Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 15:04
Static task
static1
Behavioral task
behavioral1
Sample
b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exe
Resource
win10v2004-20241007-en
General
-
Target
b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exe
-
Size
794KB
-
MD5
a3c899bc6e87cd303c108f42b24708b9
-
SHA1
ab37f4e422ee463e83218eb4279909cffeb6d6ae
-
SHA256
b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df
-
SHA512
123c3a640d904fc2e4039f475e4eb9c154370555a34708814a572dd0a49f1c793c223c122e01f19a83dd06da83ebe589419597ffe65fe7a76da74686af2bf4f5
-
SSDEEP
12288:qMr8y90cbW8qnH+mO77j9C+P9zXGc6wCrVTeB9YfCurwdawh+10tCQCm6KqEA:SyrWV+mJy9zvOHwdaI+14CQCmVw
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3668-19-0x00000000023B0000-0x00000000023CA000-memory.dmp healer behavioral1/memory/3668-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/3668-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-41-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-38-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-30-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/3668-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pro7616.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7616.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7616.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/752-2142-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5388-2155-0x0000000000300000-0x0000000000330000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si491473.exe family_redline behavioral1/memory/5692-2166-0x0000000000DF0000-0x0000000000E1E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu9722.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qu9722.exe -
Executes dropped EXE 5 IoCs
Processes:
un685728.exepro7616.exequ9722.exe1.exesi491473.exepid process 4052 un685728.exe 3668 pro7616.exe 752 qu9722.exe 5388 1.exe 5692 si491473.exe -
Processes:
pro7616.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7616.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7616.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exeun685728.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un685728.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2112 3668 WerFault.exe pro7616.exe 5568 752 WerFault.exe qu9722.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
si491473.exeb0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exeun685728.exepro7616.exequ9722.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si491473.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un685728.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7616.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9722.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7616.exepid process 3668 pro7616.exe 3668 pro7616.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7616.exequ9722.exedescription pid process Token: SeDebugPrivilege 3668 pro7616.exe Token: SeDebugPrivilege 752 qu9722.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exeun685728.exequ9722.exedescription pid process target process PID 3648 wrote to memory of 4052 3648 b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exe un685728.exe PID 3648 wrote to memory of 4052 3648 b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exe un685728.exe PID 3648 wrote to memory of 4052 3648 b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exe un685728.exe PID 4052 wrote to memory of 3668 4052 un685728.exe pro7616.exe PID 4052 wrote to memory of 3668 4052 un685728.exe pro7616.exe PID 4052 wrote to memory of 3668 4052 un685728.exe pro7616.exe PID 4052 wrote to memory of 752 4052 un685728.exe qu9722.exe PID 4052 wrote to memory of 752 4052 un685728.exe qu9722.exe PID 4052 wrote to memory of 752 4052 un685728.exe qu9722.exe PID 752 wrote to memory of 5388 752 qu9722.exe 1.exe PID 752 wrote to memory of 5388 752 qu9722.exe 1.exe PID 752 wrote to memory of 5388 752 qu9722.exe 1.exe PID 3648 wrote to memory of 5692 3648 b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exe si491473.exe PID 3648 wrote to memory of 5692 3648 b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exe si491473.exe PID 3648 wrote to memory of 5692 3648 b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exe si491473.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exe"C:\Users\Admin\AppData\Local\Temp\b0579275f87c834f26657df6d47dab3d8f5226c9623c3b6ae1a013aa3974c3df.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un685728.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un685728.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7616.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7616.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3668 -s 10844⤵
- Program crash
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9722.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9722.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 2364⤵
- Program crash
PID:5568 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si491473.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si491473.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3668 -ip 36681⤵PID:880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 752 -ip 7521⤵PID:5504
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD504b2052d348bf81b9bc50097718f66b4
SHA1716acea4b44ae28b1d21626116e0724b98af478e
SHA256bc9584499b4c98b7482582a219ba3808c045c55071296d7e006194722e80f0bd
SHA512cd6a8d0cf301d377c58bbd203c52b8b8e2497dd4719f0ba2a09033c32e117cc40a09f64606152f924d93fd3b3434f385dad1273a46a07370e34bd8c0828eeade
-
Filesize
641KB
MD547d7c955279382cf9e395d686bce98b4
SHA138c079dfc979f0ada79506b351dae58b16eb0beb
SHA25695bdec7c0bb59220e69cc9e369fbcb0ce02192f5f4dfcee82fa874ee29ccc44c
SHA5124809d3b7fb92b88315b0b90186cbbe7f999ca689844b21a6f6a01b62079f181e58797680e552fbdd29027e6cf9ff01a7e2b946ad191b75b12d7233a623049381
-
Filesize
241KB
MD558d87c91bf23d70b8fc096ebb60980fa
SHA171ef4b470631949dd5a194ed2a689811400e459a
SHA256b356615bde99d86692bd3c3fd19c46143c85baf5b62d0e3ead69255f0f8c5cfe
SHA5123c7b0ccbcbcbe22870cd5caf1325642b4fdb5e702bb57f9e24ecf1666c53e2f8d4b7b017782118839b71c614428747f44442a2a5bd5ba8078ea60a0e531b5b71
-
Filesize
424KB
MD5506896f5453880f4eafa4a68c0ea8071
SHA1e02e03ee2960b356bc572231a78732c1d670764b
SHA256d51c8e7deaf840331be74a5f1be67b3844ec3b81b84cc372048b8aa909fe4c7c
SHA5126050fb9f18915724f8ed58b4178a3aee25d856cc4f68f99045210405082327077d0eb71931baf6b9b164d1b205f4d301c5f64f493185365ca1acc9eb21f85e49
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0