Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 23:58
Static task
static1
Behavioral task
behavioral1
Sample
50b8b64b03f84521f3fcae1e365fef8797b9c297389ddfe805e9dd71f7da408b.exe
Resource
win10v2004-20241007-en
General
-
Target
50b8b64b03f84521f3fcae1e365fef8797b9c297389ddfe805e9dd71f7da408b.exe
-
Size
1.2MB
-
MD5
60a2aefdd5060be6c57220b96c23e2ac
-
SHA1
a88aff33a6e2c375216dc334657cd25c6b94a6f6
-
SHA256
50b8b64b03f84521f3fcae1e365fef8797b9c297389ddfe805e9dd71f7da408b
-
SHA512
e134bc2b4e285157e318424b908a6b0e91ece611c1994cf6b76120dbe9e0d62e7e56cf75fba256ec8306635f53a6f73c1d4e533b796e43cde9562aab982abba6
-
SSDEEP
24576:FyBO7igaQyqj4J8Hgak24X+EBosDeYaHhrte0ky:gBTffmu0gak5B6i
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/224-22-0x0000000002630000-0x000000000264A000-memory.dmp healer behavioral1/memory/224-24-0x00000000027E0000-0x00000000027F8000-memory.dmp healer behavioral1/memory/224-36-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-25-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-52-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-50-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-48-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-26-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-46-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-44-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-42-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-40-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-38-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-34-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-32-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-30-0x00000000027E0000-0x00000000027F2000-memory.dmp healer behavioral1/memory/224-28-0x00000000027E0000-0x00000000027F2000-memory.dmp healer -
Healer family
-
Processes:
pr769338.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr769338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr769338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr769338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr769338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr769338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr769338.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1812-2204-0x0000000005780000-0x00000000057B2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/856-2217-0x0000000000800000-0x000000000082E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk943789.exe family_redline behavioral1/memory/3816-2228-0x0000000000990000-0x00000000009C0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu934106.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qu934106.exe -
Executes dropped EXE 6 IoCs
Processes:
un460181.exeun027527.exepr769338.exequ934106.exe1.exerk943789.exepid process 3520 un460181.exe 3540 un027527.exe 224 pr769338.exe 1812 qu934106.exe 856 1.exe 3816 rk943789.exe -
Processes:
pr769338.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr769338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr769338.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
50b8b64b03f84521f3fcae1e365fef8797b9c297389ddfe805e9dd71f7da408b.exeun460181.exeun027527.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 50b8b64b03f84521f3fcae1e365fef8797b9c297389ddfe805e9dd71f7da408b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un460181.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un027527.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3740 224 WerFault.exe pr769338.exe 2944 1812 WerFault.exe qu934106.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
50b8b64b03f84521f3fcae1e365fef8797b9c297389ddfe805e9dd71f7da408b.exeun460181.exeun027527.exepr769338.exequ934106.exe1.exerk943789.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50b8b64b03f84521f3fcae1e365fef8797b9c297389ddfe805e9dd71f7da408b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un460181.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un027527.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr769338.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu934106.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk943789.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr769338.exepid process 224 pr769338.exe 224 pr769338.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr769338.exequ934106.exedescription pid process Token: SeDebugPrivilege 224 pr769338.exe Token: SeDebugPrivilege 1812 qu934106.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
