Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 12:53
Static task
static1
Behavioral task
behavioral1
Sample
1a58140777a7ad6afd925a328cef7203b8e7a7c7060c3e9c6aea27651d901c68.exe
Resource
win10v2004-20241007-en
General
-
Target
1a58140777a7ad6afd925a328cef7203b8e7a7c7060c3e9c6aea27651d901c68.exe
-
Size
696KB
-
MD5
aa0cb1d35fa31ac9c37df55e99116eef
-
SHA1
1e7f76370b34d871c887770c7d9ce882bccc25d3
-
SHA256
1a58140777a7ad6afd925a328cef7203b8e7a7c7060c3e9c6aea27651d901c68
-
SHA512
0e00fbe6b119863239bf2ace5a6e2da0321f19b69d2ec53ca138e40e894d093a47904dc0b1438917eb1ef68586f5e296c3e632ab1c6b1edc614a0d79c1320d84
-
SSDEEP
12288:iMryy90SGw6cuAah2Ze3NlNNXZz69/CY6CxmLGZrRbDDRbkdJ8:gytGw6cta2c9lN5Zz6ZVRKdm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1428-18-0x0000000002F00000-0x0000000002F1A000-memory.dmp healer behavioral1/memory/1428-20-0x0000000007280000-0x0000000007298000-memory.dmp healer behavioral1/memory/1428-21-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-48-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-46-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-44-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-42-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-40-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-38-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-37-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-34-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-32-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-30-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-28-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-27-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-24-0x0000000007280000-0x0000000007292000-memory.dmp healer behavioral1/memory/1428-22-0x0000000007280000-0x0000000007292000-memory.dmp healer -
Healer family
-
Processes:
pro0683.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0683.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1280-60-0x0000000004C50000-0x0000000004C96000-memory.dmp family_redline behavioral1/memory/1280-61-0x0000000007740000-0x0000000007784000-memory.dmp family_redline behavioral1/memory/1280-75-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-83-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-95-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-93-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-91-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-89-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-87-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-85-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-81-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-77-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-73-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-71-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-69-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-67-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-65-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-63-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-62-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1280-79-0x0000000007740000-0x000000000777F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un162480.exepro0683.exequ3620.exepid process 1752 un162480.exe 1428 pro0683.exe 1280 qu3620.exe -
Processes:
pro0683.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0683.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0683.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1a58140777a7ad6afd925a328cef7203b8e7a7c7060c3e9c6aea27651d901c68.exeun162480.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a58140777a7ad6afd925a328cef7203b8e7a7c7060c3e9c6aea27651d901c68.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un162480.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2968 1428 WerFault.exe pro0683.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1a58140777a7ad6afd925a328cef7203b8e7a7c7060c3e9c6aea27651d901c68.exeun162480.exepro0683.exequ3620.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a58140777a7ad6afd925a328cef7203b8e7a7c7060c3e9c6aea27651d901c68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un162480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0683.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3620.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0683.exepid process 1428 pro0683.exe 1428 pro0683.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0683.exequ3620.exedescription pid process Token: SeDebugPrivilege 1428 pro0683.exe Token: SeDebugPrivilege 1280 qu3620.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1a58140777a7ad6afd925a328cef7203b8e7a7c7060c3e9c6aea27651d901c68.exeun162480.exedescription pid process target process PID 1388 wrote to memory of 1752 1388 1a58140777a7ad6afd925a328cef7203b8e7a7c7060c3e9c6aea27651d901c68.exe un162480.exe PID 1388 wrote to memory of 1752 1388 1a58140777a7ad6afd925a328cef7203b8e7a7c7060c3e9c6aea27651d901c68.exe un162480.exe PID 1388 wrote to memory of 1752 1388 1a58140777a7ad6afd925a328cef7203b8e7a7c7060c3e9c6aea27651d901c68.exe un162480.exe PID 1752 wrote to memory of 1428 1752 un162480.exe pro0683.exe PID 1752 wrote to memory of 1428 1752 un162480.exe pro0683.exe PID 1752 wrote to memory of 1428 1752 un162480.exe pro0683.exe PID 1752 wrote to memory of 1280 1752 un162480.exe qu3620.exe PID 1752 wrote to memory of 1280 1752 un162480.exe qu3620.exe PID 1752 wrote to memory of 1280 1752 un162480.exe qu3620.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a58140777a7ad6afd925a328cef7203b8e7a7c7060c3e9c6aea27651d901c68.exe"C:\Users\Admin\AppData\Local\Temp\1a58140777a7ad6afd925a328cef7203b8e7a7c7060c3e9c6aea27651d901c68.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un162480.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un162480.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0683.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0683.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 10764⤵
- Program crash
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3620.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3620.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1428 -ip 14281⤵PID:2248
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
554KB
MD5e6861e0666085415e38efe2b9b10f294
SHA1b53c7fa834fc7c3a31cc5228cd27a486241da38a
SHA25696acdec417568977fd1721f7b8b66d2fb2d3d2df692044dd2c26ec59bdac827e
SHA512aec36fb511af25a0e37af901e106375e6c5c9e605a56f07dd3201becae5cbaa880d6a31f83d7bc2a5e0349d4eb4ca23fe3bc2a9d723b23189a214f916ba421ab
-
Filesize
345KB
MD57a78c5514c3e683bb723ecd0cf0919f5
SHA18cf393e2004a1ba1e0b650cedb8badc63fa1df8e
SHA256743235be1ef74a653d5d0b5e4224ff2f5113d83ade5fc98e8d2faa1f6242d9c2
SHA512ca0d4e768031bd6b5813bd867f9d26567630f6f0e5af130daea9f3fceaa2201a9b838e238050286a16975fc57569bbc3853fa7469e1e2a5498600fd2c624ffd6
-
Filesize
403KB
MD5deadd62afc425205d18ad869dce35da1
SHA19f6921047dad881c87c1cec51ef561446ecabd03
SHA256ae1796af5d8963d71ae578aa88c0546abd6a65b16e49793d14b275c59f6bedb3
SHA5121bf98d26f3e8d8549633f90f8d5dd96235b557b9fd7bf130d4293d23166ec1c75a8dab6bfff2c65131ac62a3148bf562790faa40f7360c8a4a04d2aef26dddb1