Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:36
Static task
static1
Behavioral task
behavioral1
Sample
b0cfce19c6a326d872644ee2553633ff745a2c8713ea74981ba00b830bfb3a1a.exe
Resource
win10v2004-20241007-en
General
-
Target
b0cfce19c6a326d872644ee2553633ff745a2c8713ea74981ba00b830bfb3a1a.exe
-
Size
667KB
-
MD5
ce6b101c7b0162eb8b68a1374b6955d9
-
SHA1
c7e3e133ae8e78a6ed607a93f41a5b25934dc74e
-
SHA256
b0cfce19c6a326d872644ee2553633ff745a2c8713ea74981ba00b830bfb3a1a
-
SHA512
a0fc3581fd02262cd635ca4a3e471cb7b6f231056292d8193ba90b57369318ebb1435257d7e54871185cd5ba5fa76b86784f4c39b4c9c5314f7c2907b431b257
-
SSDEEP
12288:nMrAy904cd8qBoVoMsDyHW+OQ1PK4k5y0Mqu0rULbH/wVmyiVn7:LyVoMsD4NOSh0MqPrGfwVmJ7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4920-19-0x0000000002690000-0x00000000026AA000-memory.dmp healer behavioral1/memory/4920-21-0x0000000002700000-0x0000000002718000-memory.dmp healer behavioral1/memory/4920-23-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-49-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-47-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-45-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-43-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-41-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-39-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-37-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-35-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-33-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-31-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-29-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-27-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-25-0x0000000002700000-0x0000000002712000-memory.dmp healer behavioral1/memory/4920-22-0x0000000002700000-0x0000000002712000-memory.dmp healer -
Healer family
-
Processes:
pro9828.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9828.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9828.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3492-61-0x00000000026E0000-0x0000000002726000-memory.dmp family_redline behavioral1/memory/3492-62-0x0000000002990000-0x00000000029D4000-memory.dmp family_redline behavioral1/memory/3492-70-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-77-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-96-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-94-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-92-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-90-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-88-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-84-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-80-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-78-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-74-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-72-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-86-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-82-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-68-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-66-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-64-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3492-63-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un263835.exepro9828.exequ7442.exepid process 4040 un263835.exe 4920 pro9828.exe 3492 qu7442.exe -
Processes:
pro9828.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9828.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9828.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b0cfce19c6a326d872644ee2553633ff745a2c8713ea74981ba00b830bfb3a1a.exeun263835.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b0cfce19c6a326d872644ee2553633ff745a2c8713ea74981ba00b830bfb3a1a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un263835.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5028 4920 WerFault.exe pro9828.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b0cfce19c6a326d872644ee2553633ff745a2c8713ea74981ba00b830bfb3a1a.exeun263835.exepro9828.exequ7442.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0cfce19c6a326d872644ee2553633ff745a2c8713ea74981ba00b830bfb3a1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un263835.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7442.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9828.exepid process 4920 pro9828.exe 4920 pro9828.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9828.exequ7442.exedescription pid process Token: SeDebugPrivilege 4920 pro9828.exe Token: SeDebugPrivilege 3492 qu7442.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b0cfce19c6a326d872644ee2553633ff745a2c8713ea74981ba00b830bfb3a1a.exeun263835.exedescription pid process target process PID 3736 wrote to memory of 4040 3736 b0cfce19c6a326d872644ee2553633ff745a2c8713ea74981ba00b830bfb3a1a.exe un263835.exe PID 3736 wrote to memory of 4040 3736 b0cfce19c6a326d872644ee2553633ff745a2c8713ea74981ba00b830bfb3a1a.exe un263835.exe PID 3736 wrote to memory of 4040 3736 b0cfce19c6a326d872644ee2553633ff745a2c8713ea74981ba00b830bfb3a1a.exe un263835.exe PID 4040 wrote to memory of 4920 4040 un263835.exe pro9828.exe PID 4040 wrote to memory of 4920 4040 un263835.exe pro9828.exe PID 4040 wrote to memory of 4920 4040 un263835.exe pro9828.exe PID 4040 wrote to memory of 3492 4040 un263835.exe qu7442.exe PID 4040 wrote to memory of 3492 4040 un263835.exe qu7442.exe PID 4040 wrote to memory of 3492 4040 un263835.exe qu7442.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0cfce19c6a326d872644ee2553633ff745a2c8713ea74981ba00b830bfb3a1a.exe"C:\Users\Admin\AppData\Local\Temp\b0cfce19c6a326d872644ee2553633ff745a2c8713ea74981ba00b830bfb3a1a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un263835.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un263835.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9828.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9828.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 10364⤵
- Program crash
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7442.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7442.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4920 -ip 49201⤵PID:5044
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
525KB
MD588a59a016afac3fe44ab49e6c45a5369
SHA19e83782badedda9078376174cebd76e219b779dd
SHA25643bb359cde30d8b3328eb2d0a9d9cb7efbdbc906b356fad02a5928e16b5b7636
SHA512d019761dc4f798c70fca45a4e7ff2bf0c7053b0817b49935eaebac8fbbb9497b56e6a76e83a18248cfd64493376e527f6f9fb071ecd00fb02ef6bdb0e076c49c
-
Filesize
294KB
MD557ef181eae8b1e125e981eff8640fbd6
SHA1e8ff1a360fc9892c5971200352a142c7ba939995
SHA256dcfbec6ad1804856062955e15ae291ace276a52b1828558096ffe6e699e4cc09
SHA5124fc221aa7d69011a27a89c3e0d58d1044274125757e4cf88d6355a718bf36bdfeb4f8ae7d37b0bf2bbef951fc200e9ac2c637c6c817455950ed50b44a4a61d34
-
Filesize
352KB
MD5d42cce3bbeb3396f906f323dcef97849
SHA15a88c335fffe7b705323ac410bfeb0118df3aa16
SHA256ebda1d6cb4a2376ab04847fefd7076da495ca251f6aa09610eb7e28854db2138
SHA512b791480c301b7c24fdc51b33f5801927db27e743144db4895dbfa91b66e010bdbc0eeb97e5a4a43dea89462a06d9a8b6f0474da0a097a65096db4d7750c9fd19