Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6.exe
Resource
win10v2004-20241007-en
General
-
Target
7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6.exe
-
Size
1.2MB
-
MD5
c138b4ad338d4e6c6e509b18304b93cb
-
SHA1
45f4bdefb17524ae36e0f72536ef8de994ea5546
-
SHA256
7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6
-
SHA512
c1b6012d72e308a05a956d63ae4c4dcb05d12bfa2dfa56477ff397951d2ceb55bc86f6f1f7977bb3862e4be3926386699ec2825461105c5b8d7bcd06b013a883
-
SSDEEP
24576:2ymUbuNITkx2meCm43H85IF18M1P9NQ/KdWZAJu+vtg0349Z:F8JXjF18M1lW/KdWZatgJ
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/4376-22-0x00000000026B0000-0x00000000026CA000-memory.dmp healer behavioral1/memory/4376-24-0x00000000027B0000-0x00000000027C8000-memory.dmp healer behavioral1/memory/4376-46-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-38-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-32-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-25-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-28-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-26-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-52-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-50-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-48-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-44-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-43-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-40-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-36-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-34-0x00000000027B0000-0x00000000027C2000-memory.dmp healer behavioral1/memory/4376-30-0x00000000027B0000-0x00000000027C2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr611673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr611673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr611673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr611673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr611673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr611673.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/628-2204-0x0000000005050000-0x0000000005082000-memory.dmp family_redline behavioral1/files/0x0007000000023c9e-2209.dat family_redline behavioral1/memory/2452-2218-0x00000000001C0000-0x00000000001EE000-memory.dmp family_redline behavioral1/files/0x0007000000023c99-2221.dat family_redline behavioral1/memory/4048-2223-0x0000000000080000-0x00000000000B0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation qu917964.exe -
Executes dropped EXE 6 IoCs
pid Process 2384 un628940.exe 2080 un129280.exe 4376 pr611673.exe 628 qu917964.exe 2452 1.exe 4048 rk475650.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr611673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr611673.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un628940.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un129280.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un129280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr611673.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu917964.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk475650.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un628940.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4376 pr611673.exe 4376 pr611673.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4376 pr611673.exe Token: SeDebugPrivilege 628 qu917964.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2384 2216 7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6.exe 84 PID 2216 wrote to memory of 2384 2216 7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6.exe 84 PID 2216 wrote to memory of 2384 2216 7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6.exe 84 PID 2384 wrote to memory of 2080 2384 un628940.exe 85 PID 2384 wrote to memory of 2080 2384 un628940.exe 85 PID 2384 wrote to memory of 2080 2384 un628940.exe 85 PID 2080 wrote to memory of 4376 2080 un129280.exe 86 PID 2080 wrote to memory of 4376 2080 un129280.exe 86 PID 2080 wrote to memory of 4376 2080 un129280.exe 86 PID 2080 wrote to memory of 628 2080 un129280.exe 95 PID 2080 wrote to memory of 628 2080 un129280.exe 95 PID 2080 wrote to memory of 628 2080 un129280.exe 95 PID 628 wrote to memory of 2452 628 qu917964.exe 96 PID 628 wrote to memory of 2452 628 qu917964.exe 96 PID 628 wrote to memory of 2452 628 qu917964.exe 96 PID 2384 wrote to memory of 4048 2384 un628940.exe 97 PID 2384 wrote to memory of 4048 2384 un628940.exe 97 PID 2384 wrote to memory of 4048 2384 un628940.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6.exe"C:\Users\Admin\AppData\Local\Temp\7c93aabd0efbcc246097976eaa2a8605d24d06bddaf3353a28ededa90532b7f6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un628940.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un628940.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un129280.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un129280.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr611673.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr611673.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu917964.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu917964.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk475650.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk475650.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4048
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
863KB
MD50374713f9e2d86dddb2a95362244f5bd
SHA1ec6e549ef52409fead28942497a92a4e9617cce7
SHA2564af30712d9eac0550e9ab2809c86b7270367c1dfdeeeba60d73d8c65aa4e61e2
SHA512cd83ac73ba43b02b3c55d61a25167b2c652c92685a0befdcba31dabc17e263a106e8f0a7cc72200a2c3e1eeb3d1c7e6924e97ec306186e9e362bf6161b9ee9ea
-
Filesize
169KB
MD5ecf6278fff5f7f8e4b35dd4d7c537fc1
SHA18ff759ec9f150aac7685256bcc9876d702a80b94
SHA2561dad51dea28c236b16f053ebccf172655b4dab5f493e870bf23094bda3b85c6c
SHA512741ec5bf67adac7909acd0f87b745309ba7ffe5931eda6712d515c91c91a8813c95d46e8855872b39f6bffb919f2dc1c090a0f9a5550aaccd60f3299c36e3907
-
Filesize
709KB
MD5f3c6f9cd0eb470b884277d33472f3e8b
SHA1be28e1203c251bdd5da888edd045328c7391f311
SHA2560511dabe1b849aa51116b7dfbcc58813337c5c707a973faf4ea7d8360dd4e499
SHA51213029c2d498b6218e2ac867a6d6670ff96bf0edeb2d42c19aa32a75208c052dbc12e7a3209c9db2b9243b58018d5484e5238ff108a17a89a477dd04fab29a2e7
-
Filesize
404KB
MD52d7a37f3711ebdae8b7c28383b9b1813
SHA1f7b4c48f4a51167a1be0582c3deaa4fb9f940dbd
SHA25648a0262b823a6a96abb6b22021d49ddf1e94b3fb7b66c3beca29a1069c01b597
SHA512b8fafc2278cb46f3459bc65edf6034b4804f7eb358ef42f2ac6c3fdfa1af015bbf73dc6e3c61b3bbe8cb6b05871d56617db3c58b859baef517bf38db649822b8
-
Filesize
588KB
MD591f995f1e0cbceca3c72fe043fb273b0
SHA1733eda12acdaab1523cb6bfc636e8a0f62d2b368
SHA256a4dc8d039c008a1dd6af2e98bace9eae1b33d57e1c8a042de40d11d75dc43487
SHA512b860230878082934c298a6c4b771bea4a4f4b6c49f05882ba9eb0f2b05e4055fe798c2411e4c759d8f355b719ef5d8e5784770d92c5bd3a6f1bf7800ac48492f
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1