Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exe
Resource
win10v2004-20241007-en
General
-
Target
5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exe
-
Size
789KB
-
MD5
6a5d24262ba22a30bb04845037088c06
-
SHA1
b14c342ef6bfdffee284c8959041e7df8311a630
-
SHA256
5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef
-
SHA512
3463f6566eba230abfcc8115bd787050fa35725f647b0e638bf007c6b35fe32aece7fe1061b54bde3d1ebb9e184560ee1329e4577c9e9fdccf73924ffdfc33e3
-
SSDEEP
12288:rMrOy904ynrlLkjOH7oPHs4Yl0StEnGy0wTlAJpiewM4PsHzVBJJbLkCV/4W:5yInWHs4mrEG5KfPYdFXV/4W
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3344-19-0x0000000002580000-0x000000000259A000-memory.dmp healer behavioral1/memory/3344-21-0x00000000025F0000-0x0000000002608000-memory.dmp healer behavioral1/memory/3344-29-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-49-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-47-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-45-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-43-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-41-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-39-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-37-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-35-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-33-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-31-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-27-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-25-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-22-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/3344-23-0x00000000025F0000-0x0000000002602000-memory.dmp healer -
Healer family
-
Processes:
pro9399.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9399.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9399.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1212-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/840-2156-0x0000000000BD0000-0x0000000000C00000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si240064.exe family_redline behavioral1/memory/4352-2165-0x0000000000840000-0x000000000086E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7253.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation qu7253.exe -
Executes dropped EXE 5 IoCs
Processes:
un711133.exepro9399.exequ7253.exe1.exesi240064.exepid process 2764 un711133.exe 3344 pro9399.exe 1212 qu7253.exe 840 1.exe 4352 si240064.exe -
Processes:
pro9399.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9399.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9399.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exeun711133.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un711133.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 528 3344 WerFault.exe pro9399.exe 2040 1212 WerFault.exe qu7253.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu7253.exe1.exesi240064.exe5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exeun711133.exepro9399.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7253.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si240064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un711133.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9399.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9399.exepid process 3344 pro9399.exe 3344 pro9399.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9399.exequ7253.exedescription pid process Token: SeDebugPrivilege 3344 pro9399.exe Token: SeDebugPrivilege 1212 qu7253.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exeun711133.exequ7253.exedescription pid process target process PID 2704 wrote to memory of 2764 2704 5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exe un711133.exe PID 2704 wrote to memory of 2764 2704 5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exe un711133.exe PID 2704 wrote to memory of 2764 2704 5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exe un711133.exe PID 2764 wrote to memory of 3344 2764 un711133.exe pro9399.exe PID 2764 wrote to memory of 3344 2764 un711133.exe pro9399.exe PID 2764 wrote to memory of 3344 2764 un711133.exe pro9399.exe PID 2764 wrote to memory of 1212 2764 un711133.exe qu7253.exe PID 2764 wrote to memory of 1212 2764 un711133.exe qu7253.exe PID 2764 wrote to memory of 1212 2764 un711133.exe qu7253.exe PID 1212 wrote to memory of 840 1212 qu7253.exe 1.exe PID 1212 wrote to memory of 840 1212 qu7253.exe 1.exe PID 1212 wrote to memory of 840 1212 qu7253.exe 1.exe PID 2704 wrote to memory of 4352 2704 5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exe si240064.exe PID 2704 wrote to memory of 4352 2704 5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exe si240064.exe PID 2704 wrote to memory of 4352 2704 5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exe si240064.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exe"C:\Users\Admin\AppData\Local\Temp\5800eb64cb702f0235c7138c82307f50e7180e9e7d56a5869c909c9201fcefef.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un711133.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un711133.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9399.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9399.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 10404⤵
- Program crash
PID:528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7253.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7253.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 11964⤵
- Program crash
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si240064.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si240064.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3344 -ip 33441⤵PID:396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1212 -ip 12121⤵PID:1100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD56922f930598a1356391f32b06a36cc06
SHA11b053b5fa8cf8360e346e6368a6c5cabb2a54f39
SHA256d3c1ce36727c00c2921a4bce8280af5475b8c0ef78d96848881ac66a41ae70c1
SHA5129ead3c3232e51f4ff8fb776e26aaacbdb750de19ceaf2ec4cabfc01380f4f52b2493b1c707cf76bbd3484432d30a9ad5e3e667c099d7b8c10c42c2d4f7de42f4
-
Filesize
635KB
MD5db173ce99f18b1e002a8ec163dee92a8
SHA127e7027ab899c4dc3c3ac93668e91e58024844ec
SHA2561bd0d4b480cecdf1ea654bc412eaed7feabe47f9bef3f9dbb5f73da1174a5bf3
SHA5124d15e7634946ff6fc1a6dc63921659d47cd211151af577c570e1ca0d0b2ec76a5b592fb4878cea87cafba240c9dece14e83a9bee3c917398e1f2cf7a731a511e
-
Filesize
233KB
MD56b95e1717548041cae9350a6bfe7ad59
SHA1c1282c68152fbce16f3823dd701a9fb71c31c732
SHA256913060cd8495eeb80453f24242291159163046a45c1880b1a136366c59024095
SHA512b28ee831a4bc42d93b503ebf2b2afa4eefc1230d6466c2360d6a3f9acc5bded459bc2a0e4b94a79205b85a4f4efda228d97debcc7b039f2842a00b17d9d2799e
-
Filesize
417KB
MD5f1ed70952e4c91ab41ee964c5a5deb5e
SHA12d0fc2ca9e6adce4ac4deb146b667c15d4c82172
SHA2567c9ccae44717ef185cffbada97401d4a463a8a50503602992b6eb7e47d9d7b94
SHA5120b95b5474237751a954c044b99d094ce90f59303bf861a9c50c9e5fe94f21009d72f44cce17ee4a030e5a2fc80b7eb821decd79af415e4a316034182522e16b4
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0