Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
cc79f41556f46cf037712cf38b3e276f942218c1df79fe8a304a2147a1c2eb50.exe
Resource
win10v2004-20241007-en
General
-
Target
cc79f41556f46cf037712cf38b3e276f942218c1df79fe8a304a2147a1c2eb50.exe
-
Size
673KB
-
MD5
1964e639a1b3a61d13a0dbff4418240c
-
SHA1
a3c70da7c4adb3cc2dc89ca16d1999eee50019a4
-
SHA256
cc79f41556f46cf037712cf38b3e276f942218c1df79fe8a304a2147a1c2eb50
-
SHA512
6d2fe154a49cfbc0d24b577ff538af0582bc3764ee27d5c51325569b7044606f573de8fdfe96cd8188582fcea3f1c087c7f0daa5f2f8abd9fa931cab776bd519
-
SSDEEP
12288:dMrIy90lKaaxy6TnwyzRlFHyZLdUHT0HthBbuWPGWM0/5vDLkR:5yPaaxFwyzZalth1uM1/E
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/592-18-0x0000000002180000-0x000000000219A000-memory.dmp healer behavioral1/memory/592-20-0x0000000002330000-0x0000000002348000-memory.dmp healer behavioral1/memory/592-48-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-46-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-44-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-42-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-40-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-38-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-36-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-34-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-32-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-30-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-28-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-26-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-24-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-22-0x0000000002330000-0x0000000002342000-memory.dmp healer behavioral1/memory/592-21-0x0000000002330000-0x0000000002342000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4540.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/3224-59-0x0000000004A90000-0x0000000004AD6000-memory.dmp family_redline behavioral1/memory/3224-60-0x00000000050C0000-0x0000000005104000-memory.dmp family_redline behavioral1/memory/3224-94-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-92-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-90-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-86-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-84-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-83-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-81-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-78-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-76-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-75-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-72-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-70-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-68-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-66-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-88-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-64-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-62-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3224-61-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1904 un374574.exe 592 pro4540.exe 3224 qu4606.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4540.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un374574.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc79f41556f46cf037712cf38b3e276f942218c1df79fe8a304a2147a1c2eb50.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1616 592 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc79f41556f46cf037712cf38b3e276f942218c1df79fe8a304a2147a1c2eb50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un374574.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4540.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 592 pro4540.exe 592 pro4540.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 592 pro4540.exe Token: SeDebugPrivilege 3224 qu4606.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 884 wrote to memory of 1904 884 cc79f41556f46cf037712cf38b3e276f942218c1df79fe8a304a2147a1c2eb50.exe 83 PID 884 wrote to memory of 1904 884 cc79f41556f46cf037712cf38b3e276f942218c1df79fe8a304a2147a1c2eb50.exe 83 PID 884 wrote to memory of 1904 884 cc79f41556f46cf037712cf38b3e276f942218c1df79fe8a304a2147a1c2eb50.exe 83 PID 1904 wrote to memory of 592 1904 un374574.exe 84 PID 1904 wrote to memory of 592 1904 un374574.exe 84 PID 1904 wrote to memory of 592 1904 un374574.exe 84 PID 1904 wrote to memory of 3224 1904 un374574.exe 97 PID 1904 wrote to memory of 3224 1904 un374574.exe 97 PID 1904 wrote to memory of 3224 1904 un374574.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc79f41556f46cf037712cf38b3e276f942218c1df79fe8a304a2147a1c2eb50.exe"C:\Users\Admin\AppData\Local\Temp\cc79f41556f46cf037712cf38b3e276f942218c1df79fe8a304a2147a1c2eb50.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un374574.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un374574.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4540.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4540.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 10284⤵
- Program crash
PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4606.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4606.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 592 -ip 5921⤵PID:820
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
531KB
MD5b3b6660155307bbab0abdab69c88b1eb
SHA1eea29ad292d06694104ede0ee6d55d15e2f29763
SHA256864b44a99de22adbf7bede25f77d2e9cb0a920eeadb3d82db633f15a74afbe01
SHA512aa568d9a97a80a057cce51397d33f80bf222786e98a335a36a77df102584fb8fa72776517dd8d0bc4e6f0544d5f7348f66ebaf1a0d42878c6a7215cae77afb01
-
Filesize
260KB
MD5538ac6ee566762a3db2b0cc33d3f7d95
SHA165be0131303ebf3d66a7d943e868aec1514ff039
SHA256ba6073025a603187fa047f1205dad29c900bde149998edc4a23785fff681fa24
SHA512839f82b0e802b75b9d5fb06a173b3738ce2d59012e7f5ae40190d31a0751d9bb33e48da90ecc0c520c14c2a631bb6925108d7394791288592cf827f668d89712
-
Filesize
319KB
MD5c9304d8800694620375b74eae96886e5
SHA162a0be5e18f636423e3404f84d5cbeec918536af
SHA2568d5d4fe7913eafe4a85560275d8092d371440f2ef2ac3f357bfd7316e98cac76
SHA5120ccec655f813eca6ccea759be5e7e2569e4bdbedad3de9fbc8f7b4e7d9269ae50cbce5bbcd211456b0bc569203bffeaca09fa3f3076af71b653c2cc29cb830a3