec.exeun610494.exepro6381.exequ2036.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbcd03abc247042f97201be93bbf06f62ac72fbacea4a009281802d3f0d94fec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un610494.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6381.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2036.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6381.exepid process 5016 pro6381.exe 5016 pro6381.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6381.exequ2036.exedescription pid process Token: SeDebugPrivilege 5016 pro6381.exe Token: SeDebugPrivilege 2488 qu2036.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cbcd03abc247042f97201be93bbf06f62ac72fbacea4a009281802d3f0d94fec.exeun610494.exedescription pid process target process PID 4664 wrote to memory of 1164 4664 cbcd03abc247042f97201be93bbf06f62ac72fbacea4a009281802d3f0d94fec.exe un610494.exe PID 4664 wrote to memory of 1164 4664 cbcd03abc247042f97201be93bbf06f62ac72fbacea4a009281802d3f0d94fec.exe un610494.exe PID 4664 wrote to memory of 1164 4664 cbcd03abc247042f97201be93bbf06f62ac72fbacea4a009281802d3f0d94fec.exe un610494.exe PID 1164 wrote to memory of 5016 1164 un610494.exe pro6381.exe PID 1164 wrote to memory of 5016 1164 un610494.exe pro6381.exe PID 1164 wrote to memory of 5016 1164 un610494.exe pro6381.exe PID 1164 wrote to memory of 2488 1164 un610494.exe qu2036.exe PID 1164 wrote to memory of 2488 1164 un610494.exe qu2036.exe PID 1164 wrote to memory of 2488 1164 un610494.exe qu2036.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbcd03abc247042f97201be93bbf06f62ac72fbacea4a009281802d3f0d94fec.exe"C:\Users\Admin\AppData\Local\Temp\cbcd03abc247042f97201be93bbf06f62ac72fbacea4a009281802d3f0d94fec.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un610494.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un610494.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6381.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6381.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 10804⤵
- Program crash
PID:392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2036.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2036.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5016 -ip 50161⤵PID:1032
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5ac2c9730c95b88cb9df9bbaa55d9bc08
SHA1a7daeb8097399f20cebfcdb6bc9071f04055879f
SHA25690622412948e0e6fa325b88948effa3119f88abcdd83e77eb946897f8b05cd38
SHA512a3555b436283eea66a8c702a3fb7c5434e475f368cac6716dac6174c0344e913ff1ada5bb6980e6400bc1dca0c573161689ec39c88cdacb7101c75bb85f7bee3
-
Filesize
295KB
MD56a912ed0423006c477a8d6df9017c1a2
SHA1cf4e703c49419ed1345795d46df0214aaeffb774
SHA256099858c896d8fdd94e97c65b331ec62eb59214b07ccc40cba1b03b8a0237ef2e
SHA512d14a1eb9aeedc3a5d7c25d4370579aa118ab548e0a7191a0a520c8b672e02322bf6d3b72e3b93e3385596fcf0c693e1716e1512d90cf668c9bb2367318d5ec1b
-
Filesize
354KB
MD5040a7cc39e5cc0d380cd62056566d3be
SHA12d2600227b7b18e4fa5b9032d26158cbdb60b9a1
SHA256f979ef7d78c09f4fa537cc7d9abc28b7af5fce33190f1b054478947463892987
SHA512ef91431f486e694c208bc3c575259b9994753ba1f6e2f37c17051dfe58bd5376cc1440db0bb7cabfd3c72619bfe08b1cfd5a66f5b1510591496317dcf3d4eb88