Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:32
Static task
static1
Behavioral task
behavioral1
Sample
bc8ec7e5bb8081e3a87ead99ae027f433ebf781300bdca6bf72fe18be6df95a0.exe
Resource
win10v2004-20241007-en
General
-
Target
bc8ec7e5bb8081e3a87ead99ae027f433ebf781300bdca6bf72fe18be6df95a0.exe
-
Size
658KB
-
MD5
a63ac41711133d3424e31acdefe493f6
-
SHA1
e752b76fadfc10c7406d128aebf5fb09963f8a8d
-
SHA256
bc8ec7e5bb8081e3a87ead99ae027f433ebf781300bdca6bf72fe18be6df95a0
-
SHA512
1837e99014807387ad997abe23e987951aecbbcbbd12d49fc5761886f84bbb9e0da82e62e275676291ad97f4c784cca9e92738a693279ad55225b7c9997a8083
-
SSDEEP
12288:xMrdMy90icaXi1jT0ibGKNtnv6+NnYUtecUC0o0YvStg:DyKJxycUrGvUg
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4168-17-0x0000000004A20000-0x0000000004A3A000-memory.dmp healer behavioral1/memory/4168-19-0x0000000007250000-0x0000000007268000-memory.dmp healer behavioral1/memory/4168-21-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-46-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-44-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-42-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-48-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-40-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-38-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-36-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-34-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-32-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-30-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-28-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-26-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-24-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/4168-22-0x0000000007250000-0x0000000007262000-memory.dmp healer -
Healer family
-
Processes:
pro1795.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1795.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/448-59-0x0000000004A90000-0x0000000004AD6000-memory.dmp family_redline behavioral1/memory/448-60-0x0000000007180000-0x00000000071C4000-memory.dmp family_redline behavioral1/memory/448-80-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-61-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-94-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-92-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-90-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-88-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-86-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-84-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-82-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-78-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-76-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-74-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-72-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-70-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-68-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-66-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-64-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline behavioral1/memory/448-62-0x0000000007180000-0x00000000071BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un594013.exepro1795.exequ1058.exepid process 2108 un594013.exe 4168 pro1795.exe 448 qu1058.exe -
Processes:
pro1795.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1795.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1795.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bc8ec7e5bb8081e3a87ead99ae027f433ebf781300bdca6bf72fe18be6df95a0.exeun594013.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bc8ec7e5bb8081e3a87ead99ae027f433ebf781300bdca6bf72fe18be6df95a0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un594013.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3536 4168 WerFault.exe pro1795.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bc8ec7e5bb8081e3a87ead99ae027f433ebf781300bdca6bf72fe18be6df95a0.exeun594013.exepro1795.exequ1058.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc8ec7e5bb8081e3a87ead99ae027f433ebf781300bdca6bf72fe18be6df95a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un594013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1795.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1058.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1795.exepid process 4168 pro1795.exe 4168 pro1795.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1795.exequ1058.exedescription pid process Token: SeDebugPrivilege 4168 pro1795.exe Token: SeDebugPrivilege 448 qu1058.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
bc8ec7e5bb8081e3a87ead99ae027f433ebf781300bdca6bf72fe18be6df95a0.exeun594013.exedescription pid process target process PID 2036 wrote to memory of 2108 2036 bc8ec7e5bb8081e3a87ead99ae027f433ebf781300bdca6bf72fe18be6df95a0.exe un594013.exe PID 2036 wrote to memory of 2108 2036 bc8ec7e5bb8081e3a87ead99ae027f433ebf781300bdca6bf72fe18be6df95a0.exe un594013.exe PID 2036 wrote to memory of 2108 2036 bc8ec7e5bb8081e3a87ead99ae027f433ebf781300bdca6bf72fe18be6df95a0.exe un594013.exe PID 2108 wrote to memory of 4168 2108 un594013.exe pro1795.exe PID 2108 wrote to memory of 4168 2108 un594013.exe pro1795.exe PID 2108 wrote to memory of 4168 2108 un594013.exe pro1795.exe PID 2108 wrote to memory of 448 2108 un594013.exe qu1058.exe PID 2108 wrote to memory of 448 2108 un594013.exe qu1058.exe PID 2108 wrote to memory of 448 2108 un594013.exe qu1058.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc8ec7e5bb8081e3a87ead99ae027f433ebf781300bdca6bf72fe18be6df95a0.exe"C:\Users\Admin\AppData\Local\Temp\bc8ec7e5bb8081e3a87ead99ae027f433ebf781300bdca6bf72fe18be6df95a0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un594013.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un594013.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1795.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1795.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 10804⤵
- Program crash
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1058.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1058.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4168 -ip 41681⤵PID:2972
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5222c9810ed54cf0938e0b01fde6297d0
SHA11dcd030721e8b546288e2ebc718f1ffc2f83bfcb
SHA256cdc2f47f80a10043327be705347fe662906eb178110a6010ac497f841b66bfaa
SHA5125b7d02fb17fe5a097f85f346de3eabe385ed829f85afc259602b8c0121498da133f03faf2f229282f32919cbb5987da7d8ef95a655d18e974b0b4b2b3374c865
-
Filesize
296KB
MD5b25600b21e370db65805c71374168c12
SHA11b0c8e5d335a0a4ebbe5a913846c985c2b8054b9
SHA256a999704b1a90cfd4f44e866e4841b2e9f1211507a4a3545136fedf5018d202e8
SHA5129ef8487b3e70b67b0f09889a10a8f661592fbdc09c6128f77c405b0ca3e7e9f12d1ab654ca2c10de3e9926687a090006153886bf38c2ac420fa47b5bbcf7bd78
-
Filesize
355KB
MD5ff1b4bcc4f25e1d3ef5cafb8dc51f2f5
SHA1c96dd332107459b483211edd80036507313267be
SHA2561909c18769fc591ab4ed2d468d49d3f293303d90d50b479b11ac4cd895e96b39
SHA512ba4b93cafa1129af496dfe20ac9c113d44f919d0c8559308d19b82ee24691fb7c727f19f104aca762513b572622e292e628efbe0076a9a87fca7c254abc953fc