Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 09:31
Static task
static1
Behavioral task
behavioral1
Sample
ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22.exe
Resource
win10v2004-20241007-en
General
-
Target
ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22.exe
-
Size
991KB
-
MD5
029dce407942f6268befcaaea51178c0
-
SHA1
9b70f6b0eba8bb22c37fa8079c2c9fcb40d989c1
-
SHA256
ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22
-
SHA512
bcc67a7f819e8815a31d66bd54922ce8fd0a0d0c05bfd929007ce636b20ff5f0d483013a2c330077e58508069272580dbcc5677ce643bd13e74932d0bcb806ae
-
SSDEEP
24576:Qye529/t7EQdB5G8/tXsccdnvuwVO/IuPKd5mNlvUh:X5/tbV2cin2wVOAutU
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3780-25-0x0000000000960000-0x000000000097A000-memory.dmp healer behavioral1/memory/3780-27-0x0000000002710000-0x0000000002728000-memory.dmp healer behavioral1/memory/3780-35-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-55-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-53-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-51-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-49-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-47-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-45-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-43-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-41-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-40-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-37-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-33-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-31-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-29-0x0000000002710000-0x0000000002722000-memory.dmp healer behavioral1/memory/3780-28-0x0000000002710000-0x0000000002722000-memory.dmp healer -
Healer family
-
Processes:
pr131073.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr131073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr131073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr131073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr131073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr131073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr131073.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3800-2211-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2296-2224-0x0000000000010000-0x000000000003E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk214889.exe family_redline behavioral1/memory/3352-2235-0x00000000005D0000-0x0000000000600000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu511109.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation qu511109.exe -
Executes dropped EXE 6 IoCs
Processes:
un940203.exeun803617.exepr131073.exequ511109.exe1.exerk214889.exepid process 1444 un940203.exe 3540 un803617.exe 3780 pr131073.exe 3800 qu511109.exe 2296 1.exe 3352 rk214889.exe -
Processes:
pr131073.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr131073.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr131073.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22.exeun940203.exeun803617.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un940203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un803617.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1460 3780 WerFault.exe pr131073.exe 1064 3800 WerFault.exe qu511109.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22.exeun940203.exeun803617.exepr131073.exequ511109.exe1.exerk214889.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un940203.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un803617.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr131073.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu511109.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk214889.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr131073.exepid process 3780 pr131073.exe 3780 pr131073.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr131073.exequ511109.exedescription pid process Token: SeDebugPrivilege 3780 pr131073.exe Token: SeDebugPrivilege 3800 qu511109.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22.exeun940203.exeun803617.exequ511109.exedescription pid process target process PID 960 wrote to memory of 1444 960 ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22.exe un940203.exe PID 960 wrote to memory of 1444 960 ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22.exe un940203.exe PID 960 wrote to memory of 1444 960 ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22.exe un940203.exe PID 1444 wrote to memory of 3540 1444 un940203.exe un803617.exe PID 1444 wrote to memory of 3540 1444 un940203.exe un803617.exe PID 1444 wrote to memory of 3540 1444 un940203.exe un803617.exe PID 3540 wrote to memory of 3780 3540 un803617.exe pr131073.exe PID 3540 wrote to memory of 3780 3540 un803617.exe pr131073.exe PID 3540 wrote to memory of 3780 3540 un803617.exe pr131073.exe PID 3540 wrote to memory of 3800 3540 un803617.exe qu511109.exe PID 3540 wrote to memory of 3800 3540 un803617.exe qu511109.exe PID 3540 wrote to memory of 3800 3540 un803617.exe qu511109.exe PID 3800 wrote to memory of 2296 3800 qu511109.exe 1.exe PID 3800 wrote to memory of 2296 3800 qu511109.exe 1.exe PID 3800 wrote to memory of 2296 3800 qu511109.exe 1.exe PID 1444 wrote to memory of 3352 1444 un940203.exe rk214889.exe PID 1444 wrote to memory of 3352 1444 un940203.exe rk214889.exe PID 1444 wrote to memory of 3352 1444 un940203.exe rk214889.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22.exe"C:\Users\Admin\AppData\Local\Temp\ca4eadb8550486cdb8e026bd5ffc610b405fcc30c4066e0cb85662ce88158a22.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un940203.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un940203.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un803617.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un803617.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr131073.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr131073.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 10805⤵
- Program crash
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu511109.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu511109.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3800 -s 13805⤵
- Program crash
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk214889.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk214889.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3780 -ip 37801⤵PID:2488
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3800 -ip 38001⤵PID:332
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
808KB
MD54f718edee73f2016eea4714d83f464cb
SHA19571b941bb6fd18abe7853a64b18c093d6eb2ca7
SHA256fef791877b0d82f9c35812da54c41dce866af909c8a3113ee5540d361428d727
SHA512b8fe26354b46952b63329cfdd50122ce2a536c6b2b9c8aeec7a4cc227dea662fae05d8a28f34e87d664cb23f35af2f4081813eb0625abfbfb0116d110ecd99ec
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
655KB
MD587206bd8bce0ce496c9ea1951a4013b3
SHA194a4f9d2a13fee0ccf07744467f5c407278bf0f2
SHA25668005aba26709b55347210fec9e961b979c831014706814af2d432fc1998f4d3
SHA5122190b73b97d1e9813080f1551275d50f5452f0ea331baac69311da7c78a4c46d91bc225d425d53e99d962862f2d530080a62cec94557867051e7c137dbd78759
-
Filesize
255KB
MD5512eaa320bd7f51a2801a13c6b970f3e
SHA1b04af156c17e5ada6d05128b6632d7cbfabf040f
SHA256a964cb4264ab29032b5d5e85345e8f7249048dc981f673692adebc9b303e3314
SHA51265d867fea8709b734b5ab4790607502cb23cbfe5bdce921b625903b33be971a1b8d9fb4ae3c685b7fe1cdab9f1244e687a46fd392740140705a8acef976900a2
-
Filesize
438KB
MD5819107035d4d61679eba95bf8d03cc1c
SHA1df0f276527e128aa594b82e007c244afe373224c
SHA2561e69636bb4f4796a25db03c2255b0223526861a64ba2d11b2f6b4dab1c1a5a4a
SHA512c74f262aac0d98dcf390fbbcac8726b5aa9b002fa695ba2f5eb945598fc446b008cf5c68c98a3b279615eeb295e9afa123b9e70de4f39298f0cb08fd2a14e84b
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1