Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exe
Resource
win10v2004-20241007-en
General
-
Target
3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exe
-
Size
801KB
-
MD5
72e4aad6c3ec6d338f0f6368b998e341
-
SHA1
35ba183422e3d49b4132763782ef09dbca7ba498
-
SHA256
3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f
-
SHA512
62724a1aa3b47a84b4a4029e18f67a5bf075963a76334afb2f219311442e3218e920fabb84ac2d6678bc8bef630ed7491ec84ab165a12e99bfcda6d460cb438f
-
SSDEEP
24576:DyFUQ1UWjL00KtMaByJfnYQZGjBCKf2T59FK2/vh6:WV1JX0zIJfYQojBrMFK2/vh
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2300-19-0x00000000024D0000-0x00000000024EA000-memory.dmp healer behavioral1/memory/2300-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/2300-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-41-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2300-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pro8810.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8810.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/5072-2142-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3456-2155-0x0000000000280000-0x00000000002B0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si415272.exe family_redline behavioral1/memory/5164-2166-0x0000000000960000-0x000000000098E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu6927.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu6927.exe -
Executes dropped EXE 5 IoCs
Processes:
un023686.exepro8810.exequ6927.exe1.exesi415272.exepid process 1340 un023686.exe 2300 pro8810.exe 5072 qu6927.exe 3456 1.exe 5164 si415272.exe -
Processes:
pro8810.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8810.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8810.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exeun023686.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un023686.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4116 2300 WerFault.exe pro8810.exe 1492 5072 WerFault.exe qu6927.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu6927.exe1.exesi415272.exe3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exeun023686.exepro8810.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6927.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si415272.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un023686.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8810.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8810.exepid process 2300 pro8810.exe 2300 pro8810.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8810.exequ6927.exedescription pid process Token: SeDebugPrivilege 2300 pro8810.exe Token: SeDebugPrivilege 5072 qu6927.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exeun023686.exequ6927.exedescription pid process target process PID 3268 wrote to memory of 1340 3268 3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exe un023686.exe PID 3268 wrote to memory of 1340 3268 3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exe un023686.exe PID 3268 wrote to memory of 1340 3268 3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exe un023686.exe PID 1340 wrote to memory of 2300 1340 un023686.exe pro8810.exe PID 1340 wrote to memory of 2300 1340 un023686.exe pro8810.exe PID 1340 wrote to memory of 2300 1340 un023686.exe pro8810.exe PID 1340 wrote to memory of 5072 1340 un023686.exe qu6927.exe PID 1340 wrote to memory of 5072 1340 un023686.exe qu6927.exe PID 1340 wrote to memory of 5072 1340 un023686.exe qu6927.exe PID 5072 wrote to memory of 3456 5072 qu6927.exe 1.exe PID 5072 wrote to memory of 3456 5072 qu6927.exe 1.exe PID 5072 wrote to memory of 3456 5072 qu6927.exe 1.exe PID 3268 wrote to memory of 5164 3268 3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exe si415272.exe PID 3268 wrote to memory of 5164 3268 3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exe si415272.exe PID 3268 wrote to memory of 5164 3268 3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exe si415272.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exe"C:\Users\Admin\AppData\Local\Temp\3a47a448c9c406e7c3fe57e1b1c882eaa16cc5b4cfaf16248a1a4f652309f58f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un023686.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un023686.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8810.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8810.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 10884⤵
- Program crash
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6927.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6927.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 13844⤵
- Program crash
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si415272.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si415272.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2300 -ip 23001⤵PID:2732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5072 -ip 50721⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD558e3b7fc951d71c0eadc590875a3a79b
SHA1fb0dc62c664d8669890c8614355545be4d711be0
SHA256cebb3a45519c15e191f4dd48c8d2c568c90372a2541c08f8edbb12462e6da78d
SHA512b8df24fbf16febce5869863ef5f690b22c4130a45bf0cc28abe6e750bc1978d89f8e73abbaee61ec70a3b4b4c8dc1d0d8aa65cc8a0bbd5564494c54f0e0b794a
-
Filesize
648KB
MD5c11cb2ee7b52d1f6e6ad7df90b414ba8
SHA1ba0a8f66ab679e8c52c6e7593768ceaf9b107646
SHA256496fae29836caee5bc4cedefa22026b63090d3189f1b42ca43147da8222c28bf
SHA512da608d4f7ef3d55c9ee39bffbfdf4c03b0af1d16503e40b403aae4bd218c0117b3bb47600cc54fda7fb6bf42fa19487b5f687daeb2ee2467b8538ea7125d5dea
-
Filesize
252KB
MD59d6b1c1b46e98c307d828050bb531b20
SHA108c40312e40aba0894568d22e608d95b5e88f9d5
SHA25635af3d154df29ba5250074e5f2f11172dd6e6218dbbe8638f1f0aaf38a7b4709
SHA51281581b211dae56c345f37cf5d816c16960a27ffbccc4b3c98d10da3363a0b1b3adf196ef0b96209663943229d575779c60061ef2571819cb7bc8888252aa0903
-
Filesize
435KB
MD5c11f8f1ec8e3da48efdb6ef8e8553754
SHA1e83e9a601983361742d40d86d6d07843cb5194a5
SHA256c23242817ee9d741256783197debddece4cfcbdb20f03b112211e8da6edecbad
SHA51272647c9d4422a5be897b2811d16f924c6eb06d6d8c29a1db2df16e52f3f21d5c858429a2a64543bf6e8cd6a8bb4663c8e6ae3fa3938443972cdd2534f637143e
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0