Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exe
Resource
win10v2004-20241007-en
General
-
Target
281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exe
-
Size
795KB
-
MD5
b25d5d38a3ee81a5a12c89cfef6b3336
-
SHA1
6bace67789eb8c0ac692caf61986c1cca74a1cee
-
SHA256
281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992
-
SHA512
65b24f740ab7bd47ff4e1bb2c5f5ba20a873d66f8a55e11182d3d1d846dc6f5c7f7fad9989b86944437209851083c9704d3fc17f7b1c1350289fa23edd54aed3
-
SSDEEP
24576:ayIvFgPgs8sajMosGffpv8QKn/VG+HdAkVQPOC9:h/h8JBv81BKOC
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3232-19-0x0000000004B10000-0x0000000004B2A000-memory.dmp healer behavioral1/memory/3232-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/3232-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-46-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-28-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3232-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro3792.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3792.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3792.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3792.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3792.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3792.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3792.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2948-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1284-2155-0x00000000003B0000-0x00000000003E0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si755125.exe family_redline behavioral1/memory/3612-2166-0x0000000000200000-0x000000000022E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu2715.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qu2715.exe -
Executes dropped EXE 5 IoCs
Processes:
un367588.exepro3792.exequ2715.exe1.exesi755125.exepid process 2664 un367588.exe 3232 pro3792.exe 2948 qu2715.exe 1284 1.exe 3612 si755125.exe -
Processes:
pro3792.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3792.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3792.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exeun367588.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un367588.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3704 3232 WerFault.exe pro3792.exe 5144 2948 WerFault.exe qu2715.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu2715.exe1.exesi755125.exe281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exeun367588.exepro3792.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2715.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si755125.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un367588.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3792.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro3792.exepid process 3232 pro3792.exe 3232 pro3792.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro3792.exequ2715.exedescription pid process Token: SeDebugPrivilege 3232 pro3792.exe Token: SeDebugPrivilege 2948 qu2715.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exeun367588.exequ2715.exedescription pid process target process PID 3212 wrote to memory of 2664 3212 281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exe un367588.exe PID 3212 wrote to memory of 2664 3212 281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exe un367588.exe PID 3212 wrote to memory of 2664 3212 281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exe un367588.exe PID 2664 wrote to memory of 3232 2664 un367588.exe pro3792.exe PID 2664 wrote to memory of 3232 2664 un367588.exe pro3792.exe PID 2664 wrote to memory of 3232 2664 un367588.exe pro3792.exe PID 2664 wrote to memory of 2948 2664 un367588.exe qu2715.exe PID 2664 wrote to memory of 2948 2664 un367588.exe qu2715.exe PID 2664 wrote to memory of 2948 2664 un367588.exe qu2715.exe PID 2948 wrote to memory of 1284 2948 qu2715.exe 1.exe PID 2948 wrote to memory of 1284 2948 qu2715.exe 1.exe PID 2948 wrote to memory of 1284 2948 qu2715.exe 1.exe PID 3212 wrote to memory of 3612 3212 281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exe si755125.exe PID 3212 wrote to memory of 3612 3212 281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exe si755125.exe PID 3212 wrote to memory of 3612 3212 281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exe si755125.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exe"C:\Users\Admin\AppData\Local\Temp\281293b69f129b7b2efdfe96cd493ceeec216bdaef98687e14897cb2d9cf7992.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367588.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un367588.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3792.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3792.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 10804⤵
- Program crash
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2715.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2715.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 13804⤵
- Program crash
PID:5144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si755125.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si755125.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3232 -ip 32321⤵PID:2164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2948 -ip 29481⤵PID:2912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5ebb3ce0c8a48be77f048ac06d4cacc88
SHA1418b4c144a787d0ede8bf4cfb60b4fc9b6125cd7
SHA256988e4062f995181e721b6713e56c58cdeb7c125e00318d917bda470ea4a5f858
SHA51236a395e4155b67721199f29bf026ef64aa0570df9527edce0acf876cf716ec5abab3a947329741c686740a31357c220554b7a4d5e4e2b0bc73d7a5b93ef5f8e8
-
Filesize
641KB
MD5e35b83ba03dcc7ca13b3b1da7c5c737d
SHA193e67a433cbac2e64cbd1b6775730a240ddf2276
SHA25692e5411fd5adf009a208caf5ab88714d7b0199ae9d6fe632d18247cc4613eb96
SHA5121283cb7f04109cfc1a0fb74cce6d4bf0974a978197519a0d6dfb1e86a91bb1b2eead598314ffbb481889b387c15a4611895676b617fab9a1bb70711a826072e0
-
Filesize
241KB
MD5bbc8650ac9108708f27ccc8b7bc76b14
SHA1abe0efd98c288296b4a3d1b83172109e499effa9
SHA256d4510c79f283585f7a258fc43d49c51150ed258683908ccef59bf66055924764
SHA512dcc6957267e74dfc04a396ec82c4ee76531f47fee7e2d8331a0695b68036262e483e979f6060d24b4a7c12f51eb2d46db8f4217c6faff41fc43569022d77fabd
-
Filesize
424KB
MD546d273f6c8d9ddbd498f55386139828f
SHA153ad0391b13bbde7d236dcc45ad81795b3e133a0
SHA256ad337251ee4759f5e7b147ebe8c6b900d08893e937a84dfdabb789f7dd49f916
SHA512096d57326bfef63cd011006968d5aeb0a9495a58ba4ad6f7975c0157c286b71c6e445e86d969c14fa6e3842be75fefe6c2e518edd53d4ba3117dc8eebd6a2780
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0