Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 22:49
Static task
static1
Behavioral task
behavioral1
Sample
d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exe
Resource
win10v2004-20241007-en
General
-
Target
d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exe
-
Size
795KB
-
MD5
afbe151309256260f08aa69ed5fc9c99
-
SHA1
919e089ceb749559702ac1d2fde3634525cbaf76
-
SHA256
d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e
-
SHA512
5ae5ed87a7ebc4df037d080921b00c7c07660a9d289c729c7b7a093a8b28a50207f3137346e6b78f77586aa17267f1097ccff9418409bc85947a3a4ca125138c
-
SSDEEP
12288:4Mr4y90dn0u/Ycdy5FFDV1PCnT5WfG7qWmSPlOSIiWL26F9lYCurwdUwN+Q0RdQ2:Qy35Vo5DWoPlLRe/mwdUe+QcdQrvP6
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1728-19-0x00000000049B0000-0x00000000049CA000-memory.dmp healer behavioral1/memory/1728-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/1728-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-41-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1728-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pro0603.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0603.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0603.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0603.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0603.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0603.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0603.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2112-2143-0x0000000004C40000-0x0000000004C72000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/628-2156-0x0000000000340000-0x0000000000370000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si465023.exe family_redline behavioral1/memory/4704-2167-0x00000000006F0000-0x000000000071E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu0998.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qu0998.exe -
Executes dropped EXE 5 IoCs
Processes:
un725793.exepro0603.exequ0998.exe1.exesi465023.exepid process 4472 un725793.exe 1728 pro0603.exe 2112 qu0998.exe 628 1.exe 4704 si465023.exe -
Processes:
pro0603.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0603.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0603.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exeun725793.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un725793.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4736 1728 WerFault.exe pro0603.exe 4632 2112 WerFault.exe qu0998.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exeun725793.exepro0603.exequ0998.exe1.exesi465023.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un725793.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0603.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0998.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si465023.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0603.exepid process 1728 pro0603.exe 1728 pro0603.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0603.exequ0998.exedescription pid process Token: SeDebugPrivilege 1728 pro0603.exe Token: SeDebugPrivilege 2112 qu0998.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exeun725793.exequ0998.exedescription pid process target process PID 2840 wrote to memory of 4472 2840 d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exe un725793.exe PID 2840 wrote to memory of 4472 2840 d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exe un725793.exe PID 2840 wrote to memory of 4472 2840 d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exe un725793.exe PID 4472 wrote to memory of 1728 4472 un725793.exe pro0603.exe PID 4472 wrote to memory of 1728 4472 un725793.exe pro0603.exe PID 4472 wrote to memory of 1728 4472 un725793.exe pro0603.exe PID 4472 wrote to memory of 2112 4472 un725793.exe qu0998.exe PID 4472 wrote to memory of 2112 4472 un725793.exe qu0998.exe PID 4472 wrote to memory of 2112 4472 un725793.exe qu0998.exe PID 2112 wrote to memory of 628 2112 qu0998.exe 1.exe PID 2112 wrote to memory of 628 2112 qu0998.exe 1.exe PID 2112 wrote to memory of 628 2112 qu0998.exe 1.exe PID 2840 wrote to memory of 4704 2840 d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exe si465023.exe PID 2840 wrote to memory of 4704 2840 d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exe si465023.exe PID 2840 wrote to memory of 4704 2840 d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exe si465023.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exe"C:\Users\Admin\AppData\Local\Temp\d023689434864dddf3e97a750f171fd4149927bde5f45fe6f302e6b93660ba5e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un725793.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un725793.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0603.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0603.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 10804⤵
- Program crash
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0998.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0998.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 13804⤵
- Program crash
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si465023.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si465023.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1728 -ip 17281⤵PID:5040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2112 -ip 21121⤵PID:5100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5cc0e2603de179b0434a46a199341ec2a
SHA11218356303a9d750bc228849ed1e397d3cfdfd2b
SHA256f69482fee696006964e0d9aa0e2cb8f741801a8b076a02d8b23d684323555ce4
SHA512342773066bc124212793b305a0e1d78a0137cb4d5964cc5be592b11492b4a70f6687cf367d492490553aee5b1057e93ca9e5e6ad5a5926dfd24159153e3845c5
-
Filesize
641KB
MD5159f3b5ca4fc8f4bc1f5dcf697d3cd6b
SHA1334c607f4d4e97c0d410dc09b64c62d8a65e8fff
SHA256e25ada7e41a47edd218d84537704b053503b2f57f4020e7e9ab7c93810caba2b
SHA512e9bc341fb7367201f6d1136bd6f4648d6949a4e507c0a15bf4400534f47d599b06c0ed950e8293be115885d36042fe349796f15a149f5c5bfa966bc3f818b6c1
-
Filesize
241KB
MD521f1ed3c99e9406a673910dc0a56a6c0
SHA1d3d9ec5c8ea73d79f6432c46d6fec27d635669d4
SHA2563ce57c771049e0c01a2528b64ec83e9841ce4885067e9a5818aa5e5f649a4308
SHA512553e67b0bfc066e48e3d48a4175bd8c1041dba60b5965b3e6b561bf93348a10222bd53c0f6b5108000c498684acab30475d38b905c9cd1a52c774f4f61518235
-
Filesize
424KB
MD5716d697716ef0a4797bcaf4bb506bd38
SHA11170d21ce3fc50150818deb5ea68735487eb0b4c
SHA256e1b837b1454d0923d8d2946abaffdef255dd3ddc0dc27bcc5c74eb78ae1d4820
SHA5128db96b223df29a582cc9bb2a461da6de944cd622c605a5d4910afbb313b36256340d6b49a25d5a0c594631c5a28443211138740d39f32d226913ae4f4c6121ea
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0