Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe
Resource
win10v2004-20241007-en
General
-
Target
3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe
-
Size
815KB
-
MD5
c8686cc5613060cf6d3d461a8c2c5221
-
SHA1
0806f72e6442246fcb9bee7aaa44f37aab87a3c9
-
SHA256
3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d
-
SHA512
b62f30f04d3d24bc4e2847ed225e9498592b5e406d405686e622bda276ec8a75cbb262b178f4b0d20af21c1966d42ab23d3d087190ff6575da6ecac5b0289bb8
-
SSDEEP
12288:wMrKy90+YHGsT/fWypwN2dcdi2AugS4TPJrS1Nr0YOw:qy0GIxpa2dck2KHV6low
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4636-19-0x0000000002580000-0x000000000259A000-memory.dmp healer behavioral1/memory/4636-21-0x00000000026F0000-0x0000000002708000-memory.dmp healer behavioral1/memory/4636-33-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-49-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-47-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-45-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-43-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-41-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-39-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-37-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-35-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-31-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-27-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-23-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-22-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-29-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4636-25-0x00000000026F0000-0x0000000002702000-memory.dmp healer -
Healer family
-
Processes:
pro0957.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0957.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0957.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2628-2142-0x0000000004EE0000-0x0000000004F12000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/6968-2155-0x0000000000FC0000-0x0000000000FF0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076967.exe family_redline behavioral1/memory/1908-2166-0x0000000000F50000-0x0000000000F7E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu4436.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation qu4436.exe -
Executes dropped EXE 5 IoCs
Processes:
un468372.exepro0957.exequ4436.exe1.exesi076967.exepid process 1612 un468372.exe 4636 pro0957.exe 2628 qu4436.exe 6968 1.exe 1908 si076967.exe -
Processes:
pro0957.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0957.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0957.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exeun468372.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un468372.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2520 4636 WerFault.exe pro0957.exe 5708 2628 WerFault.exe qu4436.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exeun468372.exepro0957.exequ4436.exe1.exesi076967.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un468372.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0957.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4436.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si076967.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0957.exepid process 4636 pro0957.exe 4636 pro0957.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0957.exequ4436.exedescription pid process Token: SeDebugPrivilege 4636 pro0957.exe Token: SeDebugPrivilege 2628 qu4436.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exeun468372.exequ4436.exedescription pid process target process PID 752 wrote to memory of 1612 752 3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe un468372.exe PID 752 wrote to memory of 1612 752 3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe un468372.exe PID 752 wrote to memory of 1612 752 3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe un468372.exe PID 1612 wrote to memory of 4636 1612 un468372.exe pro0957.exe PID 1612 wrote to memory of 4636 1612 un468372.exe pro0957.exe PID 1612 wrote to memory of 4636 1612 un468372.exe pro0957.exe PID 1612 wrote to memory of 2628 1612 un468372.exe qu4436.exe PID 1612 wrote to memory of 2628 1612 un468372.exe qu4436.exe PID 1612 wrote to memory of 2628 1612 un468372.exe qu4436.exe PID 2628 wrote to memory of 6968 2628 qu4436.exe 1.exe PID 2628 wrote to memory of 6968 2628 qu4436.exe 1.exe PID 2628 wrote to memory of 6968 2628 qu4436.exe 1.exe PID 752 wrote to memory of 1908 752 3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe si076967.exe PID 752 wrote to memory of 1908 752 3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe si076967.exe PID 752 wrote to memory of 1908 752 3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe si076967.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe"C:\Users\Admin\AppData\Local\Temp\3267e90c2fb80d84c034de728a3d6b6bf367f624ea7757cb44b74edfb1e8776d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468372.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un468372.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0957.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0957.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4636 -s 10884⤵
- Program crash
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4436.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4436.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6968 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2628 -s 14884⤵
- Program crash
PID:5708 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076967.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si076967.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4636 -ip 46361⤵PID:2636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2628 -ip 26281⤵PID:6524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5c9546bde2923c73847cdf80eb75af94c
SHA1bdba089825f822bed238fd16617f974d510e22c4
SHA256a3d13fa2eb1e7691f151c88f91fb2f543269801c289e38b511ac108668904862
SHA5127c44612bc094fb6d936be0faa1de538f53f2124ac0ebfd3402391b758e27063a74f3408bd9885d46a5349752a583e20e3fbb05da9ebd00d55ada79e39046315c
-
Filesize
661KB
MD5c6fab10bab20a3144bfc40e40373e476
SHA144a593623e9f8f7fe5e8fbcc0441c7e14fd00760
SHA2565f574a87397881e072fad9298e268270d7998be3f74377e4ec35423f5e340c09
SHA512f7212db2701892c4f4bc6d39fa223c36a1a5d38b8cd233f5be4919eac9e635670cc74b9eda9cd95d45c8bb53ba4da04b2fe511013d20e129b9fa4c6db5856c7c
-
Filesize
332KB
MD59cf3755e7b86c5ff55b845c497142aa6
SHA1430d1908152d8af25f9a282489ddb60d57ad40dd
SHA25668c053817aa29e9ed93ad5d803b20b91c6ba5606dc1b3d605226a3454ef3481b
SHA51248ebf7a4956365bbc74d6b4339f2e5020bf258d23453cdbcfe3d004eef5bf40a3733989585b3ec2b929236d7522e4cf3dba854292fc2ff1e82569f32e3ce51a6
-
Filesize
495KB
MD5ff0012a44a8d27cc5744c47c6cf37a2a
SHA16eaf7d389fadf372b26e8b34ea9b5bdaa26409fd
SHA256e90ebe6d5941d229cbadac429c05169b923243bb25a73654aac98272593494d5
SHA5123360e54482075e71b42240080fab35992fd66c008f0374b27e3f82f3343408368ca45bd13d44c0a68fb0978e532ebc4378c669a7c3be71e9d838f2d03f9066de
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0