Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 09:34
Static task
static1
Behavioral task
behavioral1
Sample
de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exe
Resource
win10v2004-20241007-en
General
-
Target
de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exe
-
Size
801KB
-
MD5
9fa6105f33c2f881204294275c4b137d
-
SHA1
013e6bbd0e27bdb5c7b51d158ee573b40c18956e
-
SHA256
de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70
-
SHA512
7d15a2b6a860f2b8886020fafc1ba5c1f98723d684a88b9efd510e85ff9a0d40543cac13d23dd1c2d464b72d59e39099507af07962f76004dd5ebd811c50d025
-
SSDEEP
24576:gyepTOY/gfHZC/7AZnjBqif2/WwbSQ0nO5:nepTO4K87AxjBT8bu
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4924-19-0x0000000002470000-0x000000000248A000-memory.dmp healer behavioral1/memory/4924-21-0x00000000024E0000-0x00000000024F8000-memory.dmp healer behavioral1/memory/4924-49-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-47-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-46-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-43-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-42-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-39-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-37-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-35-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-33-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-31-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-29-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-27-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-25-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-23-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/4924-22-0x00000000024E0000-0x00000000024F2000-memory.dmp healer -
Healer family
-
Processes:
pro0220.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0220.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/928-2142-0x00000000053F0000-0x0000000005422000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4300-2155-0x0000000000B90000-0x0000000000BC0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si631484.exe family_redline behavioral1/memory/1004-2166-0x0000000000D90000-0x0000000000DBE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu1657.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation qu1657.exe -
Executes dropped EXE 5 IoCs
Processes:
un779785.exepro0220.exequ1657.exe1.exesi631484.exepid process 1332 un779785.exe 4924 pro0220.exe 928 qu1657.exe 4300 1.exe 1004 si631484.exe -
Processes:
pro0220.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0220.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exeun779785.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un779785.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5000 4924 WerFault.exe pro0220.exe 5232 928 WerFault.exe qu1657.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un779785.exepro0220.exequ1657.exe1.exesi631484.exede9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un779785.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1657.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si631484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0220.exepid process 4924 pro0220.exe 4924 pro0220.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0220.exequ1657.exedescription pid process Token: SeDebugPrivilege 4924 pro0220.exe Token: SeDebugPrivilege 928 qu1657.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exeun779785.exequ1657.exedescription pid process target process PID 4988 wrote to memory of 1332 4988 de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exe un779785.exe PID 4988 wrote to memory of 1332 4988 de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exe un779785.exe PID 4988 wrote to memory of 1332 4988 de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exe un779785.exe PID 1332 wrote to memory of 4924 1332 un779785.exe pro0220.exe PID 1332 wrote to memory of 4924 1332 un779785.exe pro0220.exe PID 1332 wrote to memory of 4924 1332 un779785.exe pro0220.exe PID 1332 wrote to memory of 928 1332 un779785.exe qu1657.exe PID 1332 wrote to memory of 928 1332 un779785.exe qu1657.exe PID 1332 wrote to memory of 928 1332 un779785.exe qu1657.exe PID 928 wrote to memory of 4300 928 qu1657.exe 1.exe PID 928 wrote to memory of 4300 928 qu1657.exe 1.exe PID 928 wrote to memory of 4300 928 qu1657.exe 1.exe PID 4988 wrote to memory of 1004 4988 de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exe si631484.exe PID 4988 wrote to memory of 1004 4988 de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exe si631484.exe PID 4988 wrote to memory of 1004 4988 de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exe si631484.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exe"C:\Users\Admin\AppData\Local\Temp\de9d96f251526fb5174b9c049277d9bbb2243658498d0b4bd7e0c27981381f70.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un779785.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un779785.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0220.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0220.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 10884⤵
- Program crash
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1657.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1657.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 13844⤵
- Program crash
PID:5232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si631484.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si631484.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4924 -ip 49241⤵PID:4404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 928 -ip 9281⤵PID:2104
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5582603ddeea80eef3bb36675aa467ca2
SHA1a85fd69ed74732281e8466c3862210fa5ef67466
SHA2562b43fb68f8908400dd6df726698ce3e0e84c7ba9a2e43f073115bb032009382c
SHA512cda3fac1dee204d4d236d26c810af64c457f03d0474ac242daf89b438b0fbb2fd0f32a1acb0f2edb2fcc8e6e9064225771c1a1218a1717153593192314dfb302
-
Filesize
648KB
MD557283c3e7f5992a837c952e38cbacf4f
SHA19924c6e8db55fc9c0c8f2545ce403d2792b93258
SHA25623c56e4f3f4f802a3030b35582f8881b441f0e2c94272d1980ab6274b54c49fe
SHA5126d00cdc844f2921429460937d40a9773e6d1293642606d5445d33d70837f59b3b545d7c2162a13d18d61fad61a66f62dc28726e3e89ea44e5331bc56e6a8c3b7
-
Filesize
252KB
MD51580ae40dca17d7b532c163b1b388f46
SHA14fa154cfc530240a876157a78be66266269c037f
SHA256408b9c531ad7ebf98873ccd92caf2ccfa291629e8ed75c2b00307e21b58c4f00
SHA512e2d6eff9bcf97bb63e49a8e80f3a5ff2138e76c49a63b7d45a321b047205b01d9f4b1910422c71f302dc4a065e5560376c52183a1ccfaada3609812917c979af
-
Filesize
435KB
MD5c99566045c1cb1b9e0fee1a41b6b2e34
SHA13f613ddf15261a8b3c8e6f107324839c7c8ed1ac
SHA256e79474bb050937235d8d3d55c83d41dc8c4c677a25f4b02a096e785cff199502
SHA512dd5c16bdd6e7bbcc59c11d1857dad9612c105c809a8e18c62201ea903eafc3106aa3fca2c9877cc4c2c926eeaf78209ff51dbc21e9ec4efdc518854ffefcb6bb
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0