Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exe
Resource
win10v2004-20241007-en
General
-
Target
f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exe
-
Size
694KB
-
MD5
2ffd2c00d39ff9c7985070760ffcb848
-
SHA1
2504978caf38bebfd5ec4ae9a4f60fa8411464e4
-
SHA256
f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174
-
SHA512
fdb9f64fa443907456c96034a2cb58b34a827871e0a9a89da8ef55b39644c4b071db9da18df597037614d415985c5656a82b000722ea04c303392f846f426ba1
-
SSDEEP
12288:SMrOy90LnUOiHXmHG0MENKXyaDzoq3qX+CTP5pV2ElZAipuTXA4ApmUU21PA:syInUN3mHjMgKXyOU//TPjjlRuDAHmU2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1652-18-0x0000000004970000-0x000000000498A000-memory.dmp healer behavioral1/memory/1652-20-0x0000000004D70000-0x0000000004D88000-memory.dmp healer behavioral1/memory/1652-24-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-46-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-45-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-42-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-40-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-38-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-36-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-34-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-32-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-48-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-30-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-28-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-26-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-21-0x0000000004D70000-0x0000000004D82000-memory.dmp healer behavioral1/memory/1652-22-0x0000000004D70000-0x0000000004D82000-memory.dmp healer -
Healer family
-
Processes:
pro8785.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8785.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8785.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4356-60-0x00000000048E0000-0x0000000004926000-memory.dmp family_redline behavioral1/memory/4356-61-0x0000000007780000-0x00000000077C4000-memory.dmp family_redline behavioral1/memory/4356-93-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-95-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-91-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-89-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-87-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-85-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-83-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-79-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-77-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-75-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-73-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-72-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-69-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-67-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-81-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-65-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-63-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline behavioral1/memory/4356-62-0x0000000007780000-0x00000000077BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un888051.exepro8785.exequ7684.exepid process 1456 un888051.exe 1652 pro8785.exe 4356 qu7684.exe -
Processes:
pro8785.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8785.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exeun888051.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un888051.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1284 1652 WerFault.exe pro8785.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exeun888051.exepro8785.exequ7684.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un888051.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8785.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7684.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8785.exepid process 1652 pro8785.exe 1652 pro8785.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8785.exequ7684.exedescription pid process Token: SeDebugPrivilege 1652 pro8785.exe Token: SeDebugPrivilege 4356 qu7684.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exeun888051.exedescription pid process target process PID 2240 wrote to memory of 1456 2240 f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exe un888051.exe PID 2240 wrote to memory of 1456 2240 f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exe un888051.exe PID 2240 wrote to memory of 1456 2240 f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exe un888051.exe PID 1456 wrote to memory of 1652 1456 un888051.exe pro8785.exe PID 1456 wrote to memory of 1652 1456 un888051.exe pro8785.exe PID 1456 wrote to memory of 1652 1456 un888051.exe pro8785.exe PID 1456 wrote to memory of 4356 1456 un888051.exe qu7684.exe PID 1456 wrote to memory of 4356 1456 un888051.exe qu7684.exe PID 1456 wrote to memory of 4356 1456 un888051.exe qu7684.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exe"C:\Users\Admin\AppData\Local\Temp\f9c6179c09ccf27ad1cfebf541a4fe5455acf12046ab425facabaf8c6d9a5174.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un888051.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un888051.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8785.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8785.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 10844⤵
- Program crash
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7684.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7684.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1652 -ip 16521⤵PID:4004
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD5a63901664b1d837362e076d9a11c326f
SHA12541a07fbd3dfc45b578783360070bb84a7ffdca
SHA256605975c49b89b5a5ec4498aaadd9108fcbd2f2b3d1117e2b3d1baaf68ea12676
SHA5120705d8a94a168b6e70f9c67c54859f420811cbcc701ddf65188be2391d84dd8e34e183a1f62c32cb300e5dd6e553fad97f3b619d42321cae4d0dab261c10b73d
-
Filesize
347KB
MD5c7387b4b9aa767d4adfa724eb0b8caba
SHA19f7f08a9d235bec0ee4a06b7a9fa065430f2b99b
SHA25669c87fd054d67b05d7f60730e7cedc0c8bafbb6f30abc4f275d8d3fcf7ef4cc4
SHA5129f9410e4ad61dfacc99d2c15e5607f688c2cdf5a54fbba122d905f6c33cb7df07bc6154d5ae33dbe000118e791f9a1b0b4ad97fbf99db3eb9122374573122186
-
Filesize
405KB
MD5074a00cc38d027686586d49e56774fae
SHA160a21c98c7a98c902f6a42fb7378ff70552cfe68
SHA256929b82cca68fc9a6388095a31d96d581a1705778e18567f02d31126d647dbe15
SHA51214816622eb96ce1d48c7cef34fbc4efed715733890e1bf1836f87f1ab69811a646dcf7e84e968650bc97b54239634c0581adc0b39c5b5b77495eded5fb772f1d