Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 07:39
Static task
static1
Behavioral task
behavioral1
Sample
85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exe
Resource
win10v2004-20241007-en
General
-
Target
85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exe
-
Size
787KB
-
MD5
c4bd47be00c5229443189a3756c4b0e8
-
SHA1
e249056c6a2609a39dfea620834af763b0621649
-
SHA256
85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94
-
SHA512
57c731b42114b6dd1fdd29c05b5c2a29847da4c3b5060d380977d203b5a421d6c767b81e7b00aab0477fb919987c5752e730ab541566c798e0de063460595b97
-
SSDEEP
12288:zMrJy902u+7cwN2qXxv2oifQ9JjXwS7Ke3kVM3U71Cd2j0dg5l5C:+ylvII2/Q9JsVe3yM3Uxz0dg8
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/5096-19-0x0000000002150000-0x000000000216A000-memory.dmp healer behavioral1/memory/5096-21-0x0000000004BA0000-0x0000000004BB8000-memory.dmp healer behavioral1/memory/5096-41-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-49-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-47-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-45-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-43-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-39-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-37-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-35-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-33-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-31-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-27-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-25-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-23-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-22-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer behavioral1/memory/5096-29-0x0000000004BA0000-0x0000000004BB2000-memory.dmp healer -
Healer family
-
Processes:
pro5959.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5959.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3180-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4352-2156-0x0000000000010000-0x0000000000040000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873682.exe family_redline behavioral1/memory/1044-2167-0x0000000000090000-0x00000000000BE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu4876.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation qu4876.exe -
Executes dropped EXE 5 IoCs
Processes:
un288074.exepro5959.exequ4876.exe1.exesi873682.exepid process 2556 un288074.exe 5096 pro5959.exe 3180 qu4876.exe 4352 1.exe 1044 si873682.exe -
Processes:
pro5959.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5959.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5959.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exeun288074.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un288074.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3364 5096 WerFault.exe pro5959.exe 4112 3180 WerFault.exe qu4876.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exeun288074.exepro5959.exequ4876.exe1.exesi873682.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un288074.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5959.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4876.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si873682.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5959.exepid process 5096 pro5959.exe 5096 pro5959.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5959.exequ4876.exedescription pid process Token: SeDebugPrivilege 5096 pro5959.exe Token: SeDebugPrivilege 3180 qu4876.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exeun288074.exequ4876.exedescription pid process target process PID 3660 wrote to memory of 2556 3660 85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exe un288074.exe PID 3660 wrote to memory of 2556 3660 85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exe un288074.exe PID 3660 wrote to memory of 2556 3660 85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exe un288074.exe PID 2556 wrote to memory of 5096 2556 un288074.exe pro5959.exe PID 2556 wrote to memory of 5096 2556 un288074.exe pro5959.exe PID 2556 wrote to memory of 5096 2556 un288074.exe pro5959.exe PID 2556 wrote to memory of 3180 2556 un288074.exe qu4876.exe PID 2556 wrote to memory of 3180 2556 un288074.exe qu4876.exe PID 2556 wrote to memory of 3180 2556 un288074.exe qu4876.exe PID 3180 wrote to memory of 4352 3180 qu4876.exe 1.exe PID 3180 wrote to memory of 4352 3180 qu4876.exe 1.exe PID 3180 wrote to memory of 4352 3180 qu4876.exe 1.exe PID 3660 wrote to memory of 1044 3660 85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exe si873682.exe PID 3660 wrote to memory of 1044 3660 85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exe si873682.exe PID 3660 wrote to memory of 1044 3660 85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exe si873682.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exe"C:\Users\Admin\AppData\Local\Temp\85ce5cdff2c50c3d332e201082442526de997b4bdca6fceba39892b560301a94.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un288074.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un288074.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5959.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5959.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 10804⤵
- Program crash
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4876.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4876.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3180 -s 15284⤵
- Program crash
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873682.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873682.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5096 -ip 50961⤵PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3180 -ip 31801⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD50e269d551b8e0a77b211323e3931b607
SHA1506022be78d831abac065d61671a99fabe15a2cf
SHA2566123cc33a1460ba87b481ec4e0dc22f20246ecc22a3e936a3946e2dc32967cb1
SHA5124cab8e092e889adfca1f040a85df4154c60f5e1fcf4db219eb8abfc28dbca78f70d8922a9028f207903ecf30452441177f558b5149a0ac9d16995488b25edbc8
-
Filesize
633KB
MD5209ced74cb866a497b3011fd0944a2b9
SHA1a2498e952fb49aa8f830eb57f3b1121de5b70ed3
SHA2567f73261612017fdb2ed9314a32868740b8b7ef93b3271554d67c1855ad8dd7b0
SHA512041f925d4ad4bc3d6354d21969c36615399d1ac0c1d8ecb48249bf1eeab817c09ad5b396de982f2943dfaf3b10e216faa2cea24d3a18e38946a7553aac9944d4
-
Filesize
230KB
MD5831c68e7ad590c182893c16540ef109e
SHA13e0114e55dc39347a69cd86efff9a17b88907abd
SHA256df0163cc94b8127c223470f5df66d48e26160b1a8f21f5b1d0ef2085dffbf664
SHA51269675d1208c116b6b88a2912d95fb4e7a41f03860ec92880488820f2acd703821b435df159795baf1fccd704da94f0c12d58f65a8b880779a4c34466a3352b73
-
Filesize
414KB
MD57a6f07dc70b473a3a82f37be0a8dc0fb
SHA1fa3a6dfecb1405cdc0d8d1818e55892c15600b92
SHA2568d6f6782eb79e5dae6a4990f894f0448f00cb8be7b98298f100ad0e9a7187302
SHA51277f3f6856acd6bbbda8ec80f74c19695db21b33360f62bde22f98c4e34d99b68ad348a47dea5532d7f588781df4edd025a012c3b3123ed88fba4123f7e252ff1
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0