Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef.exe
Resource
win10v2004-20241007-en
General
-
Target
c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef.exe
-
Size
670KB
-
MD5
f37f9aec58ff6af9d419e6dd428ece8f
-
SHA1
81bf96262736eaa68205bb576ee07694dc0610ac
-
SHA256
c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef
-
SHA512
1b9d6fb095b43a72dc948c44c3a06c4a9a26e1c927963c9f2ca7d2a2459aafd23930bd4f07a7603a03545e9b1910a4c6f256f83fba1d07ab3d34945919d7e395
-
SSDEEP
12288:aMr6y90Xz5Y9AavBRh+8vPGClolQ07upwoZFiTLt59srw4bXCzapft/ju5jkmVu:cy2z+9Aav7hVXIRQLiTLt52nbyzGB0u
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4340-19-0x00000000025D0000-0x00000000025EA000-memory.dmp healer behavioral1/memory/4340-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/4340-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-40-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-34-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4340-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0242.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0242.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1516-60-0x00000000022E0000-0x0000000002326000-memory.dmp family_redline behavioral1/memory/1516-61-0x00000000025A0000-0x00000000025E4000-memory.dmp family_redline behavioral1/memory/1516-71-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-77-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-95-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-93-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-89-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-87-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-85-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-83-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-81-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-79-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-75-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-73-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-69-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-67-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-65-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-91-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-63-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline behavioral1/memory/1516-62-0x00000000025A0000-0x00000000025DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3312 un565354.exe 4340 pro0242.exe 1516 qu0261.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0242.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0242.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un565354.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 912 4340 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un565354.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0242.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0261.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4340 pro0242.exe 4340 pro0242.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4340 pro0242.exe Token: SeDebugPrivilege 1516 qu0261.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1044 wrote to memory of 3312 1044 c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef.exe 83 PID 1044 wrote to memory of 3312 1044 c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef.exe 83 PID 1044 wrote to memory of 3312 1044 c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef.exe 83 PID 3312 wrote to memory of 4340 3312 un565354.exe 84 PID 3312 wrote to memory of 4340 3312 un565354.exe 84 PID 3312 wrote to memory of 4340 3312 un565354.exe 84 PID 3312 wrote to memory of 1516 3312 un565354.exe 98 PID 3312 wrote to memory of 1516 3312 un565354.exe 98 PID 3312 wrote to memory of 1516 3312 un565354.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef.exe"C:\Users\Admin\AppData\Local\Temp\c3b6f8da8be9342642608ed34b0635af9ff4c2bd97e253308118e435e0c7e3ef.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un565354.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un565354.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0242.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0242.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 10924⤵
- Program crash
PID:912
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0261.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0261.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4340 -ip 43401⤵PID:1712
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
517KB
MD502a33bf43dc93ad2d4dc4e9a5cb21e7d
SHA181298e1784f3eef95d54af8df17f3f4428eae536
SHA2564bc98eb4c02f304e4ea8449704485637f31080b868f35973d52ca25a4257be8d
SHA512913be43b9c5c395aeca0407934a4eb96b1675567c9f277ad155ba9f095b602df82dbb032ac5ffd8b94417485e7fc96522df94744f8df40ae12aa20acba1f7b8b
-
Filesize
237KB
MD51233dfb0c0df8992c768d9e94e0ead92
SHA1fe1e17fdf7ed48e5bb4f369876cf9ed230ec5665
SHA256939b46d8a7a94a816b78c9a3cf3a15be4a2024a5076e4fb42c24e22e07be571d
SHA51268c37cdfcf981c646ada41e3f89fe37ea327813d46af174ba8d4b574041e0248ea1a45f73936b881e1edb1fdc0c4eeb52f29a4385561204a3ad9d748940796a2
-
Filesize
295KB
MD5064c56c9dd4fcda151774d398cbfb43f
SHA1faf26bd56c3b35f730e4800cf3335baa1f503a64
SHA256706d87910c49be1b0880075012d9213dc8d87f2dee25221ffae7622c9a465457
SHA512a986e80d9e24549c3c3201cfd3915c09bb23e6416aa1ab35ec4aa81299b3000d18510e673b6620b542b00cb5b2f2cb608886c6bbfb1dcc4ead7afefeeb1a3a0e