Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
76fdc9dd56c788123b1326406d4fa7edabc8a46d64ff8137142c513289c89011.exe
Resource
win10v2004-20241007-en
General
-
Target
76fdc9dd56c788123b1326406d4fa7edabc8a46d64ff8137142c513289c89011.exe
-
Size
688KB
-
MD5
b131c5108db73615cb1feb2c2aa7e252
-
SHA1
b5b04bd5bf9f589dd049f2698b3122e580eb6c61
-
SHA256
76fdc9dd56c788123b1326406d4fa7edabc8a46d64ff8137142c513289c89011
-
SHA512
6f65bd615e8ddb33ae83b80268b10564f004ef624d3952ac3b734e62875d42b96858f4ea20c37b183ca2fd79b5878d7cb8925467fd1a43900be65c1a7097b363
-
SSDEEP
12288:tMruy90eEIZpLX4QBEzNSZafpbgpuOTOcsIjsVmXpOo4ctLb43xSYMNKbJYWzlfN:jyPEIZHBEzNgCbgFThamXpR4ct34hRM0
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2084-18-0x0000000004A20000-0x0000000004A3A000-memory.dmp healer behavioral1/memory/2084-20-0x0000000007110000-0x0000000007128000-memory.dmp healer behavioral1/memory/2084-21-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-26-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-48-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-47-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-44-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-42-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-40-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-38-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-36-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-34-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-32-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-30-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-28-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-24-0x0000000007110000-0x0000000007122000-memory.dmp healer behavioral1/memory/2084-22-0x0000000007110000-0x0000000007122000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8914.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2936-60-0x0000000004C00000-0x0000000004C46000-memory.dmp family_redline behavioral1/memory/2936-61-0x0000000007730000-0x0000000007774000-memory.dmp family_redline behavioral1/memory/2936-71-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-77-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-75-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-73-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-85-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-69-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-67-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-65-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-63-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-62-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-95-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-93-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-91-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-89-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-87-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-83-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-81-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/2936-79-0x0000000007730000-0x000000000776F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3676 unio8704.exe 2084 pro8914.exe 2936 qu0197.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8914.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8914.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 76fdc9dd56c788123b1326406d4fa7edabc8a46d64ff8137142c513289c89011.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio8704.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3096 sc.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1760 2084 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76fdc9dd56c788123b1326406d4fa7edabc8a46d64ff8137142c513289c89011.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio8704.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8914.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0197.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2084 pro8914.exe 2084 pro8914.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2084 pro8914.exe Token: SeDebugPrivilege 2936 qu0197.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 624 wrote to memory of 3676 624 76fdc9dd56c788123b1326406d4fa7edabc8a46d64ff8137142c513289c89011.exe 83 PID 624 wrote to memory of 3676 624 76fdc9dd56c788123b1326406d4fa7edabc8a46d64ff8137142c513289c89011.exe 83 PID 624 wrote to memory of 3676 624 76fdc9dd56c788123b1326406d4fa7edabc8a46d64ff8137142c513289c89011.exe 83 PID 3676 wrote to memory of 2084 3676 unio8704.exe 84 PID 3676 wrote to memory of 2084 3676 unio8704.exe 84 PID 3676 wrote to memory of 2084 3676 unio8704.exe 84 PID 3676 wrote to memory of 2936 3676 unio8704.exe 99 PID 3676 wrote to memory of 2936 3676 unio8704.exe 99 PID 3676 wrote to memory of 2936 3676 unio8704.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\76fdc9dd56c788123b1326406d4fa7edabc8a46d64ff8137142c513289c89011.exe"C:\Users\Admin\AppData\Local\Temp\76fdc9dd56c788123b1326406d4fa7edabc8a46d64ff8137142c513289c89011.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8704.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8704.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8914.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8914.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 10764⤵
- Program crash
PID:1760
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0197.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0197.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2084 -ip 20841⤵PID:4956
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3096
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
546KB
MD5e4f111e863d06c4ce5f2bd4c72770bc9
SHA1ece63fa9e96d40b95d369b05695661760a9494ac
SHA2568ad322665867bf5fcdf452bfec738c0138b1e10645ee84b5cddc164293ff8cc1
SHA5127f10caac65d52332a35503095b8c604d6b67fa3951c5c634ef8a3f3f396d34f42216d9d6543dbfe46fbaa1f6cd28b183ef7ecbf76b5d364373ae9537a3105354
-
Filesize
329KB
MD522d320b3a053833a85be994941628af5
SHA1802272da8016070423a3010fd6e85b016164dc13
SHA25644ea50d32ab950f0743c0da6d47a261a0d35eddaf82fb7e7e446e3784d0b170a
SHA51249fda7ed53753ae1a1906d15e7af744842853c4234f1eded79b3b3e2f2448e03c8db6f4b4b7fb2ea5f37e30076a7f9b62b80c367eb6a754a14feb92ad1dfd425
-
Filesize
386KB
MD503ba8aa539d106b7baf3d3afaa9e9376
SHA1156165daaff12e459517245d02843a777777a8d0
SHA2562ce186b00b591764ace49352a99dd397a37b7236da380eb22b2f4b133a9661a4
SHA512d10a8ba8e6f4c8c6865ebb76936d7f0523bc5f6498b97d7f7427cfc4f8fdb4d7d5ae51ae9b75c8dbfdcffd01f1cb2b23728e5c1eded2604f66a56095edfb3cc9