Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exe
Resource
win10v2004-20241007-en
General
-
Target
cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exe
-
Size
814KB
-
MD5
bcb27dbbe155eff5c5c16d138612c46d
-
SHA1
4218152cbbf2fdad65a60a47d9eaba288b6bfa56
-
SHA256
cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11
-
SHA512
b5f00c2c82c32095981fb0675c00210916676b8087e7d618881ce6bbdf8bd5f2ccbc926a7a7f260a429ab09523702ebcdec0682c6efc16359946a1cea90e2c56
-
SSDEEP
12288:kMrWy9088AsHRAC8jk1nNC2WPsx1PhauZQzqc5Lcz5GnI2wxymDQRh/xlnO+YfyQ:qy/8rizCN9sQLZ54pMTDinU+Y19n
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3492-19-0x0000000002880000-0x000000000289A000-memory.dmp healer behavioral1/memory/3492-21-0x0000000004DB0000-0x0000000004DC8000-memory.dmp healer behavioral1/memory/3492-23-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-22-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-49-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-45-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-43-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-42-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-39-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-37-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-35-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-33-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-31-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-29-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-27-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-47-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/3492-25-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer -
Healer family
-
Processes:
pro0120.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0120.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0120.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2328-2142-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3460-2155-0x0000000000A90000-0x0000000000AC0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si106260.exe family_redline behavioral1/memory/840-2166-0x0000000000270000-0x000000000029E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu6412.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation qu6412.exe -
Executes dropped EXE 5 IoCs
Processes:
un165371.exepro0120.exequ6412.exe1.exesi106260.exepid process 3556 un165371.exe 3492 pro0120.exe 2328 qu6412.exe 3460 1.exe 840 si106260.exe -
Processes:
pro0120.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0120.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0120.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exeun165371.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un165371.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4664 3492 WerFault.exe pro0120.exe 1916 2328 WerFault.exe qu6412.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exeun165371.exepro0120.exequ6412.exe1.exesi106260.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un165371.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0120.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6412.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si106260.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0120.exepid process 3492 pro0120.exe 3492 pro0120.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0120.exequ6412.exedescription pid process Token: SeDebugPrivilege 3492 pro0120.exe Token: SeDebugPrivilege 2328 qu6412.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exeun165371.exequ6412.exedescription pid process target process PID 3252 wrote to memory of 3556 3252 cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exe un165371.exe PID 3252 wrote to memory of 3556 3252 cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exe un165371.exe PID 3252 wrote to memory of 3556 3252 cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exe un165371.exe PID 3556 wrote to memory of 3492 3556 un165371.exe pro0120.exe PID 3556 wrote to memory of 3492 3556 un165371.exe pro0120.exe PID 3556 wrote to memory of 3492 3556 un165371.exe pro0120.exe PID 3556 wrote to memory of 2328 3556 un165371.exe qu6412.exe PID 3556 wrote to memory of 2328 3556 un165371.exe qu6412.exe PID 3556 wrote to memory of 2328 3556 un165371.exe qu6412.exe PID 2328 wrote to memory of 3460 2328 qu6412.exe 1.exe PID 2328 wrote to memory of 3460 2328 qu6412.exe 1.exe PID 2328 wrote to memory of 3460 2328 qu6412.exe 1.exe PID 3252 wrote to memory of 840 3252 cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exe si106260.exe PID 3252 wrote to memory of 840 3252 cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exe si106260.exe PID 3252 wrote to memory of 840 3252 cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exe si106260.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exe"C:\Users\Admin\AppData\Local\Temp\cf5ee47e31fab1f0c85c5cea58dde47b42a0a7afd3ada06b54a4a805258beb11.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165371.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165371.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0120.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0120.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3492 -s 10844⤵
- Program crash
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6412.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6412.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 13844⤵
- Program crash
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si106260.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si106260.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3492 -ip 34921⤵PID:4104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2328 -ip 23281⤵PID:1404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD54b05f563e94e997d9793cba5618bb03a
SHA1268194be341f90a69ea12a042579e776760ef7a0
SHA2569691a33940ab64e369228728b38e400ebcb55b02970ec7101c17e0fdcb615592
SHA512b108dcd553a8785cbe0f5b3528d47c95e6ae3afe6e5672639c772567e86a70319a3afa9a51d1bc4de90ad6a4716fe7739c154651173ba3d14024ebc137624173
-
Filesize
660KB
MD5fed91eba63e2735cde3ce69eefe447e8
SHA19e6dfbd2c2abf3247f5dbdaa2adf22c0ac4c57ca
SHA256b52679f751d2ef7d6e44a0d4810aadebbeb524ac62b38419b46ca8415a7b5edb
SHA5127223842384848f6e40fe81eb7e9c66bab262f16736c0166f64af29b13a80e896050c31717e1b5d3f81989afa7f72acc539404c16324932310d0bf8c6f322bebf
-
Filesize
312KB
MD551274d2a77f43f12d32b75171a05b181
SHA1a9f3b0d483b6957ced59d73041fdf610f8afbf50
SHA25625dad6299c81bad7359ff6935ffb1bbdb65aa93ce56b0ca8b6d35040b01feb5f
SHA512c1564e3e39adaebb43712b7d6774a03575e748ec49aa0ab3b6ac353037d4caaa698ac2059e86f8ac8685c04a6835a2145039d6782054793df02525ce5df40bd5
-
Filesize
495KB
MD5f15ada4111b50708de6df2b74d4e3903
SHA1f2a47c9251802f894d765092b9a044241e0fa60c
SHA2567b1129fd1f473fc33d044008835f3613e9596d0331873d9e864e57e390802683
SHA512ba12549faedce15b662fb9324fe8d44113bfe6d8f00d2cf80aeb67c46ca7a3c624c8d685805c42ff20e119b850b6c7732aa41423e13f111962a2e8ced2905b8c
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0