Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:31
Static task
static1
Behavioral task
behavioral1
Sample
cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110.exe
Resource
win10v2004-20241007-en
General
-
Target
cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110.exe
-
Size
689KB
-
MD5
700933c6eb87116776d0b3d3f61d7e4a
-
SHA1
d84bc8bc70d1d7490bdc2ce7c0dce3f4ab6c0bdf
-
SHA256
cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110
-
SHA512
a91d27214e5f31e8982013905163cd7a6bb213f4745b47125287b26b0d7d0292bb30022784f96d96700687da442c5a2b22ce3f0e6555f07d0447f14f4903cb4c
-
SSDEEP
12288:kMrgy90WXmWGrDgjlRWfkLljj8Mjdt+TYekLYxUVNtMrlWtV/Nqvg:EyBGrSRWfkLKMjyY1LtfiQD
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/3436-18-0x0000000003000000-0x000000000301A000-memory.dmp healer behavioral1/memory/3436-20-0x0000000007120000-0x0000000007138000-memory.dmp healer behavioral1/memory/3436-48-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-46-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-44-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-42-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-40-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-38-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-36-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-32-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-30-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-28-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-24-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-22-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-21-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-34-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/3436-26-0x0000000007120000-0x0000000007132000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8283.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1524-60-0x0000000004920000-0x0000000004966000-memory.dmp family_redline behavioral1/memory/1524-61-0x0000000004E70000-0x0000000004EB4000-memory.dmp family_redline behavioral1/memory/1524-95-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-93-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-91-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-89-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-87-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-85-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-83-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-81-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-79-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-77-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-75-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-73-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-71-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-69-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-67-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-65-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-63-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline behavioral1/memory/1524-62-0x0000000004E70000-0x0000000004EAF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 860 unio7524.exe 3436 pro8283.exe 1524 qu7209.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8283.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio7524.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3884 3436 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio7524.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8283.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7209.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3436 pro8283.exe 3436 pro8283.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3436 pro8283.exe Token: SeDebugPrivilege 1524 qu7209.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4452 wrote to memory of 860 4452 cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110.exe 84 PID 4452 wrote to memory of 860 4452 cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110.exe 84 PID 4452 wrote to memory of 860 4452 cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110.exe 84 PID 860 wrote to memory of 3436 860 unio7524.exe 86 PID 860 wrote to memory of 3436 860 unio7524.exe 86 PID 860 wrote to memory of 3436 860 unio7524.exe 86 PID 860 wrote to memory of 1524 860 unio7524.exe 98 PID 860 wrote to memory of 1524 860 unio7524.exe 98 PID 860 wrote to memory of 1524 860 unio7524.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110.exe"C:\Users\Admin\AppData\Local\Temp\cc6bd85c7cadb8f36dedd1be6c7302e3c8f20d35eb924cdbc8ccd9888863a110.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7524.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7524.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8283.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8283.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3436 -s 10804⤵
- Program crash
PID:3884
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7209.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7209.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3436 -ip 34361⤵PID:1604
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
547KB
MD55b6d29cee10a9880089bf202a3bdc6e4
SHA123cf04a3717058ffecfd574d96068b9ad045767e
SHA25696f1999064a6eeebab6913d1c51d56980b8e19a512be53a2cad05e3db966fa08
SHA51215f6fa8a0d7345548f94847e7a8e8c8eb26bf012551f7646d32dba3e5fcd01e3c6476027a17f9d70b89f94ccddb3dd3e64db8990a50cf78d8c9323118cc2927c
-
Filesize
327KB
MD5aa61cdf759c45d17fa35c4d9bec9bb34
SHA1b4f2f93cd518490f6d323e219da2c5c06e583255
SHA25620e59534b32f23316802ac0f680fd335efabafb9e095e39b170c749dd2414290
SHA512a39495d8a545572b26e6a59e08f6cece4b7c905140dfb8375fd1c638831cd6a3e2e9741ae18220a2887082d67d19f708088f13848f5dd67f47604a642b0ae98b
-
Filesize
385KB
MD5252618c2e2044b2a5fd18d2790d53bae
SHA16e9fc9e746c9fbca27d332a12084f08ac2556640
SHA25675a03329913b1eef0344cedc28a8ae9beaf1a8fef82e0389a3be7948112f2342
SHA5121086edcfcaecc4dde8c3637115197db314dc27faa891b754d4e7626f50149b2021871c2e0308951f656a0d378011b8b6041805ec0b5ae3c09451c37ff2e9e367