Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 07:15
Static task
static1
Behavioral task
behavioral1
Sample
001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exe
Resource
win10v2004-20241007-en
General
-
Target
001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exe
-
Size
814KB
-
MD5
265d0686a2464e24426fa0a43df72033
-
SHA1
552a4fabede1be67be4caf9f9fb8d18d584c7c83
-
SHA256
001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160
-
SHA512
01df9a9afa015c4515103ee66cd8d5169381e6daacc4e3ad2d22768773d0c25ee766055b9834670183a11d908b4fe0052333b37cb449d3945f9bb213c308c5ee
-
SSDEEP
12288:VMr1y90Yr6FYVf68v9XNH960C98kxzkDQBO5DczU47IJwxy2DQFyGxlOWRflWkhp:Ay56m9v99H8EQzkDORWMTDWn/RfEK
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/764-19-0x00000000025B0000-0x00000000025CA000-memory.dmp healer behavioral1/memory/764-21-0x0000000002850000-0x0000000002868000-memory.dmp healer behavioral1/memory/764-25-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-49-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-45-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-44-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-42-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-39-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-37-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-35-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-33-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-31-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-23-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-22-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-47-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-29-0x0000000002850000-0x0000000002862000-memory.dmp healer behavioral1/memory/764-27-0x0000000002850000-0x0000000002862000-memory.dmp healer -
Healer family
-
Processes:
pro7331.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7331.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7331.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3664-2142-0x0000000005770000-0x00000000057A2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5008-2155-0x00000000008A0000-0x00000000008D0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662074.exe family_redline behavioral1/memory/2128-2166-0x0000000000520000-0x000000000054E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu3486.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation qu3486.exe -
Executes dropped EXE 5 IoCs
Processes:
un909115.exepro7331.exequ3486.exe1.exesi662074.exepid process 3032 un909115.exe 764 pro7331.exe 3664 qu3486.exe 5008 1.exe 2128 si662074.exe -
Processes:
pro7331.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7331.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7331.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exeun909115.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un909115.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4504 764 WerFault.exe pro7331.exe 4060 3664 WerFault.exe qu3486.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
si662074.exe001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exeun909115.exepro7331.exequ3486.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si662074.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un909115.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7331.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3486.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7331.exepid process 764 pro7331.exe 764 pro7331.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7331.exequ3486.exedescription pid process Token: SeDebugPrivilege 764 pro7331.exe Token: SeDebugPrivilege 3664 qu3486.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exeun909115.exequ3486.exedescription pid process target process PID 848 wrote to memory of 3032 848 001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exe un909115.exe PID 848 wrote to memory of 3032 848 001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exe un909115.exe PID 848 wrote to memory of 3032 848 001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exe un909115.exe PID 3032 wrote to memory of 764 3032 un909115.exe pro7331.exe PID 3032 wrote to memory of 764 3032 un909115.exe pro7331.exe PID 3032 wrote to memory of 764 3032 un909115.exe pro7331.exe PID 3032 wrote to memory of 3664 3032 un909115.exe qu3486.exe PID 3032 wrote to memory of 3664 3032 un909115.exe qu3486.exe PID 3032 wrote to memory of 3664 3032 un909115.exe qu3486.exe PID 3664 wrote to memory of 5008 3664 qu3486.exe 1.exe PID 3664 wrote to memory of 5008 3664 qu3486.exe 1.exe PID 3664 wrote to memory of 5008 3664 qu3486.exe 1.exe PID 848 wrote to memory of 2128 848 001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exe si662074.exe PID 848 wrote to memory of 2128 848 001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exe si662074.exe PID 848 wrote to memory of 2128 848 001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exe si662074.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exe"C:\Users\Admin\AppData\Local\Temp\001ae498b1503f66fbe83406eb90ae947acf87b62b0b0546d01eada83406f160.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un909115.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un909115.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7331.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7331.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 10844⤵
- Program crash
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3486.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3486.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3664 -s 15164⤵
- Program crash
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662074.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662074.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 764 -ip 7641⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3664 -ip 36641⤵PID:5980
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD56a5cd5edf65547017fd5547f3592d8c0
SHA1f66dc4461813c77986d0675d636549e17069f040
SHA2560aaa337ae19a628835e7e28fd7dda5303ae300678bfef1940a5797d84802bd73
SHA512e23caa5a5b87bcf6b72662df7bfe0b1660b735a9755aca61a804656158bc16bad835b3450b302187baca066076f0ca2ee05087ae4eb46794b1beccebe8c44ebb
-
Filesize
661KB
MD5d2fc0e5d89b1899cafdfc0b04f061a31
SHA12203ac1c51b3c7c4768b872800087298a3d90d0c
SHA2564697229bf59b335d694d405d93e31e95da4542848af912db162d4cb67517186b
SHA512125a1525704c19104ea2319f536e2375ad43ec04c6b421bf094b8628751454bf2ccbdde5c8b29024e678058497d0e7a18284422f138a1cf3a83e0091e76fd596
-
Filesize
312KB
MD5765b456df3e573e0aadfba8e1e72ffac
SHA11ff86d177bf11501cd481872c6b717895feae500
SHA2567a6a58354bd3488b1aad7c9eb7500d959930411a6226e5807ec6d8b96f04b99a
SHA512a2bb11ac8201eb99eb7fd39c4ef13611214acc873089d676af0027694e86087cdc3220a01bb05a8e43d1d9d0245a728f924d5fa2dfac15d7698c4be7553bfa3f
-
Filesize
495KB
MD53f082fc9311465d65e83e6419b33cc66
SHA14a559689890a30d2c79c68971eba6e67de3d547b
SHA256a5ffd29f1a7d8aeae3e52a6fa810f1946ff9a9c6815aab0633bb2d60a61fbf47
SHA5126be32cf15b40d624aa0aa94195deb2faa27a80a7d420b1f765ba592f0482ce64d2b2a83c621e9c902fc0aecbde3e8bb18d304c78ab05d48565a1f3d9a0033615
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0