Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exe
Resource
win10v2004-20241007-en
General
-
Target
7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exe
-
Size
683KB
-
MD5
cbc420afb49fe68118037457c4bab420
-
SHA1
5f0270b581f988c1337eb622255a9d34bb5e6ac4
-
SHA256
7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4
-
SHA512
1741c88b0a8949a6c4d6e0dac98d6ceb102718b6ac7ff7cd67258c584e2e84ea5f6eecc0652a794669536a6460c8944f17145ee94559cc4b1b5d3dadcd34e793
-
SSDEEP
12288:EMrwy9032j3Z/WMS5laOe3qH9XG7OUyhmZL3donhiy:kyJLBS5TMqJnXmZLgR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/756-18-0x00000000047F0000-0x000000000480A000-memory.dmp healer behavioral1/memory/756-20-0x00000000076D0000-0x00000000076E8000-memory.dmp healer behavioral1/memory/756-32-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-34-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-48-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-46-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-44-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-42-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-40-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-38-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-36-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-30-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-24-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-22-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-21-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-29-0x00000000076D0000-0x00000000076E2000-memory.dmp healer behavioral1/memory/756-26-0x00000000076D0000-0x00000000076E2000-memory.dmp healer -
Healer family
-
Processes:
pro6677.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6677.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6677.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3724-60-0x0000000004990000-0x00000000049D6000-memory.dmp family_redline behavioral1/memory/3724-61-0x0000000007170000-0x00000000071B4000-memory.dmp family_redline behavioral1/memory/3724-79-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-83-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-77-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-75-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-73-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-71-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-69-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-67-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-65-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-63-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-62-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-95-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-93-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-91-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-89-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-87-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-85-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/3724-81-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un954343.exepro6677.exequ9395.exepid process 3448 un954343.exe 756 pro6677.exe 3724 qu9395.exe -
Processes:
pro6677.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6677.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6677.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exeun954343.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un954343.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2024 756 WerFault.exe pro6677.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exeun954343.exepro6677.exequ9395.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un954343.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6677.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9395.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6677.exepid process 756 pro6677.exe 756 pro6677.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6677.exequ9395.exedescription pid process Token: SeDebugPrivilege 756 pro6677.exe Token: SeDebugPrivilege 3724 qu9395.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exeun954343.exedescription pid process target process PID 3512 wrote to memory of 3448 3512 7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exe un954343.exe PID 3512 wrote to memory of 3448 3512 7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exe un954343.exe PID 3512 wrote to memory of 3448 3512 7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exe un954343.exe PID 3448 wrote to memory of 756 3448 un954343.exe pro6677.exe PID 3448 wrote to memory of 756 3448 un954343.exe pro6677.exe PID 3448 wrote to memory of 756 3448 un954343.exe pro6677.exe PID 3448 wrote to memory of 3724 3448 un954343.exe qu9395.exe PID 3448 wrote to memory of 3724 3448 un954343.exe qu9395.exe PID 3448 wrote to memory of 3724 3448 un954343.exe qu9395.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exe"C:\Users\Admin\AppData\Local\Temp\7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954343.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954343.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6677.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6677.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 10804⤵
- Program crash
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9395.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9395.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 756 -ip 7561⤵PID:4084
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
541KB
MD538ae4095c8285b8f29b6a0f8c96d0193
SHA1055924e61b06dff3edb02549656240a86af29fea
SHA2569e0e813a3594bb0beadb27ec34acaf91560a6b425eb0b83e4ee9c03f78aaed2d
SHA5120ef43093a10a0f5706b52cb4bf05ac50a35f4bd26f9fef8d93c57a54003da00a83c32243750380e79cd2d14da0c76bd1cd557a1a96c9950cdc4f163e54ad02f5
-
Filesize
321KB
MD577ba075ceb54646e10bceb44c18b3673
SHA140319ec69792a1fbd5cb6740f77f9a57cbaedaa4
SHA256cba74279c090bb07d7b8e55d29edf152d609cee5808759fa5929e912f4b779fb
SHA51284987ff1c4e1a653aecadf9ce8c871dd22a8db8853dd6d25ee15469567e9d87d242f9cea32074c687a716132afe16c404af50f6972a139bc9791d1d53a9efb25
-
Filesize
380KB
MD51f42c790f5d9bfd64e7211cc0a62a2d6
SHA1f4d7b327db39619481ec3ccadaf1f768a75aac3d
SHA256f8b19277008a70bff0ab1dc736851f3e3589eea4453d9f68a942407b8ca233dd
SHA512c6ef1ffdd98799ffa71dcad878d3c6a982aceef8273368ec5dbecb4f720532b9c7253aa95a06d1bafb8995be51d7e635ad1a89ae217d5903d1f49eaed692fc19