Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 16:19
Static task
static1
Behavioral task
behavioral1
Sample
0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exe
Resource
win10v2004-20241007-en
General
-
Target
0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exe
-
Size
787KB
-
MD5
53a8bec9fba38206589dfd0cfae95fc2
-
SHA1
6c00a0b289454ec35402a947f1e7496811e97b66
-
SHA256
0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95
-
SHA512
2874172649155435eb146e0f65e3cb8e0eac84c44339d6480dbd4cc11dc8334d0b018a24a626d914ab628531b50df6fa82d4cc6330a025c76d2358d961521e4d
-
SSDEEP
12288:hMrsy90fLaohnoWDvFvlF3uJeftaPv/vltpuZ3XV1PdqQY38A1:Jy0eohndR3uJbPvltYZ3XTVY38Q
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1948-19-0x0000000002390000-0x00000000023AA000-memory.dmp healer behavioral1/memory/1948-21-0x0000000002600000-0x0000000002618000-memory.dmp healer behavioral1/memory/1948-29-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-49-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-47-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-45-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-43-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-41-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-37-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-35-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-33-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-27-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-25-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-39-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-23-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-31-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1948-22-0x0000000002600000-0x0000000002612000-memory.dmp healer -
Healer family
-
Processes:
pro6542.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6542.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4620-2143-0x0000000004CC0000-0x0000000004CF2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2228-2156-0x0000000000460000-0x0000000000490000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si265521.exe family_redline behavioral1/memory/3944-2167-0x0000000000850000-0x000000000087E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu0115.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation qu0115.exe -
Executes dropped EXE 5 IoCs
Processes:
un096585.exepro6542.exequ0115.exe1.exesi265521.exepid process 224 un096585.exe 1948 pro6542.exe 4620 qu0115.exe 2228 1.exe 3944 si265521.exe -
Processes:
pro6542.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6542.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6542.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exeun096585.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un096585.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1980 1948 WerFault.exe pro6542.exe 4956 4620 WerFault.exe qu0115.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exesi265521.exe0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exeun096585.exepro6542.exequ0115.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si265521.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un096585.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6542.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0115.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6542.exepid process 1948 pro6542.exe 1948 pro6542.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6542.exequ0115.exedescription pid process Token: SeDebugPrivilege 1948 pro6542.exe Token: SeDebugPrivilege 4620 qu0115.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exeun096585.exequ0115.exedescription pid process target process PID 1692 wrote to memory of 224 1692 0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exe un096585.exe PID 1692 wrote to memory of 224 1692 0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exe un096585.exe PID 1692 wrote to memory of 224 1692 0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exe un096585.exe PID 224 wrote to memory of 1948 224 un096585.exe pro6542.exe PID 224 wrote to memory of 1948 224 un096585.exe pro6542.exe PID 224 wrote to memory of 1948 224 un096585.exe pro6542.exe PID 224 wrote to memory of 4620 224 un096585.exe qu0115.exe PID 224 wrote to memory of 4620 224 un096585.exe qu0115.exe PID 224 wrote to memory of 4620 224 un096585.exe qu0115.exe PID 4620 wrote to memory of 2228 4620 qu0115.exe 1.exe PID 4620 wrote to memory of 2228 4620 qu0115.exe 1.exe PID 4620 wrote to memory of 2228 4620 qu0115.exe 1.exe PID 1692 wrote to memory of 3944 1692 0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exe si265521.exe PID 1692 wrote to memory of 3944 1692 0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exe si265521.exe PID 1692 wrote to memory of 3944 1692 0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exe si265521.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exe"C:\Users\Admin\AppData\Local\Temp\0081886f557bcb2c4b6cbb5d45b7ad06cf5e4c6b38a1bdacfe985ad1bc7b6d95.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096585.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096585.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6542.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6542.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 10804⤵
- Program crash
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0115.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0115.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 12004⤵
- Program crash
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si265521.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si265521.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1948 -ip 19481⤵PID:3196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4620 -ip 46201⤵PID:2780
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5588c4eae776917738e83337f7c90d340
SHA17f18ec1997fd052c1e628f35e20daa901922a444
SHA25635d77b559e1cbf5016f244eb04012b0be3af9627d5733aa2db66c992f173a0f6
SHA51236a99076b8fd9e11ba92a0c81c6516347904e9cbb28d0fbc891849702cfc4734f4213b5c1eb7138a2de08a6a901625381253019f6a3853d6be82736c5b2f59e1
-
Filesize
633KB
MD58e93d6296df0e697886e048442166a1b
SHA1ea32f957d58b6ab77488971b82f4a09fdc0209b7
SHA256dc5b10a6606faa234b3be924f800dd6cc83e8066faae0e4d859e9c6eec3467bd
SHA512516d4389f64950372358a82f36aa7c08faa6ed8211725b655eb4c59ecd1f7202846a292eefce0b4adda30caf07fe4a967c4290273e002da55db9449711c8ce66
-
Filesize
230KB
MD5c55e684d9c904059bb1419cd233772c6
SHA10796d2b8674a9a98e285116bc008de18386a0d4c
SHA25606de2aa75aee8d4aca46cc8bc26c5879f8f314e9d3fb60e01073e95c115fbbe6
SHA5120367ffacfa66c56f33406abbc03bc33f63f73f47d91caea005b89274c8356c6c245f050f790550b9ec25861ef336dae1f6a733c638da0b8902ccff792e3a55ef
-
Filesize
414KB
MD5c131751daf40be466c13f7311beb9d66
SHA1e654cbdc6fa530c1efbdfb20a83abd4b1700aa11
SHA256c7b605195e39e3f574d1671a3200f0831ee83baa5778e696012bb257f7eabd98
SHA512e38e464edda4c382b4e834f30c1182d1770dbac46f99ecd1c34cdaa3102b98f589bfb603023f0b7a539d2f89df3053d2517c3370f8c2320058a9aa4818431d2c
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0