Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 08:51
Static task
static1
Behavioral task
behavioral1
Sample
a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exe
Resource
win10v2004-20241007-en
General
-
Target
a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exe
-
Size
787KB
-
MD5
236baf6c976c208b20db1f7cd8e8cb06
-
SHA1
4afcaecf2e2073eb0c1297f40e07faf07830ab7a
-
SHA256
a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd
-
SHA512
172774c50401f335f6b3f25e6c912bfa8970e6d55d42872f8aa2d71e09554e3c18ceb1de1b3232a29d67cc99d563c40f51fa7ffca740ad3e49f1c62cc112096b
-
SSDEEP
24576:oyLziq6HDNJQqpHz2jfWwhe2Xc9vm/Dn360k:vR6jMqpT2jXh/am/DK
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/656-19-0x00000000021B0000-0x00000000021CA000-memory.dmp healer behavioral1/memory/656-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/656-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-42-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-36-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-34-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-32-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/656-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pro9846.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9846.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9846.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3612-2143-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5760-2156-0x00000000008E0000-0x0000000000910000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si778751.exe family_redline behavioral1/memory/4136-2167-0x00000000007F0000-0x000000000081E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu3740.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation qu3740.exe -
Executes dropped EXE 5 IoCs
Processes:
un793047.exepro9846.exequ3740.exe1.exesi778751.exepid process 4048 un793047.exe 656 pro9846.exe 3612 qu3740.exe 5760 1.exe 4136 si778751.exe -
Processes:
pro9846.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9846.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9846.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exeun793047.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un793047.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4168 656 WerFault.exe pro9846.exe 6040 3612 WerFault.exe qu3740.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exesi778751.exea550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exeun793047.exepro9846.exequ3740.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si778751.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un793047.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9846.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3740.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9846.exepid process 656 pro9846.exe 656 pro9846.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9846.exequ3740.exedescription pid process Token: SeDebugPrivilege 656 pro9846.exe Token: SeDebugPrivilege 3612 qu3740.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exeun793047.exequ3740.exedescription pid process target process PID 2892 wrote to memory of 4048 2892 a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exe un793047.exe PID 2892 wrote to memory of 4048 2892 a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exe un793047.exe PID 2892 wrote to memory of 4048 2892 a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exe un793047.exe PID 4048 wrote to memory of 656 4048 un793047.exe pro9846.exe PID 4048 wrote to memory of 656 4048 un793047.exe pro9846.exe PID 4048 wrote to memory of 656 4048 un793047.exe pro9846.exe PID 4048 wrote to memory of 3612 4048 un793047.exe qu3740.exe PID 4048 wrote to memory of 3612 4048 un793047.exe qu3740.exe PID 4048 wrote to memory of 3612 4048 un793047.exe qu3740.exe PID 3612 wrote to memory of 5760 3612 qu3740.exe 1.exe PID 3612 wrote to memory of 5760 3612 qu3740.exe 1.exe PID 3612 wrote to memory of 5760 3612 qu3740.exe 1.exe PID 2892 wrote to memory of 4136 2892 a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exe si778751.exe PID 2892 wrote to memory of 4136 2892 a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exe si778751.exe PID 2892 wrote to memory of 4136 2892 a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exe si778751.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exe"C:\Users\Admin\AppData\Local\Temp\a550ab0e2e2772ec3da6074c883cebfa7de009fd19800edf346bbe3d8b3285bd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un793047.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un793047.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9846.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9846.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 11004⤵
- Program crash
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3740.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3740.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 12124⤵
- Program crash
PID:6040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si778751.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si778751.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 656 -ip 6561⤵PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3612 -ip 36121⤵PID:5840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5ba9516ad4f7dabca361294a9e72635c6
SHA153dd04b32ca75d09e64f55ae026973d4c5f56d86
SHA2563e85b07034fdfa7cd186e3fd0ad65e19332c5ee09ebec56b7cb9d6247418e23e
SHA51201bf2ecc67d30d98a6a25be37ed680e3f01b8735e922c3b42c7ae95d9da88fed0814f3e975cdab8bb48a6c77f316bdf2c558fd21cf386b6099b1d07aeec967df
-
Filesize
633KB
MD5fd4fda796005afeeebe579043f82f9cb
SHA1fd039eaeb31e5c7b05d654fd8f42064bc1335cf4
SHA256a7f8139bbcc3cb811e4300630fa03b41bd447e35b4eaf123fa77fdc9dbe604b9
SHA51262ea34aac34ebf0c4748667d7c3acf57dfe57bb32b538b7dc00ca1b19a76c820ba4faaeeda27e2fb5f4b8cf363f618af1d627bbbf7e630e73391e96efd442f1d
-
Filesize
231KB
MD50860c5b0a41b4eeba840e27bbdd8b744
SHA1d1d402ae6d307e982bc5643b7ba471f377e7f186
SHA256a9e4c80350b86627c715cc5a2b279e3da3d453a7e02ecfb55f09ffd69b01458a
SHA512c40672b4cca09ee9f4b994a9da7125d5084bc815579d15c41b8c9b62bf673c793d568b1459fad36d3a0ca3d31887f85ba2ee06745da276758733996bf5a6d5bf
-
Filesize
414KB
MD51e22d6e287c0c18b4b4cd8480d713927
SHA13940b18d7bf59d2139e8a2b088f18992900fda58
SHA2569910b05540fe670a39091434a86f98d65b633778961356ef25b5e0e50a354359
SHA512f95a65d8e27bf14efe513d90ea9cfca92a0b9125cb1c36d9efcb9d889103bbebcc3ea3635f15f6e4ae843ae2d96df696f383f2e24b803b9e42f67dfae855d21b
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0