Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 23:17
Static task
static1
Behavioral task
behavioral1
Sample
f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exe
Resource
win10v2004-20241007-en
General
-
Target
f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exe
-
Size
787KB
-
MD5
35010575faae74ba4abb2115c2fff715
-
SHA1
cc359b72cf2ccc1b7f0782e813d889c75f42ed34
-
SHA256
f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71
-
SHA512
fc6f2919e2750d2ae105ec14b77ceab321488da07034594ec94e5cb1fe73a6c639756d5339b9d322aa4af11cdaa1700162194bcb3e846d51db8892eed9014839
-
SSDEEP
12288:RMryy90nZmM1ILcoPqwJfP0JXIGS13ln9H0VC3U/1adkt0U/nhw9lD:/yGZmMO4oCw1P0JbEn9HiC3UdL0ghwD
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2544-19-0x0000000004B00000-0x0000000004B1A000-memory.dmp healer behavioral1/memory/2544-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/2544-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2544-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro2811.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2811.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2811.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4736-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5264-2156-0x0000000000D20000-0x0000000000D50000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si764769.exe family_redline behavioral1/memory/5480-2167-0x0000000000590000-0x00000000005BE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu1430.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation qu1430.exe -
Executes dropped EXE 5 IoCs
Processes:
un924363.exepro2811.exequ1430.exe1.exesi764769.exepid process 1296 un924363.exe 2544 pro2811.exe 4736 qu1430.exe 5264 1.exe 5480 si764769.exe -
Processes:
pro2811.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2811.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2811.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exeun924363.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un924363.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1164 2544 WerFault.exe pro2811.exe 5396 4736 WerFault.exe qu1430.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exeun924363.exepro2811.exequ1430.exe1.exesi764769.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un924363.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2811.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1430.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si764769.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro2811.exepid process 2544 pro2811.exe 2544 pro2811.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro2811.exequ1430.exedescription pid process Token: SeDebugPrivilege 2544 pro2811.exe Token: SeDebugPrivilege 4736 qu1430.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exeun924363.exequ1430.exedescription pid process target process PID 3940 wrote to memory of 1296 3940 f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exe un924363.exe PID 3940 wrote to memory of 1296 3940 f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exe un924363.exe PID 3940 wrote to memory of 1296 3940 f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exe un924363.exe PID 1296 wrote to memory of 2544 1296 un924363.exe pro2811.exe PID 1296 wrote to memory of 2544 1296 un924363.exe pro2811.exe PID 1296 wrote to memory of 2544 1296 un924363.exe pro2811.exe PID 1296 wrote to memory of 4736 1296 un924363.exe qu1430.exe PID 1296 wrote to memory of 4736 1296 un924363.exe qu1430.exe PID 1296 wrote to memory of 4736 1296 un924363.exe qu1430.exe PID 4736 wrote to memory of 5264 4736 qu1430.exe 1.exe PID 4736 wrote to memory of 5264 4736 qu1430.exe 1.exe PID 4736 wrote to memory of 5264 4736 qu1430.exe 1.exe PID 3940 wrote to memory of 5480 3940 f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exe si764769.exe PID 3940 wrote to memory of 5480 3940 f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exe si764769.exe PID 3940 wrote to memory of 5480 3940 f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exe si764769.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exe"C:\Users\Admin\AppData\Local\Temp\f67e336c129d377c2901a67ffaf0b9a692ca9c7c0232b5b9dc8d891e2f177d71.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un924363.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un924363.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2811.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2811.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 11004⤵
- Program crash
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1430.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1430.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4736 -s 13844⤵
- Program crash
PID:5396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si764769.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si764769.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2544 -ip 25441⤵PID:3244
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4736 -ip 47361⤵PID:5312
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5bca3ddf5f7c8c57e00390ef848a5d9ca
SHA1a4fc806151ea31cb9396a008c4c9c4ec0f036037
SHA256ac61af05b8143ced18867bcdbe7f4f5665009dff641f0c50abd0f4d51091e24a
SHA512e3b7d35cfc955c717dadbadf0d0aea1ca09653a0c90580239892d684757eef453d7c9030b3a15acb294d7cbe503d3f845c2c8cfea28cfcf7fcbb60f2ef8dd90c
-
Filesize
633KB
MD51940aaa73da234c41fe94d6fba764eee
SHA1282013d6c9cd830292f0a15b191718bc78a421b7
SHA25664be53ca7b84275956f07431498be9b5e4508ebd7e6230853a6d99afd39d7cd3
SHA512ba8ba90b3d921bbb8a2e64365fd620b636a37ff5480a34810b7c9ac19a4ed680491795a89027c076362df0a3e3392c4b8c1964ef677d40869beb042255e5cb69
-
Filesize
230KB
MD5e44c171073b751915b5476dc34f02bc1
SHA1e7e9236b42eb1b9d11944cc26f5ebd1b6d279273
SHA25608315e4d8c713c0401235d84b8ca290c3d58cae2534fb89f61ed56775265e863
SHA512d75b92e680acdcc0baab3e3834217bccf4fa2f78973b6994ab674b8d063dc15d5f230d527dc2fe6ae3460ca36cedc874aaf4a42b83abe3833b3b329bc1dfaa21
-
Filesize
414KB
MD502539a9ceae6d54f6adf4fb86c54a781
SHA14d89783cf4edf142a1db23cfa0f6815b020fd0ce
SHA2563e21927a26e0b8af2e93eed6159ff75247e93dc0138046382964a51c3ed03e2f
SHA51273455320c61977e5082ed25de69144cb1097a5b8a5c271e068aab9932daa50fccf245a32a3324d37491a16834975d6154fd6e9dada4b3919b06474fe1a63f2ec
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0