Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 21:26
Static task
static1
Behavioral task
behavioral1
Sample
9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe
Resource
win10v2004-20241007-en
General
-
Target
9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe
-
Size
801KB
-
MD5
0679823de31a7fdc769c56e8f02d7793
-
SHA1
ecd0cb792a8fe019a567a808ceb223b257ef5d9f
-
SHA256
9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f
-
SHA512
2be1d8620d595556057c524d1bd67ca85d84c33a0a830b9385dfc3e6989d2cd936f8995db6cdc524f97d7e2c3af5bb80bc23c6357103939add1224182d72ee45
-
SSDEEP
24576:gytr4O1nZlwKX/gl9k1EEQz+PZ4jBDkf2rjl8ViIkT:ntb/wKvG9k1pQMajBKU2iX
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4500-19-0x0000000002350000-0x000000000236A000-memory.dmp healer behavioral1/memory/4500-21-0x00000000025E0000-0x00000000025F8000-memory.dmp healer behavioral1/memory/4500-47-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-45-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-43-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-41-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-39-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-37-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-49-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-35-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-33-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-31-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-29-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-27-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-25-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-23-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/4500-22-0x00000000025E0000-0x00000000025F2000-memory.dmp healer -
Healer family
-
Processes:
pro1165.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1165.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1165.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2972-2142-0x0000000004CC0000-0x0000000004CF2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2108-2155-0x0000000000C70000-0x0000000000CA0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913371.exe family_redline behavioral1/memory/2092-2166-0x0000000000110000-0x000000000013E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu1075.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation qu1075.exe -
Executes dropped EXE 5 IoCs
Processes:
un930754.exepro1165.exequ1075.exe1.exesi913371.exepid process 384 un930754.exe 4500 pro1165.exe 2972 qu1075.exe 2108 1.exe 2092 si913371.exe -
Processes:
pro1165.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1165.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1165.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exeun930754.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un930754.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4600 4500 WerFault.exe pro1165.exe 5124 2972 WerFault.exe qu1075.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exeun930754.exepro1165.exequ1075.exe1.exesi913371.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un930754.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1165.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1075.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si913371.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1165.exepid process 4500 pro1165.exe 4500 pro1165.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1165.exequ1075.exedescription pid process Token: SeDebugPrivilege 4500 pro1165.exe Token: SeDebugPrivilege 2972 qu1075.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exeun930754.exequ1075.exedescription pid process target process PID 1460 wrote to memory of 384 1460 9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe un930754.exe PID 1460 wrote to memory of 384 1460 9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe un930754.exe PID 1460 wrote to memory of 384 1460 9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe un930754.exe PID 384 wrote to memory of 4500 384 un930754.exe pro1165.exe PID 384 wrote to memory of 4500 384 un930754.exe pro1165.exe PID 384 wrote to memory of 4500 384 un930754.exe pro1165.exe PID 384 wrote to memory of 2972 384 un930754.exe qu1075.exe PID 384 wrote to memory of 2972 384 un930754.exe qu1075.exe PID 384 wrote to memory of 2972 384 un930754.exe qu1075.exe PID 2972 wrote to memory of 2108 2972 qu1075.exe 1.exe PID 2972 wrote to memory of 2108 2972 qu1075.exe 1.exe PID 2972 wrote to memory of 2108 2972 qu1075.exe 1.exe PID 1460 wrote to memory of 2092 1460 9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe si913371.exe PID 1460 wrote to memory of 2092 1460 9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe si913371.exe PID 1460 wrote to memory of 2092 1460 9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe si913371.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe"C:\Users\Admin\AppData\Local\Temp\9507ce0192e5bbcbc1e0435b64019380c17d390ebe604d412240218471f8580f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un930754.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un930754.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1165.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1165.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 10084⤵
- Program crash
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1075.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1075.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 14684⤵
- Program crash
PID:5124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913371.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913371.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4500 -ip 45001⤵PID:3812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2972 -ip 29721⤵PID:6096
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5b60215e5c43eec48a05a4f520f302763
SHA14f5e06a10bd758c65387b04ac10e14faedd64655
SHA25667d078b109521e4fe0522ef84857623d28c9a7f44404456bf3e4517cb32a245c
SHA512aa3a40cc83be29cd1fc9fa104095f11367ea424540013bb1733c60910f029c03a5e92231e24abfb8e085a3449929d04fe25ee1f9bda75c0ba2da7311a4da9abb
-
Filesize
647KB
MD58d3aa19bb910dc48dcfbc4ad11f0b47d
SHA1150798dd301697846271a7dbd94aa6a570401576
SHA256bce48ec4440fb76c71b7d7277524e747301e87ab633554ecf39825e6957b40d5
SHA512515815191716e1687f02849c7b50729e6926d8b6bbe57252f99a8fb1358e4b3017d7a4757a9d27a5b07457532c74d969491a9c3ee195bb5e8ce3c746d013b57e
-
Filesize
252KB
MD5c71dcfe3a68f9ca0b7e2c91b44854ad5
SHA1f0de632dbd1267cc729fd786e6ed84ced77a10ed
SHA2569e4ecb52e0ab3e2b584c5448d942a05a63e04e9a96e1ec7f46697dc40abe2778
SHA5127072a64fab46bc63142df4cb6053997c7353e8cfc478dc2c7cea55dfc71569fa3b76b1746cb59b22082cf1714790c14bf6ef5fd6649deadc3f15c8697c87452c
-
Filesize
435KB
MD5e2f376f70b8a3f3192a537f98b8e74f4
SHA1993c1c9e425b77859c49762c2b00f86e7b9dfd1d
SHA256df208db06a2c7d536dd6ebd9658a5952538ab00818ce5d93571d570e45719907
SHA512671ab03c748cf8c684855033494dc05630b9b78275317f4de30f01fb1b2de706be9503e1cf6690f0e417dd0e5c696589f3bc55295ca5192410f5c797eea6ed82
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0