Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 12:30
Static task
static1
Behavioral task
behavioral1
Sample
40dccf55be3eb74c7a152e1669936e547697862b2087f8dad7e765285e5c82ce.exe
Resource
win10v2004-20241007-en
General
-
Target
40dccf55be3eb74c7a152e1669936e547697862b2087f8dad7e765285e5c82ce.exe
-
Size
659KB
-
MD5
ef4daaadb7d1317a20b36ac1d1379eca
-
SHA1
d29c43d2a80d3a2c052b5cd0078cd2bae26e3832
-
SHA256
40dccf55be3eb74c7a152e1669936e547697862b2087f8dad7e765285e5c82ce
-
SHA512
2a6e3ca9b06c70d171b7c890372b9c5d46d672bcc8962aa149e0ed62c285e062681d94bb2d58077bfc6bc179472ec974636bd71ea9a3b9e23b7c51f0043e1812
-
SSDEEP
12288:uMr0y90kTmMgOBdO24OvevRxE1Cof5K/a/wmjbh8WpY:OyNuOBcOmpxE1DAXmjbWWC
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2572-19-0x0000000002420000-0x000000000243A000-memory.dmp healer behavioral1/memory/2572-21-0x0000000004B40000-0x0000000004B58000-memory.dmp healer behavioral1/memory/2572-22-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-39-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-49-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-47-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-45-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-43-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-42-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-37-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-35-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-33-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-31-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-29-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-27-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-25-0x0000000004B40000-0x0000000004B52000-memory.dmp healer behavioral1/memory/2572-23-0x0000000004B40000-0x0000000004B52000-memory.dmp healer -
Healer family
-
Processes:
pro2232.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2232.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1556-61-0x00000000024D0000-0x0000000002516000-memory.dmp family_redline behavioral1/memory/1556-62-0x00000000027D0000-0x0000000002814000-memory.dmp family_redline behavioral1/memory/1556-84-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-90-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-96-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-94-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-92-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-88-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-86-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-82-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-80-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-78-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-77-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-72-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-70-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-68-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-74-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-66-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-64-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline behavioral1/memory/1556-63-0x00000000027D0000-0x000000000280F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un474998.exepro2232.exequ8290.exepid process 4088 un474998.exe 2572 pro2232.exe 1556 qu8290.exe -
Processes:
pro2232.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2232.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2232.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un474998.exe40dccf55be3eb74c7a152e1669936e547697862b2087f8dad7e765285e5c82ce.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un474998.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 40dccf55be3eb74c7a152e1669936e547697862b2087f8dad7e765285e5c82ce.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4468 2572 WerFault.exe pro2232.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro2232.exequ8290.exe40dccf55be3eb74c7a152e1669936e547697862b2087f8dad7e765285e5c82ce.exeun474998.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2232.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8290.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40dccf55be3eb74c7a152e1669936e547697862b2087f8dad7e765285e5c82ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un474998.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro2232.exepid process 2572 pro2232.exe 2572 pro2232.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro2232.exequ8290.exedescription pid process Token: SeDebugPrivilege 2572 pro2232.exe Token: SeDebugPrivilege 1556 qu8290.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
40dccf55be3eb74c7a152e1669936e547697862b2087f8dad7e765285e5c82ce.exeun474998.exedescription pid process target process PID 4936 wrote to memory of 4088 4936 40dccf55be3eb74c7a152e1669936e547697862b2087f8dad7e765285e5c82ce.exe un474998.exe PID 4936 wrote to memory of 4088 4936 40dccf55be3eb74c7a152e1669936e547697862b2087f8dad7e765285e5c82ce.exe un474998.exe PID 4936 wrote to memory of 4088 4936 40dccf55be3eb74c7a152e1669936e547697862b2087f8dad7e765285e5c82ce.exe un474998.exe PID 4088 wrote to memory of 2572 4088 un474998.exe pro2232.exe PID 4088 wrote to memory of 2572 4088 un474998.exe pro2232.exe PID 4088 wrote to memory of 2572 4088 un474998.exe pro2232.exe PID 4088 wrote to memory of 1556 4088 un474998.exe qu8290.exe PID 4088 wrote to memory of 1556 4088 un474998.exe qu8290.exe PID 4088 wrote to memory of 1556 4088 un474998.exe qu8290.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\40dccf55be3eb74c7a152e1669936e547697862b2087f8dad7e765285e5c82ce.exe"C:\Users\Admin\AppData\Local\Temp\40dccf55be3eb74c7a152e1669936e547697862b2087f8dad7e765285e5c82ce.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un474998.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un474998.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2232.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2232.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 10924⤵
- Program crash
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8290.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8290.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1556
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2572 -ip 25721⤵PID:2360
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD5a4192eeca290f66dc0509ead4fe08a0d
SHA19fbafe7cd82febbcc72e31703c81be944b350ef0
SHA256532462cf39e08a864f93e9066955df44263730199687a637ec37d19633275b00
SHA512aebdadc00ccc0f687e1c8d4858f2e50a749b3ae018ba011782a934e4626f1b01de10e26e7aa9de1d19be2e391b5c03daff4d21038b3c6c2d00b7488a67b3924f
-
Filesize
376KB
MD52c312a231f6473244fd67a2820b72200
SHA11d196471a9b66ac86c73607411c6a16049dc81b9
SHA2568fa267ba1802f6b5c2ee4d65e89b34f8fbe8c874679a83ca54a0d9a032193b23
SHA512e4d16a8655602a8c966e543bba727d675448626cad44c6e9ad7c053c799f63dd5637831771ebc2f537601fbd09387fc0bb8a37f9b7acbb37ccd0a300ddd17559
-
Filesize
434KB
MD59498acbb3818856c2628280a0cfe2ad1
SHA1fbc44b097a336e760f474e4d34db6da115d08b15
SHA2563c266d97ba12c708f23e02144cd80ac70f0e7511db0e3d30059ffbeccb246106
SHA51255c7a0caab77bb31c445062e198c8caed6087bd97021de6114916688916fd5e16e2b8f1f053de74fb2ee7bf29e93353b0db3b1198b1c7157fbd69e0002d6bd58