Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:40
Static task
static1
Behavioral task
behavioral1
Sample
a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exe
Resource
win10v2004-20241007-en
General
-
Target
a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exe
-
Size
789KB
-
MD5
d71c4bba837a2db79f0f59563bd39307
-
SHA1
49ec056d036b1df8f18010f1168c23e46d9fa1c5
-
SHA256
a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f
-
SHA512
def3d79a13ca12dffbb5f0b1f5b3da9d8b9754e31bf2b1874a79809440fdbed9f94096afa05d4de37f85f041fbc6556c69cb0d068b86bcce7254b20d1f8a60d8
-
SSDEEP
12288:BMrwy90jKgx9pZOAoJPISsL9Vtd/L5vc0TjA9jiegDePs6Tt/6gTAR4SLYk:BycKSgAaIDvD9cOYP7t6HRpx
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/536-19-0x0000000002660000-0x000000000267A000-memory.dmp healer behavioral1/memory/536-21-0x00000000026F0000-0x0000000002708000-memory.dmp healer behavioral1/memory/536-49-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-48-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-45-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-44-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-41-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-39-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-37-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-35-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-33-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-31-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-29-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-27-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-25-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-23-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/536-22-0x00000000026F0000-0x0000000002702000-memory.dmp healer -
Healer family
-
Processes:
pro9143.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9143.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9143.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4012-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4988-2156-0x00000000004A0000-0x00000000004D0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si486969.exe family_redline behavioral1/memory/5228-2166-0x0000000000850000-0x000000000087E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu8866.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu8866.exe -
Executes dropped EXE 5 IoCs
Processes:
un396732.exepro9143.exequ8866.exe1.exesi486969.exepid process 3432 un396732.exe 536 pro9143.exe 4012 qu8866.exe 4988 1.exe 5228 si486969.exe -
Processes:
pro9143.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9143.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9143.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exeun396732.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un396732.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1916 536 WerFault.exe pro9143.exe 5180 4012 WerFault.exe qu8866.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro9143.exequ8866.exe1.exesi486969.exea2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exeun396732.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9143.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si486969.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un396732.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9143.exepid process 536 pro9143.exe 536 pro9143.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9143.exequ8866.exedescription pid process Token: SeDebugPrivilege 536 pro9143.exe Token: SeDebugPrivilege 4012 qu8866.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exeun396732.exequ8866.exedescription pid process target process PID 1936 wrote to memory of 3432 1936 a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exe un396732.exe PID 1936 wrote to memory of 3432 1936 a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exe un396732.exe PID 1936 wrote to memory of 3432 1936 a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exe un396732.exe PID 3432 wrote to memory of 536 3432 un396732.exe pro9143.exe PID 3432 wrote to memory of 536 3432 un396732.exe pro9143.exe PID 3432 wrote to memory of 536 3432 un396732.exe pro9143.exe PID 3432 wrote to memory of 4012 3432 un396732.exe qu8866.exe PID 3432 wrote to memory of 4012 3432 un396732.exe qu8866.exe PID 3432 wrote to memory of 4012 3432 un396732.exe qu8866.exe PID 4012 wrote to memory of 4988 4012 qu8866.exe 1.exe PID 4012 wrote to memory of 4988 4012 qu8866.exe 1.exe PID 4012 wrote to memory of 4988 4012 qu8866.exe 1.exe PID 1936 wrote to memory of 5228 1936 a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exe si486969.exe PID 1936 wrote to memory of 5228 1936 a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exe si486969.exe PID 1936 wrote to memory of 5228 1936 a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exe si486969.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exe"C:\Users\Admin\AppData\Local\Temp\a2d6e1c7672842f06cb4511e6edf93bd7f2002ea96ed6d6aa2a026c17e98303f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396732.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396732.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9143.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9143.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 10844⤵
- Program crash
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8866.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8866.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4988 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 13844⤵
- Program crash
PID:5180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si486969.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si486969.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 536 -ip 5361⤵PID:880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4012 -ip 40121⤵PID:2988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5505443e867ec6ee399f2436e142f1c15
SHA15128baa1bf94389b425470440ebef76c502538dd
SHA2567a6ee6fe81d8b62b376ae434a73f14b9f2cf3e17ecb997834c93200b2048d9ff
SHA512fb14fe44b07c5b185b8fd8e123ecb3c4bf8c1eeb7d6d0ca98ce650ae8452f00909dce624553c0715b4b940984753f56e7653fc14c0975300528c051f2d0ced98
-
Filesize
635KB
MD58db632b8f1b76010f0f9b3dcbdd73be7
SHA1aa07cfb0907587c38c210ed5cc67043ee7871f33
SHA2567b1fe93e226f74e617bd4b7a2cc38d577cacc1858ce92a73b28128ca4ffa0732
SHA512540e165fb3157b27b85497290894f22132f017cf5e922c45a5922a0bdb2e09f914d924624d5bb0e16e3d50b08d1d0702cfc4d15e4940a6df9400a3167d430183
-
Filesize
233KB
MD5bb310015401b6641ba386e742fd700e9
SHA101525c117d074e6f95bfde1bc3cbcd74a559ca25
SHA256856131f87cd3a58252a162ccab35fc887a7a33f2ad68c8c7c220273aa91c2b3d
SHA5126c72ea1e5f396ade1c597cc453aebff357a023650bfbeb1244f4c54b23402cafc3d21517e3ccd471e155e505423ec5489102f9be3371fda61679202b4ce1a4e6
-
Filesize
417KB
MD5bc21c2d5eaf987aa319a60aac3c11d92
SHA177459199d727c95793d493e8eeb1912e204bfe5c
SHA256ca3751a44116cb7792f158b1a61a447264d655af1b65a5fa2f2b5023d036f857
SHA5122a221a5432d36540694e9ed93f08356bb06cb514255a3fcf418f53770534fe79f536fdda10178307ce0d136871659a7953ba63048b7ce55593ffac9f19bf098d
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0