Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 04:00
Static task
static1
Behavioral task
behavioral1
Sample
33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exe
Resource
win10v2004-20241007-en
General
-
Target
33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exe
-
Size
788KB
-
MD5
cbc7334b1c0722fe4a9060883c07e2fd
-
SHA1
321b0a8e900e17b815fca9ec98dfde1f0a1e907a
-
SHA256
33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4
-
SHA512
9728e7474380dac6c9270e762bd04cfe56b7c176bc3e52370f4a58efd7e4ceba36faa2a2a1139c59ff40843d78ccdb61784c5315903bfefe2dd0953d08f81c18
-
SSDEEP
12288:mMrSy90HW/QYgfTu3aYiphqLrjXV2ag2amYqNREqU3tpgGVqlh8voh6vZT:wy0BvYiphGlEG38sGQ0oSZT
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1252-19-0x0000000002460000-0x000000000247A000-memory.dmp healer behavioral1/memory/1252-21-0x00000000024E0000-0x00000000024F8000-memory.dmp healer behavioral1/memory/1252-47-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-45-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-41-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-39-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-35-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-34-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-32-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-29-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-49-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-23-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-22-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-43-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-38-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-27-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1252-25-0x00000000024E0000-0x00000000024F2000-memory.dmp healer -
Healer family
-
Processes:
pro6530.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6530.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4968-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/6312-2156-0x0000000000F80000-0x0000000000FB0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si200351.exe family_redline behavioral1/memory/6456-2166-0x0000000000880000-0x00000000008AE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu3689.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation qu3689.exe -
Executes dropped EXE 5 IoCs
Processes:
un532586.exepro6530.exequ3689.exe1.exesi200351.exepid process 2272 un532586.exe 1252 pro6530.exe 4968 qu3689.exe 6312 1.exe 6456 si200351.exe -
Processes:
pro6530.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6530.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6530.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exeun532586.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un532586.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1256 1252 WerFault.exe pro6530.exe 6384 4968 WerFault.exe qu3689.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exeun532586.exepro6530.exequ3689.exe1.exesi200351.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un532586.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6530.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3689.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si200351.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6530.exepid process 1252 pro6530.exe 1252 pro6530.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6530.exequ3689.exedescription pid process Token: SeDebugPrivilege 1252 pro6530.exe Token: SeDebugPrivilege 4968 qu3689.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exeun532586.exequ3689.exedescription pid process target process PID 2948 wrote to memory of 2272 2948 33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exe un532586.exe PID 2948 wrote to memory of 2272 2948 33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exe un532586.exe PID 2948 wrote to memory of 2272 2948 33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exe un532586.exe PID 2272 wrote to memory of 1252 2272 un532586.exe pro6530.exe PID 2272 wrote to memory of 1252 2272 un532586.exe pro6530.exe PID 2272 wrote to memory of 1252 2272 un532586.exe pro6530.exe PID 2272 wrote to memory of 4968 2272 un532586.exe qu3689.exe PID 2272 wrote to memory of 4968 2272 un532586.exe qu3689.exe PID 2272 wrote to memory of 4968 2272 un532586.exe qu3689.exe PID 4968 wrote to memory of 6312 4968 qu3689.exe 1.exe PID 4968 wrote to memory of 6312 4968 qu3689.exe 1.exe PID 4968 wrote to memory of 6312 4968 qu3689.exe 1.exe PID 2948 wrote to memory of 6456 2948 33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exe si200351.exe PID 2948 wrote to memory of 6456 2948 33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exe si200351.exe PID 2948 wrote to memory of 6456 2948 33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exe si200351.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exe"C:\Users\Admin\AppData\Local\Temp\33dc9a8b17facedc43e7629fe98b8aacabbd30f80296af4774775873f56496a4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532586.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un532586.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6530.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 10804⤵
- Program crash
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3689.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3689.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4968 -s 13684⤵
- Program crash
PID:6384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si200351.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si200351.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1252 -ip 12521⤵PID:4868
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4968 -ip 49681⤵PID:6336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5588f2efbf949cba6bf0da1ea4514325a
SHA1d7efda89037411332b07ace7d67684efa3d8c43a
SHA2560da9a3407a1df65a141f18c7664bf9aa8f46c988178be75414626ecfce2625d6
SHA512825b99b856cd79e82f08cdac732c249fe033dd6fcc9ce5e1a06b62a07906f876d43b21512b737759f96c9c3c021eecd17063a86bf309845878e0f48429f021a3
-
Filesize
634KB
MD57d6c9279c64f7dcde6d213930ceed429
SHA19f04f69f5ff0191d4c6bade616e6c7d74a881d08
SHA25625cc74561712c1c605d9b12395fea7a095b51509d7b93b4733e86a9b5dc48d6d
SHA5120d748c77f96fff8bfc3fc249a963dcdb063777e76ea0414fd002d063df910a2b9449e474f1ced20196973a708b92838404964773cc109328cf3fa66b8cabdfd9
-
Filesize
231KB
MD5cf1ab3c38178ec7d85d7261bf733fada
SHA188cff1fd4ff6c4461feb27059b0db8829eac8f3e
SHA25654d8c307de9bd1064163a95b06609561c865b700875c5a905a24968371aef187
SHA5129bb881637559fe4cdadc33d4b7d1a10ba6f04019fe73e9996baf9e8e0be08fcd67f91b216691c2e785528db628d46e02fafe2af4a49f5c205f6fef98517c8592
-
Filesize
415KB
MD5481b3d95a3e395b69a5b343bb59240d1
SHA1f0ecf96394715fd1e9180d124840db0b718503f1
SHA256d4bbc0c5648fe6470a78ec9983a5990cf86cdb1fe30d65cd5640f08a89af3d1e
SHA51219c9d828a354cdcfc9c6abe9687cd329a97ef6fcbd890bc182c916f30d17ce3f7230cd2e41f0afd917c1069ad562a9156bacc1ee7238e7fa27963d8cae6f13f3
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0