Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exe
Resource
win10v2004-20241007-en
General
-
Target
54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exe
-
Size
790KB
-
MD5
54e232ae256ff95221f5d3c157a1313c
-
SHA1
710d5e5660cf1e3d9e619b4fb88c8075d6a8c493
-
SHA256
54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff
-
SHA512
eca329630c5ee46f141c6c1c99bbeef4966a7a8d5a3f41a79c0acc0afd0b995c7c52fac1222df40d02489795c391e7f6c5e7ff3f35565bd91a8dd9bfb6224c8d
-
SSDEEP
12288:rMr0y903lhBffxlk9CLTXArd2N1TRAPbiesWuPsidD0wuRfT:zygbXxlk9CXo2T7P/KDV
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2148-19-0x0000000002510000-0x000000000252A000-memory.dmp healer behavioral1/memory/2148-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/2148-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-34-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2148-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro8455.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8455.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8455.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8455.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8455.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8455.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8455.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1564-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5148-2156-0x0000000000EA0000-0x0000000000ED0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si949298.exe family_redline behavioral1/memory/2768-2167-0x0000000000FD0000-0x0000000000FFE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu0503.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qu0503.exe -
Executes dropped EXE 5 IoCs
Processes:
un287467.exepro8455.exequ0503.exe1.exesi949298.exepid process 3700 un287467.exe 2148 pro8455.exe 1564 qu0503.exe 5148 1.exe 2768 si949298.exe -
Processes:
pro8455.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8455.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8455.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exeun287467.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un287467.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 900 2148 WerFault.exe pro8455.exe 5468 1564 WerFault.exe qu0503.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu0503.exe1.exesi949298.exe54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exeun287467.exepro8455.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0503.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si949298.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un287467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8455.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8455.exepid process 2148 pro8455.exe 2148 pro8455.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8455.exequ0503.exedescription pid process Token: SeDebugPrivilege 2148 pro8455.exe Token: SeDebugPrivilege 1564 qu0503.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exeun287467.exequ0503.exedescription pid process target process PID 212 wrote to memory of 3700 212 54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exe un287467.exe PID 212 wrote to memory of 3700 212 54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exe un287467.exe PID 212 wrote to memory of 3700 212 54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exe un287467.exe PID 3700 wrote to memory of 2148 3700 un287467.exe pro8455.exe PID 3700 wrote to memory of 2148 3700 un287467.exe pro8455.exe PID 3700 wrote to memory of 2148 3700 un287467.exe pro8455.exe PID 3700 wrote to memory of 1564 3700 un287467.exe qu0503.exe PID 3700 wrote to memory of 1564 3700 un287467.exe qu0503.exe PID 3700 wrote to memory of 1564 3700 un287467.exe qu0503.exe PID 1564 wrote to memory of 5148 1564 qu0503.exe 1.exe PID 1564 wrote to memory of 5148 1564 qu0503.exe 1.exe PID 1564 wrote to memory of 5148 1564 qu0503.exe 1.exe PID 212 wrote to memory of 2768 212 54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exe si949298.exe PID 212 wrote to memory of 2768 212 54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exe si949298.exe PID 212 wrote to memory of 2768 212 54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exe si949298.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exe"C:\Users\Admin\AppData\Local\Temp\54596745f60c619c95ce4b253f820b1b92fbd6a91356345aecc981e2d91e44ff.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un287467.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un287467.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8455.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8455.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 10764⤵
- Program crash
PID:900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0503.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0503.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 13884⤵
- Program crash
PID:5468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si949298.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si949298.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2148 -ip 21481⤵PID:4088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1564 -ip 15641⤵PID:3512
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD59ef5553e8d7965e49880b6576d8f37eb
SHA18d7c8e875c7eb3c67303dcae739c20ae7167923e
SHA256cd265dbf6a8f4f583303d600de6b754985a1361e2c868ecf85cbc93da4b2d3d1
SHA51296ecec387a5524f181c94d5564b0a8b663f456cdbb066ef4a956df67e96a05faa5c5b2a5d3e60725fce3a5e76ac82fa4e7014a1c5d5dc6b9673b408ffb9657b5
-
Filesize
635KB
MD5150efe863ad53df7eaa7adb37e611cc0
SHA14a9de5cdd97ca15f7293809843cd47467e505430
SHA2567db0ad852637f358e0e558e2214b120eb085094ac94f9712e7b87c84f6966944
SHA512d2f0a2a2377492dd0c5dea87fd665e8e1f4db81942d6860c5ebc471a0bf9c988147e4bfac8720b4a793b0a0e2dd19581186d03922ca6569de81ab28a85170f17
-
Filesize
233KB
MD530beedf2a0886d2d9015e323538a7b67
SHA1e5bee6c119948df075c9f725df5526ac80a79135
SHA256e5ef19253a04bda267915d036e9c2b5fe706228210473627684050590d179a76
SHA512f20c0d09c1ee477f8f1b3203e112378df5f73804701c7d6aaa6b4faca928d79499fc624c2d1349df050219f9a5b997aad85496ff67b9143a2c1929202165af56
-
Filesize
417KB
MD5d783faf36b42dedcc1e9cfce7e61904b
SHA178d1a0db9b68036f3d4c10dcf617237fdc46c6f9
SHA25602f27239d33bc45c226e39b16795a81d5aac0bb735894b2183b1c610b08fd057
SHA5124046794925a1cd40376e7a83d4153489b74cda1aec4f601f37e42462e4760a470e99ec009955ff9ac0fb7f01ae10d7d740957399a092ee15745aac6d08083d86
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0