Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 23:29
Static task
static1
Behavioral task
behavioral1
Sample
9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exe
Resource
win10v2004-20241007-en
General
-
Target
9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exe
-
Size
795KB
-
MD5
d8b624fa3845b2eb1b79b78609b7293b
-
SHA1
3f0ccce78c10891e76d0ae8afe3a61dfaece9c13
-
SHA256
9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f
-
SHA512
207f777fad7c2dd8552de606bac14174e7f10fdde79cd6094c33cf2410751219c0b8032e5b26e47bf69dfea6c2df3235d0f68e7c3862576628c97bfe821ba830
-
SSDEEP
24576:uyiQEOyQO1QQM9JwltptoUdS9icIpi2hZD6:9iQjyQzJwltpdS9icIpd
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2128-19-0x0000000002460000-0x000000000247A000-memory.dmp healer behavioral1/memory/2128-21-0x00000000025F0000-0x0000000002608000-memory.dmp healer behavioral1/memory/2128-35-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-33-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-49-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-47-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-45-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-43-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-41-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-39-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-37-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-29-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-25-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-23-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-22-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-31-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2128-27-0x00000000025F0000-0x0000000002602000-memory.dmp healer -
Healer family
-
Processes:
pro0213.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0213.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0213.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/5056-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5956-2156-0x0000000000AD0000-0x0000000000B00000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si296818.exe family_redline behavioral1/memory/3028-2167-0x0000000000390000-0x00000000003BE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu0911.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation qu0911.exe -
Executes dropped EXE 5 IoCs
Processes:
un123555.exepro0213.exequ0911.exe1.exesi296818.exepid process 3472 un123555.exe 2128 pro0213.exe 5056 qu0911.exe 5956 1.exe 3028 si296818.exe -
Processes:
pro0213.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0213.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0213.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un123555.exe9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un123555.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 880 2128 WerFault.exe pro0213.exe 3200 5056 WerFault.exe qu0911.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exesi296818.exe9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exeun123555.exepro0213.exequ0911.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si296818.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un123555.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0213.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0911.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0213.exepid process 2128 pro0213.exe 2128 pro0213.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0213.exequ0911.exedescription pid process Token: SeDebugPrivilege 2128 pro0213.exe Token: SeDebugPrivilege 5056 qu0911.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exeun123555.exequ0911.exedescription pid process target process PID 2096 wrote to memory of 3472 2096 9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exe un123555.exe PID 2096 wrote to memory of 3472 2096 9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exe un123555.exe PID 2096 wrote to memory of 3472 2096 9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exe un123555.exe PID 3472 wrote to memory of 2128 3472 un123555.exe pro0213.exe PID 3472 wrote to memory of 2128 3472 un123555.exe pro0213.exe PID 3472 wrote to memory of 2128 3472 un123555.exe pro0213.exe PID 3472 wrote to memory of 5056 3472 un123555.exe qu0911.exe PID 3472 wrote to memory of 5056 3472 un123555.exe qu0911.exe PID 3472 wrote to memory of 5056 3472 un123555.exe qu0911.exe PID 5056 wrote to memory of 5956 5056 qu0911.exe 1.exe PID 5056 wrote to memory of 5956 5056 qu0911.exe 1.exe PID 5056 wrote to memory of 5956 5056 qu0911.exe 1.exe PID 2096 wrote to memory of 3028 2096 9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exe si296818.exe PID 2096 wrote to memory of 3028 2096 9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exe si296818.exe PID 2096 wrote to memory of 3028 2096 9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exe si296818.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exe"C:\Users\Admin\AppData\Local\Temp\9479cc3622b82e328084843dcf8195577daa6a8bb411bd1556e74be17e26631f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un123555.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un123555.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0213.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0213.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 10884⤵
- Program crash
PID:880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0911.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0911.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 13844⤵
- Program crash
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si296818.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si296818.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2128 -ip 21281⤵PID:3688
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5056 -ip 50561⤵PID:6088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5784f9ff2bd95dc9f558386cd027fd8e5
SHA1dce04ad6ccd59fdbd114dc9959a6f8b8070bcf57
SHA256e3475afbeab6b0fbd637a09f5e677acc7f88e424cfe48bde4deec77ebb1c06df
SHA5127266d06bd608a7f1e0eec6f80b762bbd3308805deddfc12938ee5456849ba0d70f0c743ae9feaf96fb7ae3a77160abf9f0237f2a5e85763fa654141c931cf6e5
-
Filesize
642KB
MD5e37ed3fe326b413f7e47ec458b03ce83
SHA1df1ca20b5a55306ac93f0542c9dc32b024b94ee0
SHA256d6eba265bc4ef50a630605d2efdbf424751dd70e5e0df63396e0cc83ec3a4fa6
SHA512396fa5e806446c8543641497cf5457676dd8d66498b745488fb090cfb4f11462ce562de4af550fa50665fdbddc6c1a1f196b2a0bad3a1f4fad7b5af6d944560c
-
Filesize
241KB
MD55b2a014a6e59f93d2a9e25cbbc20e042
SHA1b55c7c9d990e8fafda58b25f3222c46f8f27ea98
SHA256b6cd24175cfa552241e0e8febe6f9747107ae1dbd0b952c8563c37631fd6016a
SHA5126facc97365d3af4a8d4fcc51ebec8ed9a0fcfc0714c1e01afde40c2d62bef3aa1be2da2131c0e046767e53dc3eb7a3a5ee5311a372f0e88a9b37d4f12bc266e4
-
Filesize
424KB
MD5b87b09091a091aa46c2c85fd99412b63
SHA16826a900cd04ef8cf10ff4f50b7a29f3cbfc264e
SHA25664c6cce6ec2685efe246744e72b2d4b1b2f402424e7378da57c52f7616346fdd
SHA512e7c9279f9e15483a96dea7e9677c0a99f9e1d3e58838e981b7f08e41855efbf2a1b9294e660a5bdb0c89db4937bc426fcd0115b322070f3690d3ecf70c84f5fe
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0