Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:44
Static task
static1
Behavioral task
behavioral1
Sample
97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exe
Resource
win10v2004-20241007-en
General
-
Target
97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exe
-
Size
789KB
-
MD5
81a33252d971c9412230a03775d26007
-
SHA1
44c5e5f73afd8eecd4467a5e2d4f183b5efde76d
-
SHA256
97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2
-
SHA512
0a411c8f19fc5b98c799374562e3dd042bebebe8f4575ae396e6639e3aa889c72d371abfa4fc452e2f8e6b665d76a60fd614c92bc309a02a65c81f5a91564f05
-
SSDEEP
12288:BMrMy90cdo8C1wNYzNj4bIFB7WohJJUvyEI4FvTEAkBiesoNPsvfV72CEkKabf:NyJdo8cP4b4VhJJUfI4FrEPkcClNbf
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4944-19-0x00000000026B0000-0x00000000026CA000-memory.dmp healer behavioral1/memory/4944-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/4944-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4944-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro8042.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8042.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4632-2143-0x00000000053F0000-0x0000000005422000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3500-2156-0x0000000000D40000-0x0000000000D70000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527406.exe family_redline behavioral1/memory/5384-2166-0x0000000000990000-0x00000000009BE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu4117.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation qu4117.exe -
Executes dropped EXE 5 IoCs
Processes:
un141696.exepro8042.exequ4117.exe1.exesi527406.exepid process 3812 un141696.exe 4944 pro8042.exe 4632 qu4117.exe 3500 1.exe 5384 si527406.exe -
Processes:
pro8042.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8042.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8042.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exeun141696.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un141696.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1560 4944 WerFault.exe pro8042.exe 2252 4632 WerFault.exe qu4117.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exeun141696.exepro8042.exequ4117.exe1.exesi527406.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un141696.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8042.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4117.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si527406.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8042.exepid process 4944 pro8042.exe 4944 pro8042.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8042.exequ4117.exedescription pid process Token: SeDebugPrivilege 4944 pro8042.exe Token: SeDebugPrivilege 4632 qu4117.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exeun141696.exequ4117.exedescription pid process target process PID 3428 wrote to memory of 3812 3428 97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exe un141696.exe PID 3428 wrote to memory of 3812 3428 97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exe un141696.exe PID 3428 wrote to memory of 3812 3428 97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exe un141696.exe PID 3812 wrote to memory of 4944 3812 un141696.exe pro8042.exe PID 3812 wrote to memory of 4944 3812 un141696.exe pro8042.exe PID 3812 wrote to memory of 4944 3812 un141696.exe pro8042.exe PID 3812 wrote to memory of 4632 3812 un141696.exe qu4117.exe PID 3812 wrote to memory of 4632 3812 un141696.exe qu4117.exe PID 3812 wrote to memory of 4632 3812 un141696.exe qu4117.exe PID 4632 wrote to memory of 3500 4632 qu4117.exe 1.exe PID 4632 wrote to memory of 3500 4632 qu4117.exe 1.exe PID 4632 wrote to memory of 3500 4632 qu4117.exe 1.exe PID 3428 wrote to memory of 5384 3428 97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exe si527406.exe PID 3428 wrote to memory of 5384 3428 97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exe si527406.exe PID 3428 wrote to memory of 5384 3428 97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exe si527406.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exe"C:\Users\Admin\AppData\Local\Temp\97d2abaaa698e8887aebe2418d4fca24f890e23d4225d8eb34cede131849aaa2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un141696.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un141696.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8042.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8042.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 10604⤵
- Program crash
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4117.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4117.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 14724⤵
- Program crash
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527406.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527406.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5384
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 4944 -ip 49441⤵PID:2100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 4632 -ip 46321⤵PID:4824
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5c46f07c1665a209c7b6c86e536b6d737
SHA19556cf993a3a810b3c69d3452eab9e12b331b9fe
SHA2562799c95f8949e29c01a2cbfd7e9ef182933fd6594f69f2042eb0bd23ce39add0
SHA5122eff442e7a419b47ede7fc54010d45c9942189b8dac2baa6b88114489bd92269fba5528c632321eee51eed6746e338ea00a5f3a4192882af30663a54d5b6f07d
-
Filesize
635KB
MD59a599a5a2f855b34380954a381b95f22
SHA161410d73d4e55579b182da8e33e2958f30facb2e
SHA25656760413e2dadf1f4fdc78500aeb7790d92c42d0e6701cf4ed39b9cfe9676aec
SHA51218085389b69a7de838c4951cbb39633ac8453031762e60d3cc58d59ac63f8c22fc33ec5e9c78656cbdd39c266f62a67c2b90f230718418fc20bfc4e6e615090a
-
Filesize
233KB
MD5eb4c12aa58b0fa689db975f89f680a16
SHA13a3ea74b04d695b61e09e8b09dd5a380a85ab30d
SHA256bc48700be0970a8aa0d3ec26c8897e845bf2e357718b12808475c685270b31b8
SHA512d33cf86327b0d924d0deffe3a8431d9dcdf68c4ca9f1d8a7b8668789f55cc79bcfa6bf215e9b5fad8f4e93e7a85b425d2c6e9788ac83e7b4414db9f5cb5a58af
-
Filesize
417KB
MD5200f9f4ec12d5178aa72f517bebd13e9
SHA125338d9f96bac720d4bf22f21f15b3189ff43093
SHA256b02d7daa0f6e8b9e6f19f86586302afdff8d5c0b8b5a870078f92cd732196173
SHA5125462550d7188c75977b30fdf5bee3806f2badefd5c0264d6d075bb197556c865bf92d621082b2c2ba4a5421666c31ba20bd1015119e0a35f5a21c4559a8d11b6
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0