Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:48
Static task
static1
Behavioral task
behavioral1
Sample
1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exe
Resource
win10v2004-20241007-en
General
-
Target
1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exe
-
Size
658KB
-
MD5
6bdc810a0b272404290e6cf486236023
-
SHA1
d06b65c7ca1a0dce1f3222eb8b7fe1f4f36cc887
-
SHA256
1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2
-
SHA512
6fb058c7f1a8987fc34de3ccf4bab07105a40e0c0aa645cc4cbea3231f19506c5a88bd4170011b3a5163dd76c43359a4eb10c2d4b9f0d2d72440b131688081b3
-
SSDEEP
12288:5MrCy90npfQCQFEitlh37TeuPDAiIyfK3jSyG6PKpN5l7yIL+EfZxV/Wn3Kyp:HyEIF2aVbAqM66P8yw+Efz8Kyp
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3976-17-0x0000000004980000-0x000000000499A000-memory.dmp healer behavioral1/memory/3976-19-0x0000000007250000-0x0000000007268000-memory.dmp healer behavioral1/memory/3976-46-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-48-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-44-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-42-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-40-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-38-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-36-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-34-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-32-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-30-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-28-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-26-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-24-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-22-0x0000000007250000-0x0000000007262000-memory.dmp healer behavioral1/memory/3976-21-0x0000000007250000-0x0000000007262000-memory.dmp healer -
Healer family
-
Processes:
pro0233.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0233.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4352-59-0x0000000004BE0000-0x0000000004C26000-memory.dmp family_redline behavioral1/memory/4352-60-0x0000000007760000-0x00000000077A4000-memory.dmp family_redline behavioral1/memory/4352-90-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-94-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-92-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-88-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-86-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-85-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-82-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-80-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-78-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-74-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-72-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-70-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-68-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-66-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-64-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-76-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-62-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/4352-61-0x0000000007760000-0x000000000779F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
un956185.exepro0233.exequ8246.exepid process 4212 un956185.exe 3976 pro0233.exe 4352 qu8246.exe -
Processes:
pro0233.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0233.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exeun956185.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un956185.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3212 3976 WerFault.exe pro0233.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exeun956185.exepro0233.exequ8246.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un956185.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0233.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8246.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0233.exepid process 3976 pro0233.exe 3976 pro0233.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0233.exequ8246.exedescription pid process Token: SeDebugPrivilege 3976 pro0233.exe Token: SeDebugPrivilege 4352 qu8246.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exeun956185.exedescription pid process target process PID 2624 wrote to memory of 4212 2624 1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exe un956185.exe PID 2624 wrote to memory of 4212 2624 1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exe un956185.exe PID 2624 wrote to memory of 4212 2624 1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exe un956185.exe PID 4212 wrote to memory of 3976 4212 un956185.exe pro0233.exe PID 4212 wrote to memory of 3976 4212 un956185.exe pro0233.exe PID 4212 wrote to memory of 3976 4212 un956185.exe pro0233.exe PID 4212 wrote to memory of 4352 4212 un956185.exe qu8246.exe PID 4212 wrote to memory of 4352 4212 un956185.exe qu8246.exe PID 4212 wrote to memory of 4352 4212 un956185.exe qu8246.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exe"C:\Users\Admin\AppData\Local\Temp\1acaa5425880d090f3edbcf809e41c59e985a0504848334fec03f57bea0f7fe2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un956185.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un956185.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0233.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0233.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 10804⤵
- Program crash
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8246.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8246.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3976 -ip 39761⤵PID:3092
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
515KB
MD5b816a7a885dc7a7e350371235b9cd961
SHA1682695ded60ed029331d4f51220049bdd6390f6b
SHA2564a0cf9df9aaff3b66971cabfc3a74596f9ef6da84fa8556963601aef7a610dda
SHA51251d9ed82e3dc2cf92fdceac0ba8c617d23d8f5143fddcf88cb94f525b6e030a3bb2d8fee7b8f7240d1390dafa456ec4df7442438fed52f09e233dfeaab8e15ff
-
Filesize
295KB
MD59a02c089cf6a08af69e0589871df61a9
SHA15dd36f48f667dc562fc43f22b6d998af2b4e28cd
SHA2567622dc92cf41868c02419e5437ca3195d7381becc34bad1e4d377baea677278d
SHA51220de3a46a6af236f4420fd2e1284a318f7388904d4b0a8f0b19c1bffd2ccf9d89d3484c42c185d3d9939de6215afa4c86d8f6a77796100d2044f88bb74a4fb33
-
Filesize
354KB
MD59628aa62678aee08a1a1084d69b826c0
SHA1d5fe64a09323332b4c10c0c3d7832517c22e1ae3
SHA256b176f13894a7e466117be06f304a5229008c51c4a5fc53e67279cd1d1005b35e
SHA5120ed22959eab2584dc062c270886594fefee23cf109932b2e818800ac7909a8d8a4285fa5fa9650b6ed1d08c19f5a80da20da5c81ca0014958b0a29698d5b1440