Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 18:07
Static task
static1
Behavioral task
behavioral1
Sample
aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exe
Resource
win10v2004-20241007-en
General
-
Target
aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exe
-
Size
802KB
-
MD5
21fe5ebd39a747c5c0fe1fef41d98a74
-
SHA1
f368352d5182bd0b3f2c1297e0b1b2c3a86702fb
-
SHA256
aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb
-
SHA512
ced62d4f72eff9ed57b7f3dd446190b24773aee55b4f348180b09b4b8e86064e081828badfff8d9518fc7739bed4ceac4bc6b05c16ec38a911cc734e3f0238e2
-
SSDEEP
24576:4yPPBvz0EigO1E+DCSyZ4jByBf24eGyaDr:/BvzZO1HyyjBmFf
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3756-19-0x0000000002570000-0x000000000258A000-memory.dmp healer behavioral1/memory/3756-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/3756-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-40-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3756-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro5564.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5564.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5564.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5564.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5564.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5564.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5564.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2248-2142-0x00000000028C0000-0x00000000028F2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3300-2155-0x0000000000780000-0x00000000007B0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si334851.exe family_redline behavioral1/memory/5680-2166-0x0000000000820000-0x000000000084E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu8151.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation qu8151.exe -
Executes dropped EXE 5 IoCs
Processes:
un145405.exepro5564.exequ8151.exe1.exesi334851.exepid process 3284 un145405.exe 3756 pro5564.exe 2248 qu8151.exe 3300 1.exe 5680 si334851.exe -
Processes:
pro5564.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5564.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5564.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exeun145405.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un145405.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1096 3756 WerFault.exe pro5564.exe 5864 2248 WerFault.exe qu8151.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un145405.exepro5564.exequ8151.exe1.exesi334851.exeaac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un145405.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5564.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8151.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si334851.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5564.exepid process 3756 pro5564.exe 3756 pro5564.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5564.exequ8151.exedescription pid process Token: SeDebugPrivilege 3756 pro5564.exe Token: SeDebugPrivilege 2248 qu8151.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exeun145405.exequ8151.exedescription pid process target process PID 3880 wrote to memory of 3284 3880 aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exe un145405.exe PID 3880 wrote to memory of 3284 3880 aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exe un145405.exe PID 3880 wrote to memory of 3284 3880 aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exe un145405.exe PID 3284 wrote to memory of 3756 3284 un145405.exe pro5564.exe PID 3284 wrote to memory of 3756 3284 un145405.exe pro5564.exe PID 3284 wrote to memory of 3756 3284 un145405.exe pro5564.exe PID 3284 wrote to memory of 2248 3284 un145405.exe qu8151.exe PID 3284 wrote to memory of 2248 3284 un145405.exe qu8151.exe PID 3284 wrote to memory of 2248 3284 un145405.exe qu8151.exe PID 2248 wrote to memory of 3300 2248 qu8151.exe 1.exe PID 2248 wrote to memory of 3300 2248 qu8151.exe 1.exe PID 2248 wrote to memory of 3300 2248 qu8151.exe 1.exe PID 3880 wrote to memory of 5680 3880 aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exe si334851.exe PID 3880 wrote to memory of 5680 3880 aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exe si334851.exe PID 3880 wrote to memory of 5680 3880 aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exe si334851.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exe"C:\Users\Admin\AppData\Local\Temp\aac2c8d378178924b4f00336f06009b4b0bd258154c5904cab70652fcaaa23cb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un145405.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un145405.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5564.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5564.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3756 -s 10844⤵
- Program crash
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8151.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8151.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 13844⤵
- Program crash
PID:5864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si334851.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si334851.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3756 -ip 37561⤵PID:4712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2248 -ip 22481⤵PID:6080
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD58978ca4b4b3d9e82282997f859ff8f75
SHA125308f30e0578442fad92b07d79713568f67c75b
SHA256f83a81d0741ee5ed84452483249cb6321dd77e56c08c0b0a4d53b3595e3721b1
SHA512a92b3bd79f5b36863b2c790a949ac5b4c6ed05e717e91f445534eaaf420f06dd0fdb741d5b19471aa0555306f7632998823f7c8bf1433f0ac7fa7067b21459c2
-
Filesize
648KB
MD566e8913ad37243791f8a8a105a19db3a
SHA1c36ec6fd6c6d20d315a359425f9ac1f3b0556135
SHA256c5198dc55fada2375a9e50191bd905600b2881f4944a083f092ebab84f1ab19c
SHA512e69eaf6f126dc748a2217ec088a3ed901640040a40cbf4211972fde74c584606683aa3388729face476ede3567b0375a5c83030bc9fae0e2f053050dbb94f48f
-
Filesize
252KB
MD599e59a93fac61a17822db1929bbda916
SHA11bb2b8bc9fd0cf1408de72f680cc241488e8f3f0
SHA25691904e81c42e8de7be845ef3ae409378fa7dd11160717b18e155d36397a4d971
SHA51262fd0f860748a94ef8d017854b21491bde1642dcfa0e7225499202dfe1321c713e5418df0e47dde7f92b0ff04c5659f1da860dfa25e03a3050bb3765d60d2c78
-
Filesize
435KB
MD5782b1a63d2ea3bbcd92ac3d3fc94b755
SHA1a11c2419dbd64e71913b4d203c65c34cf7d49e6a
SHA256f435001c21fc436d567a02534f6719565b107606fac85d68cfc3bd209b635f56
SHA5121197a3e2a8d5f211e0531f3ed990ff3ffd7b9ed5b9ca22b30e2c8e6b2267f9cbeef668b080a3edf313de0446d83569767cdd37565a37b66811f2c0cd7e688fd4
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0