Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 15:08
Static task
static1
Behavioral task
behavioral1
Sample
84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exe
Resource
win10v2004-20241007-en
General
-
Target
84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exe
-
Size
667KB
-
MD5
acaa29981003e122ef6684cc2212478d
-
SHA1
63c81db3ed8b015c400742695c0f838e2e1fc425
-
SHA256
84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467
-
SHA512
f60ce041a240454c9450713b30e6bb1d95e580ed141a0500c199ba760457612ef83123bf75e6d57d8a037f207446e87a7f49e42ebcfda51eaa814d1431e7599e
-
SSDEEP
12288:oMrzy90vVknh9MUvrqcy9W816I31CizB2vIvALWjBrUUkH/wvZGddapU6:7ycV+heUGcy9731Ci1qWALWjBrefwvZv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1984-19-0x00000000025A0000-0x00000000025BA000-memory.dmp healer behavioral1/memory/1984-21-0x0000000002940000-0x0000000002958000-memory.dmp healer behavioral1/memory/1984-25-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-49-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-47-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-45-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-44-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-41-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-39-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-37-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-36-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-33-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-31-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-29-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-27-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-23-0x0000000002940000-0x0000000002952000-memory.dmp healer behavioral1/memory/1984-22-0x0000000002940000-0x0000000002952000-memory.dmp healer -
Healer family
-
Processes:
pro3744.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3744.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4280-61-0x0000000004D80000-0x0000000004DC6000-memory.dmp family_redline behavioral1/memory/4280-62-0x00000000053F0000-0x0000000005434000-memory.dmp family_redline behavioral1/memory/4280-88-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-90-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-96-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-94-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-92-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-86-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-84-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-83-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-80-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-79-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-76-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-75-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-70-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-72-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-68-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-66-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-64-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4280-63-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un877451.exepro3744.exequ9215.exepid process 1172 un877451.exe 1984 pro3744.exe 4280 qu9215.exe -
Processes:
pro3744.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3744.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exeun877451.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un877451.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2324 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2160 1984 WerFault.exe pro3744.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exeun877451.exepro3744.exequ9215.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un877451.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3744.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9215.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro3744.exepid process 1984 pro3744.exe 1984 pro3744.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro3744.exequ9215.exedescription pid process Token: SeDebugPrivilege 1984 pro3744.exe Token: SeDebugPrivilege 4280 qu9215.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exeun877451.exedescription pid process target process PID 4220 wrote to memory of 1172 4220 84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exe un877451.exe PID 4220 wrote to memory of 1172 4220 84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exe un877451.exe PID 4220 wrote to memory of 1172 4220 84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exe un877451.exe PID 1172 wrote to memory of 1984 1172 un877451.exe pro3744.exe PID 1172 wrote to memory of 1984 1172 un877451.exe pro3744.exe PID 1172 wrote to memory of 1984 1172 un877451.exe pro3744.exe PID 1172 wrote to memory of 4280 1172 un877451.exe qu9215.exe PID 1172 wrote to memory of 4280 1172 un877451.exe qu9215.exe PID 1172 wrote to memory of 4280 1172 un877451.exe qu9215.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exe"C:\Users\Admin\AppData\Local\Temp\84c3702f49541e313fa790ad9bc6dfd8bee3479ffbf09534cf6c78d5d8208467.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un877451.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un877451.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3744.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3744.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 10804⤵
- Program crash
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9215.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9215.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1984 -ip 19841⤵PID:436
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2324
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
525KB
MD5feecae739ee93d098274b01869628df8
SHA126ed6fbb3f9d40bd3ecc1164da44b3cc8f87413a
SHA256cc1c18803efd97ae48bff9f1b9a45b70c0ef652384163b92d35834f75c84d904
SHA512d1c911990e55555884a4916dc439f0968861cc46b7cd26f5e87853eb11dbb2dfd6da7571bb1516a73b2eebe5b3205e5b7bbd74f21020b013829aa38aef6092a1
-
Filesize
294KB
MD5db7368dac801e34d5f28f1c19b74085a
SHA18c46b2ec71793c5a2bdb53da8702f7744682c298
SHA2568046b246ed41fe34495f9a134712b652b1d47df25c4bf3167140943077a7d9b2
SHA5120dc4be03ff5e0330250abdc34a2330e14618bf4eaf273aef6ff26c1315fa4d031c4e4de1308d913a04c07142a0bdd1f612cddb0073fa8a390a187737b3442b55
-
Filesize
352KB
MD590481eabc83659f6499744f71aab6307
SHA1ae447afd0bb136f92cdb2496ecb64030b9849c9c
SHA2565a760d56402f5d9dbac901a20dac618b68f64f182f6f65b2dfc06ad96e51a4d5
SHA51267dd5e039b2224cefc8512e4ad317fb1addb694f460d002c0fcf65e0613e125aeecb94d79a1d65f8b3a10c422999b2d58258f5ad861a61892b264fa25cbe3c1e