Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 13:36
Static task
static1
Behavioral task
behavioral1
Sample
1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exe
Resource
win10v2004-20241007-en
General
-
Target
1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exe
-
Size
787KB
-
MD5
f9854a58981ef7fe64be29c3e00f9811
-
SHA1
0c3f97b10c9673c9f76ee7af98b04a66a23a548a
-
SHA256
1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a
-
SHA512
8f460e2274a4507da33b2c9e0df4fb66d306170f45e53eb6551712d67361588c261218fb888ccf7b5f070ea75aeb996702c997d82095386f1e9c2db13e654ead
-
SSDEEP
12288:vMroy90n73c0lMUIHwGQqUmMlq5xnJisUjps7d1mXZd+SvWYYnP:Py4Y0bGQqUmMlK9JisUq/mpdt4P
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1392-19-0x0000000002150000-0x000000000216A000-memory.dmp healer behavioral1/memory/1392-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/1392-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-48-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/1392-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro3077.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3077.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3077.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4392-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5824-2156-0x0000000000AC0000-0x0000000000AF0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si120669.exe family_redline behavioral1/memory/4176-2167-0x00000000001D0000-0x00000000001FE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu9778.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qu9778.exe -
Executes dropped EXE 5 IoCs
Processes:
un501633.exepro3077.exequ9778.exe1.exesi120669.exepid process 3520 un501633.exe 1392 pro3077.exe 4392 qu9778.exe 5824 1.exe 4176 si120669.exe -
Processes:
pro3077.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3077.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exeun501633.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un501633.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1432 1392 WerFault.exe pro3077.exe 2960 4392 WerFault.exe qu9778.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exeun501633.exepro3077.exequ9778.exe1.exesi120669.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un501633.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9778.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si120669.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro3077.exepid process 1392 pro3077.exe 1392 pro3077.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro3077.exequ9778.exedescription pid process Token: SeDebugPrivilege 1392 pro3077.exe Token: SeDebugPrivilege 4392 qu9778.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exeun501633.exequ9778.exedescription pid process target process PID 3692 wrote to memory of 3520 3692 1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exe un501633.exe PID 3692 wrote to memory of 3520 3692 1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exe un501633.exe PID 3692 wrote to memory of 3520 3692 1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exe un501633.exe PID 3520 wrote to memory of 1392 3520 un501633.exe pro3077.exe PID 3520 wrote to memory of 1392 3520 un501633.exe pro3077.exe PID 3520 wrote to memory of 1392 3520 un501633.exe pro3077.exe PID 3520 wrote to memory of 4392 3520 un501633.exe qu9778.exe PID 3520 wrote to memory of 4392 3520 un501633.exe qu9778.exe PID 3520 wrote to memory of 4392 3520 un501633.exe qu9778.exe PID 4392 wrote to memory of 5824 4392 qu9778.exe 1.exe PID 4392 wrote to memory of 5824 4392 qu9778.exe 1.exe PID 4392 wrote to memory of 5824 4392 qu9778.exe 1.exe PID 3692 wrote to memory of 4176 3692 1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exe si120669.exe PID 3692 wrote to memory of 4176 3692 1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exe si120669.exe PID 3692 wrote to memory of 4176 3692 1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exe si120669.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exe"C:\Users\Admin\AppData\Local\Temp\1fc632dab67824da0b781d41a320f21d76740f147e98b15e2ab5ddbbb578eb2a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un501633.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un501633.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3077.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3077.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 10844⤵
- Program crash
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9778.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9778.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 13844⤵
- Program crash
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si120669.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si120669.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1392 -ip 13921⤵PID:2392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4392 -ip 43921⤵PID:4924
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a3d2c67ac53836f2beff6daa46eb5d3e
SHA1a3fc78ac875bafa039f5daa25a183ab056ee92d0
SHA256f2d9be6f1e359dae5fc95308eba53c1bb8d97088e995d0d8929f8e0d150fff08
SHA51264c5f05550937539eaa1b5f532ba7a23483afa38a8efbd679cc268d87238e6dfb465668289948a3d2dde3c251376010c8559d0304fb89e9fd31ce70794b5f520
-
Filesize
633KB
MD54e9dd0b5e0f75194b209d8a07f835752
SHA13a5a0b47677af7dbccf429bdd719a56902f789e2
SHA256710e4b6d2cda333eadb342f2dc26c64930823dc16bcba09eeaf73d7da2965b62
SHA5129f4201074b64e3111d9a80af7590abc8b668dc1fa2185d4e52a77a5d6015e5cfc738b9f50a54424fa14741ec37d6d939b4c7cfd0b78dbad2e9e583741c737ddf
-
Filesize
231KB
MD5202f4069ebb0f22e1840533e5ad65fea
SHA144cc1ac0d1fa74a64f74c2447500cf1fe01a2918
SHA256736178c51d40b5964fd01f09eaebdfa7b3854141733373c281bb3794d36c56a8
SHA512c0628888d4cf957fec690825dc90979927602e567cb7d8c01e58ff5546e29ba91f508df59d20f3b0e948f686e067d6caef2b583d649507fd34f7fae2a0eb5623
-
Filesize
414KB
MD524f41bb01e515f0ffc464b27dba98deb
SHA117ae5ba5be0ccc92c073fee0f04f5fd84c1c4093
SHA25673ea37d53019cc570d44815c1b756a83bdc22bd04d68b2d03bb704183aacd5a3
SHA512c090292304d513021cea8735f3fb28b65a58cb02df1560861c4adcfacd35548d71abc60461bd3bf006b62f9cca51fff4471ae224f45a9799015477768818cbad
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0