Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 09:44
Static task
static1
Behavioral task
behavioral1
Sample
5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe
Resource
win10v2004-20241007-en
General
-
Target
5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe
-
Size
788KB
-
MD5
1c0fc3e976a66c2d79267870eed85973
-
SHA1
b52f3cc0830721f5d67e904e29524aa601fcde58
-
SHA256
5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5
-
SHA512
864ed2dd1331a3de6ffd623b0f4e0b3127ec3ec293ea1d258b6b216a379b33f809720a51835d4841d39decd28b64072e299ed0c92271c17a1b67f13e3450d556
-
SSDEEP
12288:gMrpy90R3a/DnN5wFIY2Rig2D3hkK1Nko37pgGVqFx8vkQIb1P2nfvH:5yM34HQFqLsqK1HOGokTIt2nH
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4424-19-0x0000000004AF0000-0x0000000004B0A000-memory.dmp healer behavioral1/memory/4424-21-0x0000000005150000-0x0000000005168000-memory.dmp healer behavioral1/memory/4424-37-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-49-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-47-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-45-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-43-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-41-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-39-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-35-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-33-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-31-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-29-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-27-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-25-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-23-0x0000000005150000-0x0000000005162000-memory.dmp healer behavioral1/memory/4424-22-0x0000000005150000-0x0000000005162000-memory.dmp healer -
Healer family
-
Processes:
pro1910.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1910.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2856-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4692-2156-0x00000000007A0000-0x00000000007D0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si135287.exe family_redline behavioral1/memory/1304-2167-0x0000000000030000-0x000000000005E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu9932.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation qu9932.exe -
Executes dropped EXE 5 IoCs
Processes:
un805936.exepro1910.exequ9932.exe1.exesi135287.exepid process 3740 un805936.exe 4424 pro1910.exe 2856 qu9932.exe 4692 1.exe 1304 si135287.exe -
Processes:
pro1910.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1910.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exeun805936.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un805936.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5396 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3148 4424 WerFault.exe pro1910.exe 2080 2856 WerFault.exe qu9932.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exeun805936.exepro1910.exequ9932.exe1.exesi135287.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un805936.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1910.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9932.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si135287.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1910.exepid process 4424 pro1910.exe 4424 pro1910.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1910.exequ9932.exedescription pid process Token: SeDebugPrivilege 4424 pro1910.exe Token: SeDebugPrivilege 2856 qu9932.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exeun805936.exequ9932.exedescription pid process target process PID 3600 wrote to memory of 3740 3600 5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe un805936.exe PID 3600 wrote to memory of 3740 3600 5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe un805936.exe PID 3600 wrote to memory of 3740 3600 5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe un805936.exe PID 3740 wrote to memory of 4424 3740 un805936.exe pro1910.exe PID 3740 wrote to memory of 4424 3740 un805936.exe pro1910.exe PID 3740 wrote to memory of 4424 3740 un805936.exe pro1910.exe PID 3740 wrote to memory of 2856 3740 un805936.exe qu9932.exe PID 3740 wrote to memory of 2856 3740 un805936.exe qu9932.exe PID 3740 wrote to memory of 2856 3740 un805936.exe qu9932.exe PID 2856 wrote to memory of 4692 2856 qu9932.exe 1.exe PID 2856 wrote to memory of 4692 2856 qu9932.exe 1.exe PID 2856 wrote to memory of 4692 2856 qu9932.exe 1.exe PID 3600 wrote to memory of 1304 3600 5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe si135287.exe PID 3600 wrote to memory of 1304 3600 5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe si135287.exe PID 3600 wrote to memory of 1304 3600 5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe si135287.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe"C:\Users\Admin\AppData\Local\Temp\5d673fe75bf2fed4b13a18d8fef0fb5686f2f7ed5b0f06e9665cadd1f7475db5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un805936.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un805936.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1910.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1910.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 10804⤵
- Program crash
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9932.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9932.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 14924⤵
- Program crash
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si135287.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si135287.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4424 -ip 44241⤵PID:2596
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2856 -ip 28561⤵PID:1664
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5396
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5ccd18a95c884bcdc5e0885d59ec71be1
SHA1a6c2eedf1c5758f8432015c989824fe8d3a8f937
SHA25655d670d4abfd8d9df5389b2ae0dba0abba7236703083723a5ec22a0fb79687f3
SHA512f3eea5269b6e6e1d43d89e23e2e91f75a6b57b832cbde6634f3c6490354710df135f5541dd4a3a77872aad37ef3b6163d6dc9c775b07139f78662ee6dff749bd
-
Filesize
634KB
MD57d0346146ae521611e70222d249d341a
SHA139fdbb953971c9ff492740242cbef10fec5e1e00
SHA2562622e8fc2b720a9e34ba30994d8ffc60e8d87b78581f9dd124a43b28b6a9ebb7
SHA512abe06e4697cac72e1ebd054d5f20696383c1c8bad0736a9f73883f4f12fca167ecaf83de6b6beca967161c14cfb0f785d606e661f86d13def1cfea5c60db2d28
-
Filesize
231KB
MD5f2bda3b2143dc563d8d00c6365f04560
SHA1547756cd0798bfabc11d112498ed2ae327b7f7aa
SHA256c369b65c2fd7a2f313643cd9171e041092d9f2ee77b759746534db59d7e0b78c
SHA5125ebb53df4c3dae6d9a92b1af37c154ac678e0b90e4ddfdabcec32d674588dcd916a75db4314b3c52d494bc778aad2a3dcc72b7055c2c8ce8750390064b4935f5
-
Filesize
415KB
MD551740ec4674c85285cdc13be4c1df0d8
SHA12ab440fa0a10fc38337a79191bc7566120a5abed
SHA256575c93db1cf96aa30cef2c14d31f55142325af579ad124b72874d7c79786f0f5
SHA512797493cd9c41d559eb0bda4caa804abb773565d31726b5e35799882face8e1e9c0a5d221abf5cbeb004266821b6da756700eb25287bbbefd1a07bdaf674ba0d6
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0