Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:42
Static task
static1
Behavioral task
behavioral1
Sample
43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exe
Resource
win10v2004-20241007-en
General
-
Target
43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exe
-
Size
787KB
-
MD5
0662e30ef1a861b103ff265dd5477d8e
-
SHA1
321d6ad729275606264085b5207f7352d1b2a216
-
SHA256
43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655
-
SHA512
5accd18323074afa65d282711bcbe4313606e41ba83c6a281dc5428db702723ad590608c7bf82b72cae666b19583e89d506693a9db82c37a65320a6f1aba3fc8
-
SSDEEP
12288:1MrEy90wlnlbUoD7h2f9lJgWE89viwhp3h/1tdY349oDc2gdd3d+:Ny3dH09lJB9viCp3hdS4CQlJQ
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4956-19-0x0000000002550000-0x000000000256A000-memory.dmp healer behavioral1/memory/4956-21-0x00000000026F0000-0x0000000002708000-memory.dmp healer behavioral1/memory/4956-27-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-49-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-48-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-46-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-43-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-41-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-39-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-37-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-35-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-33-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-32-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-29-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-25-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-23-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4956-22-0x00000000026F0000-0x0000000002702000-memory.dmp healer -
Healer family
-
Processes:
pro5682.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5682.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1308-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5408-2155-0x00000000003F0000-0x0000000000420000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si705326.exe family_redline behavioral1/memory/4404-2165-0x0000000000820000-0x000000000084E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu4935.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qu4935.exe -
Executes dropped EXE 5 IoCs
Processes:
un680760.exepro5682.exequ4935.exe1.exesi705326.exepid process 2092 un680760.exe 4956 pro5682.exe 1308 qu4935.exe 5408 1.exe 4404 si705326.exe -
Processes:
pro5682.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5682.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5682.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exeun680760.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un680760.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3864 4956 WerFault.exe pro5682.exe 4344 1308 WerFault.exe qu4935.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu4935.exe1.exesi705326.exe43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exeun680760.exepro5682.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4935.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si705326.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un680760.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5682.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5682.exepid process 4956 pro5682.exe 4956 pro5682.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5682.exequ4935.exedescription pid process Token: SeDebugPrivilege 4956 pro5682.exe Token: SeDebugPrivilege 1308 qu4935.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exeun680760.exequ4935.exedescription pid process target process PID 2344 wrote to memory of 2092 2344 43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exe un680760.exe PID 2344 wrote to memory of 2092 2344 43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exe un680760.exe PID 2344 wrote to memory of 2092 2344 43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exe un680760.exe PID 2092 wrote to memory of 4956 2092 un680760.exe pro5682.exe PID 2092 wrote to memory of 4956 2092 un680760.exe pro5682.exe PID 2092 wrote to memory of 4956 2092 un680760.exe pro5682.exe PID 2092 wrote to memory of 1308 2092 un680760.exe qu4935.exe PID 2092 wrote to memory of 1308 2092 un680760.exe qu4935.exe PID 2092 wrote to memory of 1308 2092 un680760.exe qu4935.exe PID 1308 wrote to memory of 5408 1308 qu4935.exe 1.exe PID 1308 wrote to memory of 5408 1308 qu4935.exe 1.exe PID 1308 wrote to memory of 5408 1308 qu4935.exe 1.exe PID 2344 wrote to memory of 4404 2344 43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exe si705326.exe PID 2344 wrote to memory of 4404 2344 43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exe si705326.exe PID 2344 wrote to memory of 4404 2344 43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exe si705326.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exe"C:\Users\Admin\AppData\Local\Temp\43717ffc3a0573d4a4a737e4b20436bd60ceb69916ed64c86230fad420ff9655.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un680760.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un680760.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5682.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5682.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 11044⤵
- Program crash
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4935.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4935.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 15004⤵
- Program crash
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si705326.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si705326.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4956 -ip 49561⤵PID:1664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1308 -ip 13081⤵PID:1076
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD50ff1ab7177f911207257ee00f1bc3c01
SHA16bde1061ef2832bad0a5dc77e211a1999f3dbd94
SHA256f2146ef98b6b2b6038aee4d9d1ffe5af47775c679173a3254e717b4b9e0c4820
SHA512f79077d363c67ab817082e2bea287f4b14cbb7347a13484777e5d6635ac801f176bde367f3fdb27d095535d25e1861a7d5ad381f77cb5e1ae9e5a1ad05c7448d
-
Filesize
633KB
MD549cfc255032a8e03c03db53b15001166
SHA1624818055db31d86e7b083629eba250af5400df2
SHA2560ff3394020340d8b94bc8d90321f60e43d3f5839cfe6f9e79cef20af85e1341e
SHA512d4013b269ae0fde553ac42872458dce1da074e588e60035ae72c1db7a091612bf8f7305e1fc4278646b8bcb347765528b93824f2a8f0a6a77820d2104c11d5ff
-
Filesize
230KB
MD53aec8fd05254291284493fd63971e9cf
SHA1e971c90caa510f846a091105dd2e1fe7627625d1
SHA25665a6c1465097464e20e6253851941aae1241e50fbe65323a12043dcfb31a0156
SHA5122f93f7c6ccb2abf5b5c267b0e300d45b232f7d76b44cb4a1dfed42da97f903626bd8d1f0830974b8293535e797941900913bbc651f0155121ec2696c66f961f3
-
Filesize
414KB
MD5562c8ae659392e78e4cc16295d29b8e2
SHA1084f36ade0d8bf14da75b7351d9d058b11e030dc
SHA256f3a16387c9c65be42f210b7013b067bebfca73c542ab135cdf9a102b45eab3d9
SHA51204447253f45bafd4467efa9a03e78fa7416779e7aac5be5a602c677e657487d32939ef72f3d0e8dc764875311b0b31bc8a455541276b56c00e94f6cce8097daa
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0