Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b.exe
Resource
win10v2004-20241007-en
General
-
Target
fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b.exe
-
Size
660KB
-
MD5
621144a709582592e198bfb060fd7261
-
SHA1
0aee31ed1439b7eeb39e3ad76d80e2532162711f
-
SHA256
fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b
-
SHA512
c9cc9b3bb9aadcaca3867e325a91820e9220cf65018dd88b2304eca3c687fe056e19c5d4e0f6a44dbdc9848e2402a66ecfb79e49b06fb21b4aafcfc55f041545
-
SSDEEP
12288:VMrAy90siQhiy07uoJ4n2GypzE5VfaaycsOFBlRzEiA2/z:9yq1SaEFFsOFGiNr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3948-19-0x0000000002760000-0x000000000277A000-memory.dmp healer behavioral1/memory/3948-21-0x0000000002910000-0x0000000002928000-memory.dmp healer behavioral1/memory/3948-23-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-49-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-47-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-45-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-43-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-41-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-39-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-37-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-35-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-33-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-31-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-29-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-27-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-25-0x0000000002910000-0x0000000002922000-memory.dmp healer behavioral1/memory/3948-22-0x0000000002910000-0x0000000002922000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0779.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0779.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0779.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2840-61-0x0000000004DA0000-0x0000000004DE6000-memory.dmp family_redline behavioral1/memory/2840-62-0x0000000004E60000-0x0000000004EA4000-memory.dmp family_redline behavioral1/memory/2840-68-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-78-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-96-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-94-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-92-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-88-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-86-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-84-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-83-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-80-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-76-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-74-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-72-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-70-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-66-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-90-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-64-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/2840-63-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2664 un441772.exe 3948 pro0779.exe 2840 qu2645.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0779.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0779.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un441772.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3592 3948 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un441772.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0779.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2645.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3948 pro0779.exe 3948 pro0779.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3948 pro0779.exe Token: SeDebugPrivilege 2840 qu2645.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5000 wrote to memory of 2664 5000 fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b.exe 83 PID 5000 wrote to memory of 2664 5000 fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b.exe 83 PID 5000 wrote to memory of 2664 5000 fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b.exe 83 PID 2664 wrote to memory of 3948 2664 un441772.exe 84 PID 2664 wrote to memory of 3948 2664 un441772.exe 84 PID 2664 wrote to memory of 3948 2664 un441772.exe 84 PID 2664 wrote to memory of 2840 2664 un441772.exe 97 PID 2664 wrote to memory of 2840 2664 un441772.exe 97 PID 2664 wrote to memory of 2840 2664 un441772.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b.exe"C:\Users\Admin\AppData\Local\Temp\fc464c7d3f242b161e91fb6f68905c2a3ba7fb39364ee5eac8d14cf55e3ace7b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un441772.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un441772.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0779.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0779.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3948 -s 10884⤵
- Program crash
PID:3592
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2645.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2645.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3948 -ip 39481⤵PID:1036
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD51ff1c7ea7d7334c598eee2ff572d78da
SHA14b18e8e8f866278fb979dee4718e431f0f7e7a9c
SHA2563000afab7c92b9e7e7258d3001166ceca0fae20a3a27057e1c5652b748dce25d
SHA512e8ec05b0d80649e791488614e11d3f23381523ba1025c7526e54c650912c95938b6a8204bc0398b63f791e2006b3c4c250ad9b4583435bbd448b84944b8cda72
-
Filesize
295KB
MD5e92be029a85ff42ad56e62fc0feadc61
SHA1b7df21a36ecdbcfb0d284038a0ed76c28404a68c
SHA256da67de3dd9f4fc01a69d04433aa9fb04e658ec23abe75131e89cedf0f9b6767e
SHA5123619b07500b0b795aa22868cfe7bcd866f5c49dd65a42dfe1bf271dc106e52c05aea209dc255529a5f21a530c7e6a8b9ce059ea624ce786f250351219ce7da4d
-
Filesize
353KB
MD599b7bf27e53a7c115c805d80872d990d
SHA1b055eda253db6d12d27221290fded415256f7c48
SHA256b7989f2c4b4a50ddcde72ea893dd45d005ebff99480f9d0bc9b7ec25a426b7e2
SHA512922117aebc4cf1a254141fb1091af5b4b94c5d5b894c90a0a1e1c60d10c7bde4ee904e52084f363e5a217d8ad34b1403d10a51efc17d86ad8e04f93933a7a98a