Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:03
Static task
static1
Behavioral task
behavioral1
Sample
572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exe
Resource
win10v2004-20241007-en
General
-
Target
572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exe
-
Size
802KB
-
MD5
633e37efc9cc142a8a7dd3578ad76536
-
SHA1
4d86c73bb8c8c29ac21d297f126abbce3c6f0093
-
SHA256
572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca
-
SHA512
ebfedd6c994b8771cb9de1a3e9a0fc424815bd533638a00e8fa60bd004ad4196243b10093c2a6a8c9b44f8106383789dc4931a696fcd96c52c408cba17a3596b
-
SSDEEP
24576:gyJne5LET1ERQMlLZVjBkcf2Pj5voP4g:nJe5oT1slLnjBr+voP
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2380-19-0x0000000002680000-0x000000000269A000-memory.dmp healer behavioral1/memory/2380-21-0x00000000026F0000-0x0000000002708000-memory.dmp healer behavioral1/memory/2380-22-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-49-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-47-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-45-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-43-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-41-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-39-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-37-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-35-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-33-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-31-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-29-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-27-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-25-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/2380-23-0x00000000026F0000-0x0000000002702000-memory.dmp healer -
Healer family
-
Processes:
pro4262.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4262.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1604-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4744-2156-0x0000000000B40000-0x0000000000B70000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si469129.exe family_redline behavioral1/memory/2564-2167-0x0000000000ED0000-0x0000000000EFE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu2463.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation qu2463.exe -
Executes dropped EXE 5 IoCs
Processes:
un672990.exepro4262.exequ2463.exe1.exesi469129.exepid process 2136 un672990.exe 2380 pro4262.exe 1604 qu2463.exe 4744 1.exe 2564 si469129.exe -
Processes:
pro4262.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4262.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4262.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exeun672990.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un672990.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1356 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4408 2380 WerFault.exe pro4262.exe 5756 1604 WerFault.exe qu2463.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
si469129.exe572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exeun672990.exepro4262.exequ2463.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si469129.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un672990.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4262.exepid process 2380 pro4262.exe 2380 pro4262.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4262.exequ2463.exedescription pid process Token: SeDebugPrivilege 2380 pro4262.exe Token: SeDebugPrivilege 1604 qu2463.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exeun672990.exequ2463.exedescription pid process target process PID 2476 wrote to memory of 2136 2476 572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exe un672990.exe PID 2476 wrote to memory of 2136 2476 572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exe un672990.exe PID 2476 wrote to memory of 2136 2476 572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exe un672990.exe PID 2136 wrote to memory of 2380 2136 un672990.exe pro4262.exe PID 2136 wrote to memory of 2380 2136 un672990.exe pro4262.exe PID 2136 wrote to memory of 2380 2136 un672990.exe pro4262.exe PID 2136 wrote to memory of 1604 2136 un672990.exe qu2463.exe PID 2136 wrote to memory of 1604 2136 un672990.exe qu2463.exe PID 2136 wrote to memory of 1604 2136 un672990.exe qu2463.exe PID 1604 wrote to memory of 4744 1604 qu2463.exe 1.exe PID 1604 wrote to memory of 4744 1604 qu2463.exe 1.exe PID 1604 wrote to memory of 4744 1604 qu2463.exe 1.exe PID 2476 wrote to memory of 2564 2476 572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exe si469129.exe PID 2476 wrote to memory of 2564 2476 572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exe si469129.exe PID 2476 wrote to memory of 2564 2476 572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exe si469129.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exe"C:\Users\Admin\AppData\Local\Temp\572c0ad4f348394e542af2e51b25ae02118dfa5a1e7a718839dec7425df9f8ca.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un672990.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un672990.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4262.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4262.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 11004⤵
- Program crash
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2463.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2463.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 2444⤵
- Program crash
PID:5756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si469129.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si469129.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2380 -ip 23801⤵PID:4812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1604 -ip 16041⤵PID:1592
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1356
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD53854c6b1aff90f6348ab80669d7ff6c5
SHA1fd841d30c56dca5174160bd0365fce93a5cfb2a8
SHA25684a07b446324673679b7623fe48ed6ec7448249878a25eda0aa9bf68401de39c
SHA512f25019a46a4e65614d5c0f9d92a90afbc34ac7b5ab122bbdd7ac9509e9cd993d4669fd5a1a47b35d20444ef04d2e6cbcd7c8cdea49783a9816d6168e9ed762ac
-
Filesize
648KB
MD5575768fb73576ecb4f11caf098507d44
SHA1fdb3da1f9769df1e4b2322d456cda7d829c4ea5b
SHA2564034cfbb8ea39d44da936435c24628b45c865e8e1442a35e1040327d8496aba9
SHA512dc91d9c7eef395186382b4f2b962529676c8762c3a35bda6a7661967ee3f78c4c6a3e76c15375bdcd6ff3706e4f6b3f197156dfc84ca53c0dda5916c8c4a0bf8
-
Filesize
252KB
MD5e884e00e011ba711291c83e8500b7fa5
SHA1ea04d28a51fa68ac29c27ae7e949adda3e5656e6
SHA25680d60c2e3f3c52088cd428800ea124ab5e2c181b2805ecf8e4fb83637bb18298
SHA512236079b15129a3bec30793c4ba343144ee8c9d3aae5c612350575113aca6501934470f391cf1d510a4749e7026f83a10a8551b5999966c0b286aa1e143d9b231
-
Filesize
435KB
MD5dad5325d576453d9749d1f44d1297ded
SHA17b74917407013807f87ac6060951e1a0f853b243
SHA25648294d259d850d30a31a15b4e71aaa005129736806a234a191b1fc194ccbc0e0
SHA512d80da32e61245034eb089348b66b884e61d10bc9c34fb8b8d4d031776797bb784705f269c57972d0b752148fcf318c7ad65e7fcf84d9b499808d6c1f97432f03
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0