Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:51
Static task
static1
Behavioral task
behavioral1
Sample
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exe
Resource
win10v2004-20241007-en
General
-
Target
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exe
-
Size
666KB
-
MD5
e879691309289faacbd504ff59710bd5
-
SHA1
1964a5ce2f610a87a9e9715fd1e045d20999e4fe
-
SHA256
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61
-
SHA512
fbc35127224800b7cf411d62d2b9db23559fe7a7fdddff4fa8bf9ee50ce304d081541cf692635acf50a9ca617dc88058880fd6816d0356b7b73537ff076637b6
-
SSDEEP
12288:YMrmy90i6lwAsnTNjNuUXE6i7mKrH4TSapjOhhrUqjH/wBBrL04V:uy56CLnTGUjrKrH4TihhrDfwBBrLf
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2092-19-0x0000000000BB0000-0x0000000000BCA000-memory.dmp healer behavioral1/memory/2092-21-0x0000000002870000-0x0000000002888000-memory.dmp healer behavioral1/memory/2092-27-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-47-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-46-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-43-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-41-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-39-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-37-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-35-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-33-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-49-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-31-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-29-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-25-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-23-0x0000000002870000-0x0000000002882000-memory.dmp healer behavioral1/memory/2092-22-0x0000000002870000-0x0000000002882000-memory.dmp healer -
Healer family
-
Processes:
pro0175.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0175.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/748-61-0x0000000002810000-0x0000000002856000-memory.dmp family_redline behavioral1/memory/748-62-0x00000000053A0000-0x00000000053E4000-memory.dmp family_redline behavioral1/memory/748-70-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-76-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-96-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-95-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-90-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-88-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-86-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-84-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-82-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-80-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-78-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-74-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-72-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-68-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-92-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-66-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-64-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/748-63-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un875974.exepro0175.exequ5523.exepid process 1132 un875974.exe 2092 pro0175.exe 748 qu5523.exe -
Processes:
pro0175.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0175.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exeun875974.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un875974.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 228 2092 WerFault.exe pro0175.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exeun875974.exepro0175.exequ5523.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un875974.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0175.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5523.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0175.exepid process 2092 pro0175.exe 2092 pro0175.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0175.exequ5523.exedescription pid process Token: SeDebugPrivilege 2092 pro0175.exe Token: SeDebugPrivilege 748 qu5523.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exeun875974.exedescription pid process target process PID 2424 wrote to memory of 1132 2424 76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exe un875974.exe PID 2424 wrote to memory of 1132 2424 76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exe un875974.exe PID 2424 wrote to memory of 1132 2424 76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exe un875974.exe PID 1132 wrote to memory of 2092 1132 un875974.exe pro0175.exe PID 1132 wrote to memory of 2092 1132 un875974.exe pro0175.exe PID 1132 wrote to memory of 2092 1132 un875974.exe pro0175.exe PID 1132 wrote to memory of 748 1132 un875974.exe qu5523.exe PID 1132 wrote to memory of 748 1132 un875974.exe qu5523.exe PID 1132 wrote to memory of 748 1132 un875974.exe qu5523.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exe"C:\Users\Admin\AppData\Local\Temp\76c155a65cb3419e3f013dda0af38035e8e701d4cdbeb8777396f55970a81c61.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875974.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875974.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0175.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0175.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 10844⤵
- Program crash
PID:228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5523.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5523.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2092 -ip 20921⤵PID:2248
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
525KB
MD59c2ac523a3c27433a6885ea0ea780374
SHA1938262cd7f160f88dd30e3c5614ca0f04bbd3905
SHA256f3f72d5cb91d1d88a595a6aebd34e092cb59c0fb42b51028c832322bf63fca84
SHA51225b0b203897b93f7942ffcfeb6bb64775c241c285d4809dc5b051a6fc8d01ebbe2a962fe641e35327020e16e9c2f7f2bbbce46a85ceb97a5fbd506d74ee90ccd
-
Filesize
294KB
MD5e9e254687a0925fef7ed1d6b4afccaa0
SHA167bfc8b22f6ced8f95dd8fdd2dba108fcf758fd6
SHA256d568827d60388919a0d4335b3fb597eaf9b6b5388d525fa2b1f59532b531e5a0
SHA512b07fb4c02fd9a8f08b4450e0a66f67021f59622abd08cc792f9007d6697f369d085af7c245b87d07613fca976c2bef844cbbdf2a8c774e820fec8045cbe59f40
-
Filesize
352KB
MD559204c9a5e66cfc24341dae38c68d561
SHA1fe16df7c67c9c658c3ae7812d70fb97451c9f0cb
SHA25685e82cf370a1928d8031ab0b98a5a9c2c2a32e4d81288c8e71bed8792945f72e
SHA512f0f92c1ea563f852c34622553543a477e9b269c1a9d16c9393204b986e13161f55637d3739f42db033aaf5c5e5d1111f0d205312371bfb17d2e0d064d80362de