Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exe
Resource
win10v2004-20241007-en
General
-
Target
33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exe
-
Size
802KB
-
MD5
b6ceea80e049fda34b4a89c06bf0b011
-
SHA1
33461e05751d49bbe7005b95c2636d49dc7f0845
-
SHA256
33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715
-
SHA512
1aa0758fe4006be6eb4a1b19a36b23c8e50f220d1bc7b52f23b0e95c2e886b504d5f674c29713712d2cd220d05c4fde36ffc723df482218126fb1ba84533f4cf
-
SSDEEP
24576:GyaYSlpWp2pig21ECN6Z4jBcBf2Yx/PO9m+s:VeXWpa21myjBI1Pd
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1016-19-0x00000000023A0000-0x00000000023BA000-memory.dmp healer behavioral1/memory/1016-21-0x00000000024E0000-0x00000000024F8000-memory.dmp healer behavioral1/memory/1016-29-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-49-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-47-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-45-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-44-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-41-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-39-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-37-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-35-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-33-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-31-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-27-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-25-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-22-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1016-23-0x00000000024E0000-0x00000000024F2000-memory.dmp healer -
Healer family
-
Processes:
pro1427.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1427.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1427.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3908-2143-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4304-2156-0x00000000005B0000-0x00000000005E0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si282759.exe family_redline behavioral1/memory/3636-2167-0x0000000000070000-0x000000000009E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu3221.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu3221.exe -
Executes dropped EXE 5 IoCs
Processes:
un692787.exepro1427.exequ3221.exe1.exesi282759.exepid process 2544 un692787.exe 1016 pro1427.exe 3908 qu3221.exe 4304 1.exe 3636 si282759.exe -
Processes:
pro1427.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1427.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1427.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exeun692787.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un692787.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3316 1016 WerFault.exe pro1427.exe 1496 3908 WerFault.exe qu3221.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exeun692787.exepro1427.exequ3221.exe1.exesi282759.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un692787.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1427.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si282759.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1427.exepid process 1016 pro1427.exe 1016 pro1427.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1427.exequ3221.exedescription pid process Token: SeDebugPrivilege 1016 pro1427.exe Token: SeDebugPrivilege 3908 qu3221.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exeun692787.exequ3221.exedescription pid process target process PID 1552 wrote to memory of 2544 1552 33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exe un692787.exe PID 1552 wrote to memory of 2544 1552 33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exe un692787.exe PID 1552 wrote to memory of 2544 1552 33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exe un692787.exe PID 2544 wrote to memory of 1016 2544 un692787.exe pro1427.exe PID 2544 wrote to memory of 1016 2544 un692787.exe pro1427.exe PID 2544 wrote to memory of 1016 2544 un692787.exe pro1427.exe PID 2544 wrote to memory of 3908 2544 un692787.exe qu3221.exe PID 2544 wrote to memory of 3908 2544 un692787.exe qu3221.exe PID 2544 wrote to memory of 3908 2544 un692787.exe qu3221.exe PID 3908 wrote to memory of 4304 3908 qu3221.exe 1.exe PID 3908 wrote to memory of 4304 3908 qu3221.exe 1.exe PID 3908 wrote to memory of 4304 3908 qu3221.exe 1.exe PID 1552 wrote to memory of 3636 1552 33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exe si282759.exe PID 1552 wrote to memory of 3636 1552 33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exe si282759.exe PID 1552 wrote to memory of 3636 1552 33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exe si282759.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exe"C:\Users\Admin\AppData\Local\Temp\33bcd63bae0572f0e7cb812aadc367201413a2aaa2fdc993386feef3018a4715.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692787.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692787.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1427.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1427.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 10804⤵
- Program crash
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3221.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3221.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 13764⤵
- Program crash
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si282759.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si282759.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1016 -ip 10161⤵PID:2960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3908 -ip 39081⤵PID:1616
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5f66e67369ac51db78563626ca63f96b9
SHA1055fd1d03f80b29aa0d83a6ca954c0ece83933ad
SHA256e7c267c2bc08a950630ca080ebd8eac5c64e9b6679b96c3cc0604c99ddecae32
SHA512605a9109ed1d608aad13701b9f21c02299a96af7d8ffdfee654bc9203da231f2946f00492fd2beb81288a13399e1e38ab692f17d0c33ed72733568e49e7c2ac0
-
Filesize
648KB
MD5ef8fbf44fc3d3705da8f35d4b71308cf
SHA1c46880d9a0a4949b4c7a3274f7a1b615661c7119
SHA2568dfb60aa1390280fa9a39e195e09f2debeffec10dc141fbb8106acb20f1b5ef9
SHA512bbefd07307d630a477648ec3860fcb07548c2f731bc644e235307298869c80a248f6037e1579db0eeb039bbbdafe8a2c1c48ec33dfc2ed4407d3e96d515c928a
-
Filesize
252KB
MD543c8b1d3d85a17f7976e66e13f76e00d
SHA117ad40fefd18c561a7b5dc32ad19f31a2a63766e
SHA256873e5653f22a57adf6d80e22a6fbed2a8a735436b2c566e68f9bba24692ecf37
SHA5127eb32aa573b426865ba8b3a3fc9d91fad390734519e7e3aa241fef4e51d2974058b0aa9417c1101c45b62eb6033c90772b15ec20357dcf64ef44527713e87dec
-
Filesize
435KB
MD59138ce8f72860ac397d961cffc3acba6
SHA131ce035e7e55b319ec8e1b6555a721babc07f031
SHA2563f3768b63322b72926a22bc2693c115c337b24ad7b1c1859de46b10904b8e6c7
SHA51240c075a6a7087648ffeab2d26c3f3710b33ae23c304bb0a640e5048320d1bae67687da09d99874415e56fe1ad2a45399d532c6e31a124ef46aae4864395e946f
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0