Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd.exe
Resource
win10v2004-20241007-en
General
-
Target
d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd.exe
-
Size
1.1MB
-
MD5
0f2d53a43413b6eab11f467e33dc528a
-
SHA1
99159faa8daf5f21abb75948bf8744d500db27ba
-
SHA256
d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd
-
SHA512
dc7b2cef95c3dc5971a37f06265b14a27762c38d4e450f3dc5345005ca93dbc9fbd96631fa11ccbb051be0253590cc88b3925faf25c505e39903ecdf17adbd6d
-
SSDEEP
24576:Ny2BBEqmlk65j3+2NBWv4Jga8Ne+KuhEeDBcCGZjcl3PYBI6xwXdU:o2ORjJev4Jg1NeqBCCGZQWGX
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1156-22-0x0000000002770000-0x000000000278A000-memory.dmp healer behavioral1/memory/1156-24-0x0000000002960000-0x0000000002978000-memory.dmp healer behavioral1/memory/1156-52-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-50-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-49-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-47-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-44-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-42-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-40-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-38-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-36-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-34-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-32-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-30-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-28-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-26-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/1156-25-0x0000000002960000-0x0000000002972000-memory.dmp healer -
Healer family
-
Processes:
pr184071.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr184071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr184071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr184071.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr184071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr184071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr184071.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4552-2204-0x00000000058A0000-0x00000000058D2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1872-2217-0x0000000000A10000-0x0000000000A3E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk423775.exe family_redline behavioral1/memory/5612-2228-0x0000000000540000-0x0000000000570000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu926157.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation qu926157.exe -
Executes dropped EXE 6 IoCs
Processes:
un356868.exeun233592.exepr184071.exequ926157.exe1.exerk423775.exepid process 2300 un356868.exe 1884 un233592.exe 1156 pr184071.exe 4552 qu926157.exe 1872 1.exe 5612 rk423775.exe -
Processes:
pr184071.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr184071.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr184071.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd.exeun356868.exeun233592.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un356868.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un233592.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3856 1156 WerFault.exe pr184071.exe 5520 4552 WerFault.exe qu926157.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exerk423775.exed0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd.exeun356868.exeun233592.exepr184071.exequ926157.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk423775.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un356868.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un233592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr184071.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu926157.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr184071.exepid process 1156 pr184071.exe 1156 pr184071.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr184071.exequ926157.exedescription pid process Token: SeDebugPrivilege 1156 pr184071.exe Token: SeDebugPrivilege 4552 qu926157.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd.exeun356868.exeun233592.exequ926157.exedescription pid process target process PID 208 wrote to memory of 2300 208 d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd.exe un356868.exe PID 208 wrote to memory of 2300 208 d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd.exe un356868.exe PID 208 wrote to memory of 2300 208 d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd.exe un356868.exe PID 2300 wrote to memory of 1884 2300 un356868.exe un233592.exe PID 2300 wrote to memory of 1884 2300 un356868.exe un233592.exe PID 2300 wrote to memory of 1884 2300 un356868.exe un233592.exe PID 1884 wrote to memory of 1156 1884 un233592.exe pr184071.exe PID 1884 wrote to memory of 1156 1884 un233592.exe pr184071.exe PID 1884 wrote to memory of 1156 1884 un233592.exe pr184071.exe PID 1884 wrote to memory of 4552 1884 un233592.exe qu926157.exe PID 1884 wrote to memory of 4552 1884 un233592.exe qu926157.exe PID 1884 wrote to memory of 4552 1884 un233592.exe qu926157.exe PID 4552 wrote to memory of 1872 4552 qu926157.exe 1.exe PID 4552 wrote to memory of 1872 4552 qu926157.exe 1.exe PID 4552 wrote to memory of 1872 4552 qu926157.exe 1.exe PID 2300 wrote to memory of 5612 2300 un356868.exe rk423775.exe PID 2300 wrote to memory of 5612 2300 un356868.exe rk423775.exe PID 2300 wrote to memory of 5612 2300 un356868.exe rk423775.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd.exe"C:\Users\Admin\AppData\Local\Temp\d0f949b16b18d47749b7fd6441582443e539810c743ff7136f01f3d226c68cdd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356868.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356868.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un233592.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un233592.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr184071.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr184071.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 10885⤵
- Program crash
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu926157.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu926157.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 13885⤵
- Program crash
PID:5520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk423775.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk423775.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1156 -ip 11561⤵PID:2448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4552 -ip 45521⤵PID:5444
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
852KB
MD5bff9ec07287770bd7ecb5f73c130ab21
SHA181399ee3d3e67aeae683e0162e1b9c971ca3947e
SHA25690749c97b3229835c70064d8e12bd7b183508d54b548019ecb25eea3356c0deb
SHA512e8033546b8d90be6b02553de1e66adf762a586f9ce907999be53e4c740a65f109267560713e0337f1c0edad2e299528b8d087874b39e37c325376ab430086987
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
698KB
MD5a35b080560b800e78fb459839c22b799
SHA16d46d330a097b987095f4da36219d32e1bcd6f27
SHA256fe998e70db4dc6bb80b0c6d683b8f7097ccf5a1c40c875e85d47961dae476d84
SHA512f26e8884749b284d9a615d1fea2bdb777fe1bce2d074e3c8cef9ae7308e7f90fb13bf7554e634a8c3f467ff6d26691547ac64b7ece8a6ad42765fde2c6c3980a
-
Filesize
403KB
MD5b09cdb7d575f46519bfba2e828047ce4
SHA158457289f2c008992d2f61e900232add0ccd6138
SHA2565712e23062f91efaef830aab0bc4e09cd2260ca66de99e645bb9bdf4f96cd019
SHA5126398e86b927bfd270e67c4550b563c6cff8dbf47b41e21b2cc30d875d351f603f4a007d2553f40e56cfbd74b67d8ab65df04e9e6b7572bf31f16879db9624937
-
Filesize
588KB
MD518bbde94984d39741eac85670cd01221
SHA173688103ec33fb98bac8aa1dea9d75bc970f38f2
SHA25612deade5ccd2ca63d61d20744dbd773636646b6b056e94e3c03cd25eb89fae8e
SHA512153daa951ed794342bc96b1dc676998b445e36bb24c943d7ea61d2cb87876d820db08a212f60cadd23bfa84833a7f70b2d35914b6d6fd2a1a1c6854bbd2ae89c
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1