Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:13
Static task
static1
Behavioral task
behavioral1
Sample
2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exe
Resource
win10v2004-20241007-en
General
-
Target
2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exe
-
Size
787KB
-
MD5
31951fb1c959be91913b3396eac23e87
-
SHA1
989ee5b4794b24789d3d1bcca87226f47338ae45
-
SHA256
2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e
-
SHA512
a4d12c265b38d3e5e7678ddd1bafac427b455803990374e064a0aa87379b2d363d624846a05cc1996d5bbe605aeafb4e7bf139f7d06be38f8f5136713e80f9db
-
SSDEEP
12288:hMray90GG21/nWXHmwSQqwPsxQv9jIFiCUU007B1mcZVl+J8zZNo:TyruXsQqwExi9jIFiCUwDmIaqVq
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/452-19-0x0000000000780000-0x000000000079A000-memory.dmp healer behavioral1/memory/452-21-0x0000000004A60000-0x0000000004A78000-memory.dmp healer behavioral1/memory/452-25-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-33-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-49-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-47-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-46-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-43-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-41-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-39-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-37-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-36-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-31-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-27-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-29-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-23-0x0000000004A60000-0x0000000004A72000-memory.dmp healer behavioral1/memory/452-22-0x0000000004A60000-0x0000000004A72000-memory.dmp healer -
Healer family
-
Processes:
pro6771.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6771.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6771.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3120-2142-0x0000000005430000-0x0000000005462000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5168-2154-0x0000000000BB0000-0x0000000000BE0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si813165.exe family_redline behavioral1/memory/5804-2165-0x0000000000540000-0x000000000056E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu8647.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation qu8647.exe -
Executes dropped EXE 5 IoCs
Processes:
un143837.exepro6771.exequ8647.exe1.exesi813165.exepid process 1256 un143837.exe 452 pro6771.exe 3120 qu8647.exe 5168 1.exe 5804 si813165.exe -
Processes:
pro6771.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6771.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exeun143837.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un143837.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2508 452 WerFault.exe pro6771.exe 5592 3120 WerFault.exe qu8647.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro6771.exequ8647.exe1.exesi813165.exe2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exeun143837.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6771.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8647.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si813165.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un143837.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6771.exepid process 452 pro6771.exe 452 pro6771.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6771.exequ8647.exedescription pid process Token: SeDebugPrivilege 452 pro6771.exe Token: SeDebugPrivilege 3120 qu8647.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exeun143837.exequ8647.exedescription pid process target process PID 4700 wrote to memory of 1256 4700 2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exe un143837.exe PID 4700 wrote to memory of 1256 4700 2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exe un143837.exe PID 4700 wrote to memory of 1256 4700 2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exe un143837.exe PID 1256 wrote to memory of 452 1256 un143837.exe pro6771.exe PID 1256 wrote to memory of 452 1256 un143837.exe pro6771.exe PID 1256 wrote to memory of 452 1256 un143837.exe pro6771.exe PID 1256 wrote to memory of 3120 1256 un143837.exe qu8647.exe PID 1256 wrote to memory of 3120 1256 un143837.exe qu8647.exe PID 1256 wrote to memory of 3120 1256 un143837.exe qu8647.exe PID 3120 wrote to memory of 5168 3120 qu8647.exe 1.exe PID 3120 wrote to memory of 5168 3120 qu8647.exe 1.exe PID 3120 wrote to memory of 5168 3120 qu8647.exe 1.exe PID 4700 wrote to memory of 5804 4700 2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exe si813165.exe PID 4700 wrote to memory of 5804 4700 2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exe si813165.exe PID 4700 wrote to memory of 5804 4700 2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exe si813165.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exe"C:\Users\Admin\AppData\Local\Temp\2a818f46c22a4fddc7846c657c79427cb46f0de83bdb0c6bde8e1af908987a1e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un143837.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un143837.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6771.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6771.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 10844⤵
- Program crash
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8647.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8647.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 15204⤵
- Program crash
PID:5592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si813165.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si813165.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 452 -ip 4521⤵PID:4972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3120 -ip 31201⤵PID:5368
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD580aec950c781fe674d6aef352a86cc35
SHA11ff944ead1a051dd0326764b726a6e80dbac05ee
SHA2569de92a9de43f3ae040661864a0e44a243671a20215992423966c20847729ddf5
SHA512f6f21663c0880fdcf3c21fc9ef0cee957a2663504f326c8b187ca5c4a0d0c3be8f021266a272394a117c1b395ef14f817fed09f1e4a5c8125cc97e7913fbbf38
-
Filesize
633KB
MD56bf5bd96fed9694ccd5722e3a644e67f
SHA1c53e5ae1cf50a2f82e44d066f9b75811ee3d4b31
SHA256f1829287d63f8e286301f2b8b52f66866885b17d5b8a6765b5b4c65d533087ca
SHA51295db76dcff4ecb865f20d8b3464714a5437a94e12936a1d0bc41e3bc70f0ec6cb63b5e7ae38183eca5d0a624b9794f54571bac746a97299ea775e57f7dce4bc3
-
Filesize
231KB
MD5b5abf602859041f6a5a95457758c0184
SHA14db865317210b986f95c3b24355b8e1546693a1d
SHA256caafbde414c4b8940b89669d3dd24cbede65b49e6b4789384c77f0b1f0148126
SHA5125a5daec6ebc5ac31104513c70f8246fce510450984f328c388844b78c8ae6c755a0117108e078169fe83e2c334ffa2d6a294ed464b131d2d45485f668e5098db
-
Filesize
414KB
MD5c119b65015f234838e14e278f6fedde2
SHA14933cf0fc83f1c95c61ffb53f81315a63312331f
SHA25624722f90236d484200c80293702ab8c5f0cb69ad209e76f2270235401316e5f7
SHA512a5b2a10465547d7cbd287b29b005870182c67a69ed106835ba6b8fda57a865f02b146bab2361e5436cff0845ddb1ae543469c83d6ce4500c1017539c949e813f
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0