Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exe
Resource
win10v2004-20241007-en
General
-
Target
bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exe
-
Size
801KB
-
MD5
3c3646bcde3804e8859dc31e294c4dbe
-
SHA1
9623cf2f3f1834df9889e800918fa5dc4ea4c6af
-
SHA256
bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6
-
SHA512
6acdf1bd0f5f618d57816394e3184b149b40dee9cb737412256cfe4f32ca2e6f2f703f03a9cc1c748a5ed3c530d6b31b48ceb0b1ed87ac52b851f6c777ac3570
-
SSDEEP
24576:TyC21o0hiP0KGYVaP3FFKzCjBvdf2wfjVu9IIR0I4:mC21ocazGLqWjBdfBk
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4840-19-0x0000000002590000-0x00000000025AA000-memory.dmp healer behavioral1/memory/4840-21-0x00000000025F0000-0x0000000002608000-memory.dmp healer behavioral1/memory/4840-22-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-35-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-47-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-45-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-43-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-42-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-49-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-39-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-37-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-33-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-31-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-29-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-27-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-25-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4840-23-0x00000000025F0000-0x0000000002602000-memory.dmp healer -
Healer family
-
Processes:
pro9093.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9093.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9093.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9093.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9093.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9093.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9093.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2844-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/928-2155-0x00000000003B0000-0x00000000003E0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si348716.exe family_redline behavioral1/memory/4240-2165-0x0000000000130000-0x000000000015E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu8718.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation qu8718.exe -
Executes dropped EXE 5 IoCs
Processes:
un454099.exepro9093.exequ8718.exe1.exesi348716.exepid process 3488 un454099.exe 4840 pro9093.exe 2844 qu8718.exe 928 1.exe 4240 si348716.exe -
Processes:
pro9093.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9093.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9093.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exeun454099.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un454099.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3588 4840 WerFault.exe pro9093.exe 376 2844 WerFault.exe qu8718.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un454099.exepro9093.exequ8718.exe1.exesi348716.exebb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un454099.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9093.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8718.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si348716.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9093.exepid process 4840 pro9093.exe 4840 pro9093.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9093.exequ8718.exedescription pid process Token: SeDebugPrivilege 4840 pro9093.exe Token: SeDebugPrivilege 2844 qu8718.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exeun454099.exequ8718.exedescription pid process target process PID 1400 wrote to memory of 3488 1400 bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exe un454099.exe PID 1400 wrote to memory of 3488 1400 bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exe un454099.exe PID 1400 wrote to memory of 3488 1400 bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exe un454099.exe PID 3488 wrote to memory of 4840 3488 un454099.exe pro9093.exe PID 3488 wrote to memory of 4840 3488 un454099.exe pro9093.exe PID 3488 wrote to memory of 4840 3488 un454099.exe pro9093.exe PID 3488 wrote to memory of 2844 3488 un454099.exe qu8718.exe PID 3488 wrote to memory of 2844 3488 un454099.exe qu8718.exe PID 3488 wrote to memory of 2844 3488 un454099.exe qu8718.exe PID 2844 wrote to memory of 928 2844 qu8718.exe 1.exe PID 2844 wrote to memory of 928 2844 qu8718.exe 1.exe PID 2844 wrote to memory of 928 2844 qu8718.exe 1.exe PID 1400 wrote to memory of 4240 1400 bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exe si348716.exe PID 1400 wrote to memory of 4240 1400 bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exe si348716.exe PID 1400 wrote to memory of 4240 1400 bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exe si348716.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exe"C:\Users\Admin\AppData\Local\Temp\bb101261eb25b6da3021e5d6f616b1db66db946c2e6399e461001f550d247cc6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un454099.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un454099.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9093.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9093.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 11004⤵
- Program crash
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8718.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8718.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:928 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 12044⤵
- Program crash
PID:376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si348716.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si348716.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4840 -ip 48401⤵PID:2548
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2844 -ip 28441⤵PID:1084
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD53159dd26a5eee5203d87515a4f92e878
SHA167a9bfeb77cc3ba5e639309207d878b12c8dc431
SHA256ff7ca0153f050750aa3f504c1f030784c935d5ddf3b00dbeb0a513c2b7508378
SHA512a111886966d652f3e887833ca934191004977a7819e9315f10caf01755225613565f69a812a8d83df4a70e249f14c42c018e830aae4e5f5661bbe1c71c4b92ba
-
Filesize
647KB
MD5a37ead4d92d44a8adbd4dc167a753d19
SHA100f6efc9479d8955c2916400146d71314090409c
SHA2565f7f2e04f81b1423fb33e8e4bbd6e3c51cce871d8e636f4c22325e1ecfb014f4
SHA51272d05de7a2bb26d5d2a41c8f4df45e744877b15a8b4e353c49b9c737ca61541ed8285854ffb232bb430418a0898077afe8a2dde674210f913636b6f605d6c305
-
Filesize
252KB
MD5a90cc985e44a7f81fae95e60f8adcd84
SHA14dac821cf9fbd660b024b8206269068c2d586605
SHA2560780c44bed4436e4e687b9d701dcaf8292f3e74bf048def6bd5e91005fa6a1f3
SHA512bce31c51f32a9dc35df172b01d46de2cba5229eb81f53e7d058d8f793910d11ade3520b06d72ddf520bf47f4eaa5dd46a5123098055d93a1b25e45d9e871ab40
-
Filesize
435KB
MD5afd39d92d72af7e38eb3586d9a217c15
SHA1d51bb6c647e7e5911bc84613ad28d87b4f0b26d8
SHA2564f971e1ca181d3e3eb20600275e764a2f5324437a1fffcd8148f7d9718463657
SHA5124f574a546c9e0c767c4f1278a5d2f18ecc9ad2e3ea88adf05280930480f6c6580978e0eaf7d322878e111d5bf1c4960d2ae5a376be6fc9e9cdc8d7a159f7693c
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0