Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 09:13
Static task
static1
Behavioral task
behavioral1
Sample
70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe
Resource
win10v2004-20241007-en
General
-
Target
70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe
-
Size
794KB
-
MD5
af6d898e7849264a90ae214ae77d5ca8
-
SHA1
3a68f0bd0d6cf63a4c7c9cd66fc5213397a6c69b
-
SHA256
70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068
-
SHA512
620ad1c1ef2a0d867dfe728b021dcbe424b047242e01973adc1c6189ae1598390a7effd05dd0db5d6bf0f891b5a15dc606905cd926893e1e76e9ad06fbb67359
-
SSDEEP
12288:cMrOy90pwtX6jm5ZkQ6oxgT6oQaigqPon9d0Curwd7wTyReBwQo52suU6M:CyowPQhSgTvXWwnLKwd76yRQwQi2M
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/60-18-0x0000000002690000-0x00000000026AA000-memory.dmp healer behavioral1/memory/60-20-0x0000000002720000-0x0000000002738000-memory.dmp healer behavioral1/memory/60-21-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-48-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-46-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-44-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-42-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-40-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-38-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-36-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-34-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-32-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-30-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-28-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-26-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-24-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/60-22-0x0000000002720000-0x0000000002732000-memory.dmp healer -
Healer family
-
Processes:
pro2235.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2235.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2235.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2444-2138-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1092-2151-0x0000000000C60000-0x0000000000C90000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si434162.exe family_redline behavioral1/memory/5308-2162-0x0000000000D40000-0x0000000000D6E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7580.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu7580.exe -
Executes dropped EXE 5 IoCs
Processes:
un974058.exepro2235.exequ7580.exe1.exesi434162.exepid process 3516 un974058.exe 60 pro2235.exe 2444 qu7580.exe 1092 1.exe 5308 si434162.exe -
Processes:
pro2235.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2235.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2235.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exeun974058.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un974058.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3180 60 WerFault.exe pro2235.exe 5216 2444 WerFault.exe qu7580.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exesi434162.exe70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exeun974058.exepro2235.exequ7580.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si434162.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un974058.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2235.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7580.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro2235.exepid process 60 pro2235.exe 60 pro2235.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro2235.exequ7580.exedescription pid process Token: SeDebugPrivilege 60 pro2235.exe Token: SeDebugPrivilege 2444 qu7580.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exeun974058.exequ7580.exedescription pid process target process PID 636 wrote to memory of 3516 636 70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe un974058.exe PID 636 wrote to memory of 3516 636 70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe un974058.exe PID 636 wrote to memory of 3516 636 70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe un974058.exe PID 3516 wrote to memory of 60 3516 un974058.exe pro2235.exe PID 3516 wrote to memory of 60 3516 un974058.exe pro2235.exe PID 3516 wrote to memory of 60 3516 un974058.exe pro2235.exe PID 3516 wrote to memory of 2444 3516 un974058.exe qu7580.exe PID 3516 wrote to memory of 2444 3516 un974058.exe qu7580.exe PID 3516 wrote to memory of 2444 3516 un974058.exe qu7580.exe PID 2444 wrote to memory of 1092 2444 qu7580.exe 1.exe PID 2444 wrote to memory of 1092 2444 qu7580.exe 1.exe PID 2444 wrote to memory of 1092 2444 qu7580.exe 1.exe PID 636 wrote to memory of 5308 636 70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe si434162.exe PID 636 wrote to memory of 5308 636 70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe si434162.exe PID 636 wrote to memory of 5308 636 70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe si434162.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe"C:\Users\Admin\AppData\Local\Temp\70cf86dd63c198e10296fddbd85db76c142e788dda1ae3031af6a3397efb3068.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un974058.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un974058.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2235.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2235.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:60 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 60 -s 10644⤵
- Program crash
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7580.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7580.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 13844⤵
- Program crash
PID:5216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si434162.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si434162.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 60 -ip 601⤵PID:2840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2444 -ip 24441⤵PID:5144
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD52e778162d90b5e445cf1778aea2962f5
SHA1871c6a8ecff02687f78b039ac554b7633f1f2b9f
SHA256202fcc00a6f0b3c2254cdac93ba7cfd4c79149a371a7c91564c5664bc6653ec3
SHA5128132581718c75291bbc23079440ea165af7c11f0a92a60368a98232a912ccbd60d3a07dc29fe112cefb74146bb4da562a352b23806fc2fec584193ad2cf4ec92
-
Filesize
641KB
MD5758ae258207a9f611ced4fdb6a324ea6
SHA1a9e262bb2d92ca540be672e6e2ccf62300b3c5bf
SHA256bc67994560b1e06479dc37cad26263af940f871425954867b0c72c335d39ef16
SHA512f9a931461f84339f86b985af550da65408017ebde45505cfde7198ede733b004a5ab0fad97de24dbc1b4e27ada9d552bcb2163c89cc577801b413fa3f7791d90
-
Filesize
241KB
MD56941c1b859f7aa4e1a316a698598a864
SHA1eb6fb359ae5b2e2ed6a1b5ac638cbb4afac220c2
SHA2565d73d7856b63b3538076af523725e311ffc11d03ec4574902f3fed9168b1ae95
SHA512c077857d4d13eaf08c216e3f0243b2b77723725cf5e7a95909b79ce477f44aec7eedd7786d548574839e27b9995b036b2e74d2a8b51327d2f17990a08cece4e8
-
Filesize
424KB
MD54229882a925b920eaabe010a5a7c0729
SHA15bbddc31211d591d81ece2ecf46d49a92e9be88a
SHA256260f352f39000f3b5ca255d88c4f0d61cad4955ef4ffd81b5db7b4f5f5226638
SHA51212a8928f64827ae1d134c1c7c5f73fac9bbaf07c4233838bec5be94005198a73b2a6c723002f0ef6d52ecae63f9a02a3b2dcf29a9079cd2d5a297343c6c2d066
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0