Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
55cdc3f09b8857596a936072ddf9f0f98b7b2f12072e79ad405209243e5cb7b6.exe
Resource
win10v2004-20241007-en
General
-
Target
55cdc3f09b8857596a936072ddf9f0f98b7b2f12072e79ad405209243e5cb7b6.exe
-
Size
666KB
-
MD5
27a0eb091f6f92dbfbc0b756e931f422
-
SHA1
7e14d23c0abb337b3d00ac7c8aff99ed316f6b59
-
SHA256
55cdc3f09b8857596a936072ddf9f0f98b7b2f12072e79ad405209243e5cb7b6
-
SHA512
30acf2aa89b1ba36abf54bbfee911546f19fba9c2363d55340163b270f78b1f25626373f8e23ee0f5573b593c732d388cb2e72eccb0bff2d347d164ed65c9d23
-
SSDEEP
12288:KMrcy901ZKiUiLLrAB3+40JNIwR8KCWybW0hqaJrU8RC/wCkHQCKeTX:SyRyLLGO4m5nfG1rTcwC8KKX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1272-19-0x0000000002570000-0x000000000258A000-memory.dmp healer behavioral1/memory/1272-21-0x0000000005350000-0x0000000005368000-memory.dmp healer behavioral1/memory/1272-22-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-49-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-47-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-45-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-43-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-41-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-39-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-37-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-36-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-33-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-31-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-29-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-27-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-26-0x0000000005350000-0x0000000005362000-memory.dmp healer behavioral1/memory/1272-23-0x0000000005350000-0x0000000005362000-memory.dmp healer -
Healer family
-
Processes:
pro3586.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3586.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3586.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3586.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3586.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3586.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3586.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/5056-61-0x00000000027C0000-0x0000000002806000-memory.dmp family_redline behavioral1/memory/5056-62-0x00000000029E0000-0x0000000002A24000-memory.dmp family_redline behavioral1/memory/5056-68-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-64-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-63-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-96-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-94-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-92-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-90-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-88-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-86-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-84-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-82-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-80-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-78-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-76-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-74-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-72-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-70-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/5056-66-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un504814.exepro3586.exequ5129.exepid process 4880 un504814.exe 1272 pro3586.exe 5056 qu5129.exe -
Processes:
pro3586.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3586.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3586.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
55cdc3f09b8857596a936072ddf9f0f98b7b2f12072e79ad405209243e5cb7b6.exeun504814.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55cdc3f09b8857596a936072ddf9f0f98b7b2f12072e79ad405209243e5cb7b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un504814.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4764 1272 WerFault.exe pro3586.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un504814.exepro3586.exequ5129.exe55cdc3f09b8857596a936072ddf9f0f98b7b2f12072e79ad405209243e5cb7b6.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un504814.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3586.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5129.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55cdc3f09b8857596a936072ddf9f0f98b7b2f12072e79ad405209243e5cb7b6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro3586.exepid process 1272 pro3586.exe 1272 pro3586.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro3586.exequ5129.exedescription pid process Token: SeDebugPrivilege 1272 pro3586.exe Token: SeDebugPrivilege 5056 qu5129.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
55cdc3f09b8857596a936072ddf9f0f98b7b2f12072e79ad405209243e5cb7b6.exeun504814.exedescription pid process target process PID 4160 wrote to memory of 4880 4160 55cdc3f09b8857596a936072ddf9f0f98b7b2f12072e79ad405209243e5cb7b6.exe un504814.exe PID 4160 wrote to memory of 4880 4160 55cdc3f09b8857596a936072ddf9f0f98b7b2f12072e79ad405209243e5cb7b6.exe un504814.exe PID 4160 wrote to memory of 4880 4160 55cdc3f09b8857596a936072ddf9f0f98b7b2f12072e79ad405209243e5cb7b6.exe un504814.exe PID 4880 wrote to memory of 1272 4880 un504814.exe pro3586.exe PID 4880 wrote to memory of 1272 4880 un504814.exe pro3586.exe PID 4880 wrote to memory of 1272 4880 un504814.exe pro3586.exe PID 4880 wrote to memory of 5056 4880 un504814.exe qu5129.exe PID 4880 wrote to memory of 5056 4880 un504814.exe qu5129.exe PID 4880 wrote to memory of 5056 4880 un504814.exe qu5129.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55cdc3f09b8857596a936072ddf9f0f98b7b2f12072e79ad405209243e5cb7b6.exe"C:\Users\Admin\AppData\Local\Temp\55cdc3f09b8857596a936072ddf9f0f98b7b2f12072e79ad405209243e5cb7b6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un504814.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un504814.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3586.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3586.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 10964⤵
- Program crash
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5129.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5129.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1272 -ip 12721⤵PID:4128
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD51d1935c30e31a1729eb6e48151aa1daf
SHA1534e1fe56db0e9b24ee1d38f954515d711cc0743
SHA256b1e95ffd9e5ce3855c3409da973af39a752ad923dcfb88fa1b23e74be6d8c08a
SHA5127f415aeb5630268f47d50433032c3ca7befa7fb515b330976ff5f14983d1e51e6dd5ebdbcd4361270488817bf7ed1eeb81e0edb85655aefbb84d9e14e699590b
-
Filesize
294KB
MD545613573fefb80d096e8e853669e3f3f
SHA1157d86be81161bd0cb30c1573d46351ab06f2d4b
SHA256c1d993bf971fab344226d9258ac2d83dea5b50a535ef77f56986cf9640835023
SHA51292d05c6d6d618545549ffba51ccc2c05901009bba7c9191b14e39476ccf3d21456c6b14b7cdeceae7f42714af28b81177adfb82817b289d62519235c2add70df
-
Filesize
352KB
MD578fa00afab507e414aab8948212955b8
SHA1d3ec9e6bdf7b3b1fda480ae2892c8604352611de
SHA256a1ab6e579493453ed6557247d78a9f8eb0a8adbd5dc0ca21209d009346f10eb3
SHA512afab2bcb944c0544f76384e88362d38e0737759c58875d8a13108b84151bc35fbd849b46b33ca85743dff6f45067a77f825c6d58c175176a062fce78a22c9f36