Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
1cd553c5ec1668ec436e42204c6d6186f476a96097437bb87783c90d226941a9.exe
Resource
win10v2004-20241007-en
General
-
Target
1cd553c5ec1668ec436e42204c6d6186f476a96097437bb87783c90d226941a9.exe
-
Size
659KB
-
MD5
9ec1ae73182fae95ab9506d0e7971106
-
SHA1
4e7f54190ac15d07f1842093eea47cc544a889ee
-
SHA256
1cd553c5ec1668ec436e42204c6d6186f476a96097437bb87783c90d226941a9
-
SHA512
41f466e6ffb65730b3071334c48904e73bdadb7778d14d1cc91e50175360a20f87d8c936b889b1a83360116687d06048728077bf88204752d2a3b417a6939c9d
-
SSDEEP
12288:UMrhy90wltGVH7cNutioF1TjP1zXdE8PIA4O6XxpNSCxqyqJNEd3:VyhlgVQMt9FZjNdEMIA4nXPNDxmNEd3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3352-19-0x0000000002780000-0x000000000279A000-memory.dmp healer behavioral1/memory/3352-21-0x0000000004DB0000-0x0000000004DC8000-memory.dmp healer behavioral1/memory/3352-49-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-47-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-45-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-43-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-41-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-39-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-37-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-35-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-33-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-31-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-29-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-27-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-23-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-22-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3352-25-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4665.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4665.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3048-61-0x0000000002810000-0x0000000002856000-memory.dmp family_redline behavioral1/memory/3048-62-0x0000000002A20000-0x0000000002A64000-memory.dmp family_redline behavioral1/memory/3048-66-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-78-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-96-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-94-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-93-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-90-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-88-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-84-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-82-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-80-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-76-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-74-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-72-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-70-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-68-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-86-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-64-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline behavioral1/memory/3048-63-0x0000000002A20000-0x0000000002A5F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1800 un584774.exe 3352 pro4665.exe 3048 qu1611.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4665.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4665.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1cd553c5ec1668ec436e42204c6d6186f476a96097437bb87783c90d226941a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un584774.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4996 3352 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1cd553c5ec1668ec436e42204c6d6186f476a96097437bb87783c90d226941a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un584774.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4665.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1611.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3352 pro4665.exe 3352 pro4665.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3352 pro4665.exe Token: SeDebugPrivilege 3048 qu1611.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1800 1948 1cd553c5ec1668ec436e42204c6d6186f476a96097437bb87783c90d226941a9.exe 85 PID 1948 wrote to memory of 1800 1948 1cd553c5ec1668ec436e42204c6d6186f476a96097437bb87783c90d226941a9.exe 85 PID 1948 wrote to memory of 1800 1948 1cd553c5ec1668ec436e42204c6d6186f476a96097437bb87783c90d226941a9.exe 85 PID 1800 wrote to memory of 3352 1800 un584774.exe 86 PID 1800 wrote to memory of 3352 1800 un584774.exe 86 PID 1800 wrote to memory of 3352 1800 un584774.exe 86 PID 1800 wrote to memory of 3048 1800 un584774.exe 99 PID 1800 wrote to memory of 3048 1800 un584774.exe 99 PID 1800 wrote to memory of 3048 1800 un584774.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\1cd553c5ec1668ec436e42204c6d6186f476a96097437bb87783c90d226941a9.exe"C:\Users\Admin\AppData\Local\Temp\1cd553c5ec1668ec436e42204c6d6186f476a96097437bb87783c90d226941a9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un584774.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un584774.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4665.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4665.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 10164⤵
- Program crash
PID:4996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1611.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1611.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3352 -ip 33521⤵PID:3944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD50d50ebb2902e45d2e486232e788296fe
SHA131b9238a84ac4ff775bb31d8560ccc29593aab35
SHA25608feb34a71998b24f55b568368ec32feaf72684a725504764a3982307762d917
SHA512084871c34dc5c8f6e241892b89d5d527cf9afd75a09d468d5d58f5bf94858dabf35597f0ddf3bc8faa20f7934d1bb25f7a682755a13ee34d6b237f09a874bae6
-
Filesize
376KB
MD5ebe862b7293a38fa904f170ba6149777
SHA193533e518cdf0ccd86747b33e7465abb9dfcf17a
SHA25606c0dd15bca1e4b0382c9e125c575861fed762de347c67efba5faed00ea765b4
SHA512c7dc50630eafbc67d16fd17462aed03bf180a84754a6ab5668f625502434a99ae92fb71e30f5a57fdff1d520904721f667c1f70e9020194f99550eb32a23a544
-
Filesize
434KB
MD581d9015da9d41ce4470e5eb9a1298554
SHA19c67697855be112b6938d3e7ed54eaa6c772843c
SHA25673ccba6ec18036e1593240eed3a0826e1357dc2c6893248e1adf1912ded56063
SHA5121b101be24f13d4868623fb987015ddf36d1d62b11b65c6f880c3daac46a34e94cf6470f86ca8bc889482df9b48149d7dc5d9f0d596a01f29d673feda3297822d