Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 04:51
Static task
static1
Behavioral task
behavioral1
Sample
21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exe
Resource
win10v2004-20241007-en
General
-
Target
21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exe
-
Size
794KB
-
MD5
5b4eff17496de24acab7714ff8f13c5f
-
SHA1
d358cfe41a07b1f4749d7d4857244a05ab434a51
-
SHA256
21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07
-
SHA512
793d241c8ed953c86929f97d9d69f0b2a98adcc0667e8fb98cbcacf520ef18d9c0771e391641e9c1b2dceb75eb45b6b713711b07a6893bcbb1c9b07bee35bf7c
-
SSDEEP
24576:by2XJBF+/qSg94bFlcUQwdF6T7g8QDtQ5J45:OmF7STzv/dQQoJ4
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2936-19-0x0000000002400000-0x000000000241A000-memory.dmp healer behavioral1/memory/2936-21-0x0000000002690000-0x00000000026A8000-memory.dmp healer behavioral1/memory/2936-47-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-49-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-45-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-43-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-41-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-39-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-37-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-33-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-31-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-29-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-27-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-25-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-23-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-22-0x0000000002690000-0x00000000026A2000-memory.dmp healer behavioral1/memory/2936-35-0x0000000002690000-0x00000000026A2000-memory.dmp healer -
Healer family
-
Processes:
pro8452.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8452.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8452.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1996-2143-0x0000000004CD0000-0x0000000004D02000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5312-2156-0x00000000000D0000-0x0000000000100000-memory.dmp family_redline behavioral1/memory/5448-2167-0x0000000000E30000-0x0000000000E5E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si585632.exe family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu1195.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation qu1195.exe -
Executes dropped EXE 5 IoCs
Processes:
un792024.exepro8452.exequ1195.exe1.exesi585632.exepid process 3156 un792024.exe 2936 pro8452.exe 1996 qu1195.exe 5312 1.exe 5448 si585632.exe -
Processes:
pro8452.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8452.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8452.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exeun792024.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un792024.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3612 2936 WerFault.exe pro8452.exe 5388 1996 WerFault.exe qu1195.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exeun792024.exepro8452.exequ1195.exe1.exesi585632.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un792024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1195.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si585632.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8452.exepid process 2936 pro8452.exe 2936 pro8452.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8452.exequ1195.exedescription pid process Token: SeDebugPrivilege 2936 pro8452.exe Token: SeDebugPrivilege 1996 qu1195.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exeun792024.exequ1195.exedescription pid process target process PID 912 wrote to memory of 3156 912 21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exe un792024.exe PID 912 wrote to memory of 3156 912 21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exe un792024.exe PID 912 wrote to memory of 3156 912 21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exe un792024.exe PID 3156 wrote to memory of 2936 3156 un792024.exe pro8452.exe PID 3156 wrote to memory of 2936 3156 un792024.exe pro8452.exe PID 3156 wrote to memory of 2936 3156 un792024.exe pro8452.exe PID 3156 wrote to memory of 1996 3156 un792024.exe qu1195.exe PID 3156 wrote to memory of 1996 3156 un792024.exe qu1195.exe PID 3156 wrote to memory of 1996 3156 un792024.exe qu1195.exe PID 1996 wrote to memory of 5312 1996 qu1195.exe 1.exe PID 1996 wrote to memory of 5312 1996 qu1195.exe 1.exe PID 1996 wrote to memory of 5312 1996 qu1195.exe 1.exe PID 912 wrote to memory of 5448 912 21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exe si585632.exe PID 912 wrote to memory of 5448 912 21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exe si585632.exe PID 912 wrote to memory of 5448 912 21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exe si585632.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exe"C:\Users\Admin\AppData\Local\Temp\21d13e86fb4093277e3783c44ee6a6319f94c9618e294662b7782659ad6b0a07.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un792024.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un792024.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8452.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8452.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 10804⤵
- Program crash
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1195.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1195.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 13844⤵
- Program crash
PID:5388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si585632.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si585632.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2936 -ip 29361⤵PID:836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1996 -ip 19961⤵PID:5336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD54c888b1f330336a174b4909114ad7a34
SHA16fc0296ed4fe05c5fd9485a61fe4a3d6d4befdc0
SHA256bd0a62099c41a6ce300f3047dd78be92621bdb282c7ba6daeffd7e9e2edce8b8
SHA5125a75c7ee9459a15997cd1fe3acca77c52591fa10648965903cafd69b50708509cfe4d1ffec20b1221e6bfce566b25e171a6544e609c2148b34c053401a85891f
-
Filesize
641KB
MD52bad7fdeac7d1192c55fbde8ef1d6c62
SHA1118a31ebeb40a193d7341658e3dbea153141c2ae
SHA256208bcd5c7774b5d4cca062a055641b0fe7080d7efea5a201501b967c2e73668c
SHA512acc7de7cd5c9ea4334add1d93df7028a8cd3b8416f3b14d9578c4af0e2631898bcb152d1a4adeed2f8cb042a913b69cc9307dd493f48186ac2cafc262343c1e1
-
Filesize
241KB
MD55138bbf50bd6df0b56d5773604ae3a51
SHA1d0f5bfbe8acacb8d2c8703757dafb40c4b91e6b0
SHA2569eccdad556cac02f45dc3bc60c5fbb30d2dccff03a0acf9944486be481bf8149
SHA512e14c7cb50be5a4a052d9a8ce30699b79975ba7e097c6cc885a1efc1a3baf765a8eea0a76735823ecfb5899cdef1c1e6a5168223fb1cde65ec0579651c352a235
-
Filesize
424KB
MD53a58ea11048b87120cc9a3575dc48a0e
SHA1d017e7ec31ea258de43d0819c4fd596a397f8101
SHA256e158fa4037181d217a34c932ee69bc3565f2e3fdeabab8310f260cb1ba4ee59f
SHA512fb7c66dde53b5568eedd2b5a828b8a0cd774e8d74e2476570ecadad22214dc2e57390971890dc0fd7dee6cf4e378b399bba7b650da71f7dc13e0b1dacd298c95
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0