Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:33
Static task
static1
Behavioral task
behavioral1
Sample
c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5.exe
Resource
win10v2004-20241007-en
General
-
Target
c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5.exe
-
Size
660KB
-
MD5
e60c6467a07ce705cc193474936f95f1
-
SHA1
239493ead8b53b1895f2eb9d7b7285830c8c0bdc
-
SHA256
c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5
-
SHA512
6386985d9b26f78124f0bf079fe46a85673eda35c74ea1307f31f730732b1eb37336787b03f99b6c670aa24ead00cf94939be6c078769420b5038df1d1d9bb19
-
SSDEEP
12288:FMrly90DxoUNqrBINKpuPSYPIaevIJUaA7EUFwlRir0V3ifWe:4yXriyZYXuuUFF0tiOe
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2728-19-0x0000000002730000-0x000000000274A000-memory.dmp healer behavioral1/memory/2728-21-0x00000000027B0000-0x00000000027C8000-memory.dmp healer behavioral1/memory/2728-22-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-48-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-45-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-43-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-41-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-39-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-37-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-35-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-33-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-31-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-29-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-28-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-25-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-23-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/2728-49-0x00000000027B0000-0x00000000027C2000-memory.dmp healer -
Healer family
-
Processes:
pro4458.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4458.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4458.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4458.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4458.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4458.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4458.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4256-61-0x0000000004EC0000-0x0000000004F06000-memory.dmp family_redline behavioral1/memory/4256-62-0x0000000004F80000-0x0000000004FC4000-memory.dmp family_redline behavioral1/memory/4256-63-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-74-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-94-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-92-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-90-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-88-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-86-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-84-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-82-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-80-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-78-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-76-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-72-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-70-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-68-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-66-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-64-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/4256-96-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un069317.exepro4458.exequ0787.exepid process 184 un069317.exe 2728 pro4458.exe 4256 qu0787.exe -
Processes:
pro4458.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4458.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4458.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5.exeun069317.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un069317.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1040 2728 WerFault.exe pro4458.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5.exeun069317.exepro4458.exequ0787.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un069317.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4458.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0787.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4458.exepid process 2728 pro4458.exe 2728 pro4458.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4458.exequ0787.exedescription pid process Token: SeDebugPrivilege 2728 pro4458.exe Token: SeDebugPrivilege 4256 qu0787.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5.exeun069317.exedescription pid process target process PID 4024 wrote to memory of 184 4024 c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5.exe un069317.exe PID 4024 wrote to memory of 184 4024 c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5.exe un069317.exe PID 4024 wrote to memory of 184 4024 c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5.exe un069317.exe PID 184 wrote to memory of 2728 184 un069317.exe pro4458.exe PID 184 wrote to memory of 2728 184 un069317.exe pro4458.exe PID 184 wrote to memory of 2728 184 un069317.exe pro4458.exe PID 184 wrote to memory of 4256 184 un069317.exe qu0787.exe PID 184 wrote to memory of 4256 184 un069317.exe qu0787.exe PID 184 wrote to memory of 4256 184 un069317.exe qu0787.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5.exe"C:\Users\Admin\AppData\Local\Temp\c1e148e47f1da70156b08f118d67582c85de493d1a501dcd8549febf644577c5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un069317.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un069317.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4458.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4458.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 10964⤵
- Program crash
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0787.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0787.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2728 -ip 27281⤵PID:4232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD585c93f1d9894e0d699c313eec292dfe3
SHA1a77d4c2ae897e863d70c2ae3a524fe397b19fa17
SHA256ea618e66f2c66cb638d44f20cd27634aef95a22a2e16f035aef5fa4774b1ac28
SHA512c497192315a02af1b263a0c47197fbca646e61cae06cf1e8b5548c481f91bd5691a0654d48843a1126df1897dd6307734f0af80316165ce3e248a48bb98cf91d
-
Filesize
295KB
MD5cef108bc75e581ff8299e9cafdd07bd5
SHA1d51954e02c0426bfe12100aecb614c4e715c0384
SHA25611b0c68e137c3f2f976611c0209b612c986fffb4ac0e0c87f60f7f39e3fa4382
SHA51208bc0777e16c6edd26d6e62e7f6c4a4dd4ac32e4e98f0846b4647daa176680619a66814d5028869c4bac6d6bbb13e256d7e5d506ed22426a4c293a0ccc234781
-
Filesize
353KB
MD593247c750cbebddf69dd63af31913c4e
SHA1a02f663ea0c961c0da06370d0d835355c9ccbd89
SHA25677caa880f6660f8cf9ac178153833451f1c4bb66a12f5cfe404250feeae5fa53
SHA5124d8c056d6437aad5eb7e40d9a17db7ae15d307ac1168ec13ef62c70697ae5bb8c236008afd94b3d1ccdbadc4c5e36a6459c93b0a80ccaaff5b89eb5a06c29023