Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exe
Resource
win10v2004-20241007-en
General
-
Target
6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exe
-
Size
815KB
-
MD5
6f794b0dbbe56248df2cba856bc1e0ee
-
SHA1
6fb0a400feb1ad50a61df34f0bfcfd2474a2207a
-
SHA256
6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170
-
SHA512
f7c1d0258e363e5be03946f7d68b5bca4c86860ca26c661b631870595eefa8f6b73737fa2327ddff976efe145ef58cb3e23ba23f2d2c939e7c50f5ac73de04ce
-
SSDEEP
12288:iMrJy90J4g4FWefLAYKr3vRtTthRdEasEeJMc5yCFE2m+zSFYLSrSo1zYAUt4n24:Xyynez+xdPc5y12ZOz31zYDin2VG
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1792-19-0x0000000002700000-0x000000000271A000-memory.dmp healer behavioral1/memory/1792-21-0x0000000002990000-0x00000000029A8000-memory.dmp healer behavioral1/memory/1792-37-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-49-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-47-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-45-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-43-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-41-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-39-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-35-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-33-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-31-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-27-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-25-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-23-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-22-0x0000000002990000-0x00000000029A2000-memory.dmp healer behavioral1/memory/1792-29-0x0000000002990000-0x00000000029A2000-memory.dmp healer -
Healer family
-
Processes:
pro4175.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4175.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4175.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3616-2143-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4516-2156-0x0000000000FE0000-0x0000000001010000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si582286.exe family_redline behavioral1/memory/5044-2165-0x00000000007D0000-0x00000000007FE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu4389.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu4389.exe -
Executes dropped EXE 5 IoCs
Processes:
un054907.exepro4175.exequ4389.exe1.exesi582286.exepid process 4840 un054907.exe 1792 pro4175.exe 3616 qu4389.exe 4516 1.exe 5044 si582286.exe -
Processes:
pro4175.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4175.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4175.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exeun054907.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un054907.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 888 1792 WerFault.exe pro4175.exe 4396 3616 WerFault.exe qu4389.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
si582286.exe6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exeun054907.exepro4175.exequ4389.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si582286.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un054907.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4175.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4389.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4175.exepid process 1792 pro4175.exe 1792 pro4175.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4175.exequ4389.exedescription pid process Token: SeDebugPrivilege 1792 pro4175.exe Token: SeDebugPrivilege 3616 qu4389.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exeun054907.exequ4389.exedescription pid process target process PID 4940 wrote to memory of 4840 4940 6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exe un054907.exe PID 4940 wrote to memory of 4840 4940 6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exe un054907.exe PID 4940 wrote to memory of 4840 4940 6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exe un054907.exe PID 4840 wrote to memory of 1792 4840 un054907.exe pro4175.exe PID 4840 wrote to memory of 1792 4840 un054907.exe pro4175.exe PID 4840 wrote to memory of 1792 4840 un054907.exe pro4175.exe PID 4840 wrote to memory of 3616 4840 un054907.exe qu4389.exe PID 4840 wrote to memory of 3616 4840 un054907.exe qu4389.exe PID 4840 wrote to memory of 3616 4840 un054907.exe qu4389.exe PID 3616 wrote to memory of 4516 3616 qu4389.exe 1.exe PID 3616 wrote to memory of 4516 3616 qu4389.exe 1.exe PID 3616 wrote to memory of 4516 3616 qu4389.exe 1.exe PID 4940 wrote to memory of 5044 4940 6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exe si582286.exe PID 4940 wrote to memory of 5044 4940 6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exe si582286.exe PID 4940 wrote to memory of 5044 4940 6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exe si582286.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exe"C:\Users\Admin\AppData\Local\Temp\6102435f1c4ff75e3982ecf59df98bb61e699d4905c570e106393b7036da7170.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054907.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054907.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4175.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4175.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 10804⤵
- Program crash
PID:888 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4389.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4389.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3616 -s 14924⤵
- Program crash
PID:4396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si582286.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si582286.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1792 -ip 17921⤵PID:3128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3616 -ip 36161⤵PID:5360
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5206380c60ebf1a489d3240a2e0c2a04f
SHA1aba5b3d0004c3861a46653f216f8526b33b7bf48
SHA256e9d47a4b7908ed6d756e3981af358a2acd664a5a114ca18e5913dd266ffdf45c
SHA51280f329a28341fd0eebacd962f6b17876d77920ceb66086d892aa5c9e0de54e658c88051a3817ba48247a505b4c567436aa9179487882d8b98a38f8a1b0cf2d3e
-
Filesize
661KB
MD5f88c085c5519a4adbb6fad16a4fd1c37
SHA17b6b949c9ed9b9b155764d26a90423ee9d936146
SHA256e79f64d4c9af31a03dae76279e5ced5e7505877daa215ab76d9b02c8a51e3ade
SHA5127e113e7649fcbc2a5ef0198bf1d775040fbdc4e65b4071e8961bf40b3f0be309b6a4aa78da0b9c48c737c35fb2e879c08336640233cf71c3ce62845a50143119
-
Filesize
332KB
MD50927306b57f9497e1389038178220d06
SHA18a4fd81bf759bafe36bd1347742e6014b9da08c5
SHA256e02431ef55d26f03acf548e1f6abf9e1bc270066c8a30fc860baa9e62f534034
SHA5122bd058fada8ce491576eec131ac68e4827ed8d8a1415154625898cd8d15c66014cf38f7f94e5b845f9d09b095c5ce4ade8f3651643a84126f8d90310cb2c6f6f
-
Filesize
495KB
MD5c6cfd280cf5fafb9bdc2dd2b41906583
SHA1d0b411acae6b1ae7cd8d19eebd74855da017baf2
SHA256c0ef790d5ebde815d251a0a3009efcf6e38ad2b57947cf3583ad33f669a46655
SHA5121605deb633357539edf43d9de210014c44d773acebf7939ae3892d856c57b43a79671b65a14c373c8ad110f01819d528b05763e58f774cf155d616ad4b76f3b2
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0