50b8b64b03f84521f3fcae1e365fef8797b9c297389ddfe805e9dd71f7da408b.exeun460181.exeun027527.exequ934106.exedescription pid process target process PID 3364 wrote to memory of 3520 3364 50b8b64b03f84521f3fcae1e365fef8797b9c297389ddfe805e9dd71f7da408b.exe un460181.exe PID 3364 wrote to memory of 3520 3364 50b8b64b03f84521f3fcae1e365fef8797b9c297389ddfe805e9dd71f7da408b.exe un460181.exe PID 3364 wrote to memory of 3520 3364 50b8b64b03f84521f3fcae1e365fef8797b9c297389ddfe805e9dd71f7da408b.exe un460181.exe PID 3520 wrote to memory of 3540 3520 un460181.exe un027527.exe PID 3520 wrote to memory of 3540 3520 un460181.exe un027527.exe PID 3520 wrote to memory of 3540 3520 un460181.exe un027527.exe PID 3540 wrote to memory of 224 3540 un027527.exe pr769338.exe PID 3540 wrote to memory of 224 3540 un027527.exe pr769338.exe PID 3540 wrote to memory of 224 3540 un027527.exe pr769338.exe PID 3540 wrote to memory of 1812 3540 un027527.exe qu934106.exe PID 3540 wrote to memory of 1812 3540 un027527.exe qu934106.exe PID 3540 wrote to memory of 1812 3540 un027527.exe qu934106.exe PID 1812 wrote to memory of 856 1812 qu934106.exe 1.exe PID 1812 wrote to memory of 856 1812 qu934106.exe 1.exe PID 1812 wrote to memory of 856 1812 qu934106.exe 1.exe PID 3520 wrote to memory of 3816 3520 un460181.exe rk943789.exe PID 3520 wrote to memory of 3816 3520 un460181.exe rk943789.exe PID 3520 wrote to memory of 3816 3520 un460181.exe rk943789.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50b8b64b03f84521f3fcae1e365fef8797b9c297389ddfe805e9dd71f7da408b.exe"C:\Users\Admin\AppData\Local\Temp\50b8b64b03f84521f3fcae1e365fef8797b9c297389ddfe805e9dd71f7da408b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460181.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460181.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un027527.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un027527.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr769338.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr769338.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 10885⤵
- Program crash
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu934106.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu934106.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 13885⤵
- Program crash
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk943789.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk943789.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 224 -ip 2241⤵PID:376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1812 -ip 18121⤵PID:2020
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
862KB
MD55ee0f3b1dad07c2a4e921bab3f42e70a
SHA1aab2614f86c1d7387c4804c5403399b8d97db221
SHA256b2e22f5d3c4855d64cd0e36db93fbd60bad7da03a3f6261582acc024544063a5
SHA512f5d27e1c19e4d0716f287bc178f06dcca38d4da50ad266d41053709054a95a6bb94f05b3381d30a8db619e2c19d96a82425dc43d717e269b44ac2c67595ef94c
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
708KB
MD56c2aae4e41e32e6488e749de4602d188
SHA144f199438f30027113fd408a617dabdf2c91a360
SHA2565ed2b797b100394adef1596b0882ca5576e19cd1bffc665d426d8dee74d21e87
SHA512c63a0276ca30a374c62ced41cc72712c69d590757bd9dca18e7708926c1a1f3cd6fbe740202636000c80ee44b1b74b912938899864e5ffc55249c0e267b0086a
-
Filesize
405KB
MD5ad5d2fbc5e70b34cb1d4598c186a65aa
SHA156e6b12a82a3f1382cd3e8cc7cef2288de56efd2
SHA256eb534259087377b6c4fa14476823b2a2a507210f4acbc776b5725cad28f0ccb0
SHA51280ef799e5d1377c0355c2ec40a57d32dbc7561fe681cc20ac9f09bfbb0677dfbf6f149f17a17dc2d450dd4d78adb1941dfd6bd30f37a4ec55633700c9c87c82e
-
Filesize
588KB
MD50537354f085697d3e60e717f214482f8
SHA1733478d11ff42070f276981f8af44b13a6b6df3c
SHA25627c15755033a22a57c7c6b2f637697ecfbaf796a4212804defb79f7e27615bf9
SHA512ac4137dd44609597b8a81f37b8e690bc3171164ed0fecbe1194a034abe7d6b354fc5eaf7e5bfac0b3e5d3877b8b2fc4d5c83cab7168f5f8322188f553212c346
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1