Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 15:13
Static task
static1
Behavioral task
behavioral1
Sample
1a210d6ce4af00421a9738b5b35097b7e6a06731962fcd8fccfda487fa992d3e.exe
Resource
win10v2004-20241007-en
General
-
Target
1a210d6ce4af00421a9738b5b35097b7e6a06731962fcd8fccfda487fa992d3e.exe
-
Size
658KB
-
MD5
4374c9af21a55aadbf78dc43b073f465
-
SHA1
3a5aecb3e81b5d80a26b6730c8c595717bc7b824
-
SHA256
1a210d6ce4af00421a9738b5b35097b7e6a06731962fcd8fccfda487fa992d3e
-
SHA512
8b600ef0a56ba43e830216efd134f991c7134a41e18b035edb8f9cbfa06124d9666a29604585547313a3b02adeab1e6aeb9b408502b13cb38fd450b61990ceda
-
SSDEEP
12288:kMrvy90Bguc5blt4u0pqQe7/0oFwvIxaGcpzwgk+ti:LyNNl5hN7/0vIOz3zti
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1416-17-0x0000000004C00000-0x0000000004C1A000-memory.dmp healer behavioral1/memory/1416-19-0x00000000076E0000-0x00000000076F8000-memory.dmp healer behavioral1/memory/1416-38-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-48-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-46-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-44-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-42-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-40-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-36-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-34-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-32-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-30-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-28-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-26-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-24-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-22-0x00000000076E0000-0x00000000076F2000-memory.dmp healer behavioral1/memory/1416-21-0x00000000076E0000-0x00000000076F2000-memory.dmp healer -
Healer family
-
Processes:
pro1789.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1789.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/3612-59-0x0000000004B60000-0x0000000004BA6000-memory.dmp family_redline behavioral1/memory/3612-60-0x0000000007760000-0x00000000077A4000-memory.dmp family_redline behavioral1/memory/3612-66-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-76-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-92-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-90-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-86-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-84-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-82-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-80-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-79-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-74-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-72-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-70-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-68-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-94-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-88-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-64-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-62-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3612-61-0x0000000007760000-0x000000000779F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un973453.exepro1789.exequ9856.exepid process 5020 un973453.exe 1416 pro1789.exe 3612 qu9856.exe -
Processes:
pro1789.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1789.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1a210d6ce4af00421a9738b5b35097b7e6a06731962fcd8fccfda487fa992d3e.exeun973453.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a210d6ce4af00421a9738b5b35097b7e6a06731962fcd8fccfda487fa992d3e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un973453.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4900 1416 WerFault.exe pro1789.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1a210d6ce4af00421a9738b5b35097b7e6a06731962fcd8fccfda487fa992d3e.exeun973453.exepro1789.exequ9856.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a210d6ce4af00421a9738b5b35097b7e6a06731962fcd8fccfda487fa992d3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un973453.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1789.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9856.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1789.exepid process 1416 pro1789.exe 1416 pro1789.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1789.exequ9856.exedescription pid process Token: SeDebugPrivilege 1416 pro1789.exe Token: SeDebugPrivilege 3612 qu9856.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1a210d6ce4af00421a9738b5b35097b7e6a06731962fcd8fccfda487fa992d3e.exeun973453.exedescription pid process target process PID 2820 wrote to memory of 5020 2820 1a210d6ce4af00421a9738b5b35097b7e6a06731962fcd8fccfda487fa992d3e.exe un973453.exe PID 2820 wrote to memory of 5020 2820 1a210d6ce4af00421a9738b5b35097b7e6a06731962fcd8fccfda487fa992d3e.exe un973453.exe PID 2820 wrote to memory of 5020 2820 1a210d6ce4af00421a9738b5b35097b7e6a06731962fcd8fccfda487fa992d3e.exe un973453.exe PID 5020 wrote to memory of 1416 5020 un973453.exe pro1789.exe PID 5020 wrote to memory of 1416 5020 un973453.exe pro1789.exe PID 5020 wrote to memory of 1416 5020 un973453.exe pro1789.exe PID 5020 wrote to memory of 3612 5020 un973453.exe qu9856.exe PID 5020 wrote to memory of 3612 5020 un973453.exe qu9856.exe PID 5020 wrote to memory of 3612 5020 un973453.exe qu9856.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a210d6ce4af00421a9738b5b35097b7e6a06731962fcd8fccfda487fa992d3e.exe"C:\Users\Admin\AppData\Local\Temp\1a210d6ce4af00421a9738b5b35097b7e6a06731962fcd8fccfda487fa992d3e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un973453.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un973453.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1789.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1789.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 10804⤵
- Program crash
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9856.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9856.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1416 -ip 14161⤵PID:2840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
516KB
MD5c1e4260cee766763679ee365cc109413
SHA110248801b05b56fb2c70437af797c31568b5112e
SHA25664eb208b5b1a4dcb0630547fc7f623480a88e30ef64f2283247825e7a481678b
SHA512059aa8f7d7df49067671956545f8ce46a1b9f9697c9475daac6c7dbb28d9ccb89ffbbc32e4a22034ef67c91b44d37683a5501f243370fcb909e2c02d8ad62edc
-
Filesize
283KB
MD50aed8ae14396def56c9f3b12514dee35
SHA158f7a7da3b493999903fa3ff3259565a482b9622
SHA256de9a877aab32cad5f9a0e45a8b2fac424f9b5f3f0facae7d78d1cadcffbbd142
SHA512d49377ee2e42cabbe2db3d65044bb07cb173d9f8c147adccb10e0da191771b0ed698b6b7fb5cb128ddc7fa013dca072e1ec555a10f2bd5677dbf3cf7f6fbdcef
-
Filesize
342KB
MD5573840a7c340796611087c0be099e033
SHA1b67cd6f0e196fef4685bfa6005d6d03a4e6b1c11
SHA2561f11de7b5b54892ab5b3a6e67d60f06ad7242b57d8745c221246d0007424daa8
SHA512550608111cab83924053746bfc355c6add5b535a246d2d5b68a4cddb0f94edc428d2dac9b90181d081b814802e0e3bee542fad88064a3fbaa4c9d71b4fe8486a