Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:02
Static task
static1
Behavioral task
behavioral1
Sample
4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exe
Resource
win10v2004-20241007-en
General
-
Target
4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exe
-
Size
801KB
-
MD5
d3d89b6706b2e4245a788c29edc34228
-
SHA1
9ca2fc0f91e6dc4d1478bae007b9d376a732fe49
-
SHA256
4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6
-
SHA512
25f03b754932e0e052c52188244c4626ea4d331b6a6a975bc5bfb84714b28450e037c830fa4cd56ff7597d3d37c2ae7e89724484ac3daa577b4f511eb2b4ebcf
-
SSDEEP
24576:ZyJSps3fuX/8KT2X/glcD1ECQHC50jBZdf2V+v5Wln93jMYx:MJ6sK/jT2vGcD1xRCjBbfIZM
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1984-19-0x00000000024B0000-0x00000000024CA000-memory.dmp healer behavioral1/memory/1984-21-0x0000000002600000-0x0000000002618000-memory.dmp healer behavioral1/memory/1984-49-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-47-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-45-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-43-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-42-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-39-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-37-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-35-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-33-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-31-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-29-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-27-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-25-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-23-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/1984-22-0x0000000002600000-0x0000000002612000-memory.dmp healer -
Healer family
-
Processes:
pro7080.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7080.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7080.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3620-2143-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1804-2156-0x0000000000060000-0x0000000000090000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si569478.exe family_redline behavioral1/memory/5876-2167-0x0000000000920000-0x000000000094E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7422.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation qu7422.exe -
Executes dropped EXE 5 IoCs
Processes:
un393444.exepro7080.exequ7422.exe1.exesi569478.exepid process 1680 un393444.exe 1984 pro7080.exe 3620 qu7422.exe 1804 1.exe 5876 si569478.exe -
Processes:
pro7080.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7080.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exeun393444.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un393444.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4496 1984 WerFault.exe pro7080.exe 4324 3620 WerFault.exe qu7422.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un393444.exepro7080.exequ7422.exe1.exesi569478.exe4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un393444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7080.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si569478.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7080.exepid process 1984 pro7080.exe 1984 pro7080.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7080.exequ7422.exedescription pid process Token: SeDebugPrivilege 1984 pro7080.exe Token: SeDebugPrivilege 3620 qu7422.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exeun393444.exequ7422.exedescription pid process target process PID 1332 wrote to memory of 1680 1332 4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exe un393444.exe PID 1332 wrote to memory of 1680 1332 4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exe un393444.exe PID 1332 wrote to memory of 1680 1332 4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exe un393444.exe PID 1680 wrote to memory of 1984 1680 un393444.exe pro7080.exe PID 1680 wrote to memory of 1984 1680 un393444.exe pro7080.exe PID 1680 wrote to memory of 1984 1680 un393444.exe pro7080.exe PID 1680 wrote to memory of 3620 1680 un393444.exe qu7422.exe PID 1680 wrote to memory of 3620 1680 un393444.exe qu7422.exe PID 1680 wrote to memory of 3620 1680 un393444.exe qu7422.exe PID 3620 wrote to memory of 1804 3620 qu7422.exe 1.exe PID 3620 wrote to memory of 1804 3620 qu7422.exe 1.exe PID 3620 wrote to memory of 1804 3620 qu7422.exe 1.exe PID 1332 wrote to memory of 5876 1332 4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exe si569478.exe PID 1332 wrote to memory of 5876 1332 4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exe si569478.exe PID 1332 wrote to memory of 5876 1332 4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exe si569478.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exe"C:\Users\Admin\AppData\Local\Temp\4ef2c9a0551419a375bd6986011759abc0d94e08b62d4f9dce04c2dd3a0852a6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un393444.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un393444.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7080.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7080.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 10804⤵
- Program crash
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7422.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7422.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 13844⤵
- Program crash
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si569478.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si569478.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5876
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1984 -ip 19841⤵PID:1552
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3620 -ip 36201⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD54c53537ed89a827423e5342c5d38603e
SHA113682b0315d67dc9f74fb7d696aace35310e8085
SHA25623e6a73bc61e502d65401338a0076e5fe68c9ab524c8b82902bcb9cdc409e6ae
SHA512b22173454cb7a9b3cf140fe7f5644592afe2f530a4100ab4b54c638186c5404793a2c5330e6d762e2ec44a7d0a91165d8f0d0c706557fdd3c0dc69397d30ec85
-
Filesize
647KB
MD5bd15bf71736d3e74d2649d3ca3272e0a
SHA1e7a3785a42bbc82ff8a14147cbf6e80cda1b43dd
SHA25611272c82806b69cca2e1118a86ee8876296fa8842a7ab6c4628c238e3323aadb
SHA512d1176780f59dc8e4e3910fe3a344620dd36833a174b5ef5ca547a2690f32302cf7440d2e445dfd94c6dff7926f1bd5788bb427fe9391e2a4a7e89e5692d6ebe3
-
Filesize
252KB
MD52eeba5197921f77475317c2c79120523
SHA10713f7ac49b69c11a3d133c2230b64930b44666b
SHA256da7d075d249d7671ff7c59330b057b1a2f8a0f88e447fa37f751de3cb0919175
SHA512f22babfa685d2f7cc59364c3e9a7e05b4afcc800626392b3ce4ced0fb3de99f95a81d6642d6796b4e86b3141d8c79240fcb05149e6938c2abd08d14833eac196
-
Filesize
435KB
MD5ece434124996f26b7ca76bfcaad6f7b5
SHA137b798dbd1767d74b6e4a9b3b7f3422d0573fb7c
SHA2564beb035268bb0586001b5786f9e60039bd598a9d06473768a051dca1a95901cb
SHA5121ad42d3642d08d2a1fdb896663ad43522a935871a354b64b710dbe10481eca80041a758e9922238710b4b0d6c1bf8926705da00a94524769b76eaee753626b7a
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0