Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 10:29
Static task
static1
Behavioral task
behavioral1
Sample
798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exe
Resource
win10v2004-20241007-en
General
-
Target
798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exe
-
Size
815KB
-
MD5
f6492c2a7f85143a8568637d711f7cd5
-
SHA1
9afbee307c7fe4fe6d0aa6ae9075d0ca208eb7a2
-
SHA256
798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af
-
SHA512
a4854989af0b49f194535ab0d79eda63cf62b3a3f631b1ff55a55b27d696a447b67cab0e7cd61ff9bbf118e112f2e8526dd9957ce81ee75049b8711d3c507d95
-
SSDEEP
24576:lyCzRDBomLTGiYaAJ3MJDHl+v9ri1Xy00:A8DameJWYri1
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3104-19-0x0000000002640000-0x000000000265A000-memory.dmp healer behavioral1/memory/3104-21-0x0000000005360000-0x0000000005378000-memory.dmp healer behavioral1/memory/3104-33-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-38-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-49-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-47-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-45-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-43-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-41-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-39-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-35-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-22-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-31-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-29-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-27-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-25-0x0000000005360000-0x0000000005372000-memory.dmp healer behavioral1/memory/3104-23-0x0000000005360000-0x0000000005372000-memory.dmp healer -
Healer family
-
Processes:
pro7983.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7983.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7983.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1048-2142-0x0000000002C90000-0x0000000002CC2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4344-2155-0x0000000000C70000-0x0000000000CA0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si622353.exe family_redline behavioral1/memory/3804-2166-0x0000000000C40000-0x0000000000C6E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu1174.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation qu1174.exe -
Executes dropped EXE 5 IoCs
Processes:
un147641.exepro7983.exequ1174.exe1.exesi622353.exepid process 3360 un147641.exe 3104 pro7983.exe 1048 qu1174.exe 4344 1.exe 3804 si622353.exe -
Processes:
pro7983.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7983.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7983.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exeun147641.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un147641.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1252 3104 WerFault.exe pro7983.exe 452 1048 WerFault.exe qu1174.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
si622353.exe798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exeun147641.exepro7983.exequ1174.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si622353.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un147641.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7983.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1174.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7983.exepid process 3104 pro7983.exe 3104 pro7983.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7983.exequ1174.exedescription pid process Token: SeDebugPrivilege 3104 pro7983.exe Token: SeDebugPrivilege 1048 qu1174.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exeun147641.exequ1174.exedescription pid process target process PID 4508 wrote to memory of 3360 4508 798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exe un147641.exe PID 4508 wrote to memory of 3360 4508 798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exe un147641.exe PID 4508 wrote to memory of 3360 4508 798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exe un147641.exe PID 3360 wrote to memory of 3104 3360 un147641.exe pro7983.exe PID 3360 wrote to memory of 3104 3360 un147641.exe pro7983.exe PID 3360 wrote to memory of 3104 3360 un147641.exe pro7983.exe PID 3360 wrote to memory of 1048 3360 un147641.exe qu1174.exe PID 3360 wrote to memory of 1048 3360 un147641.exe qu1174.exe PID 3360 wrote to memory of 1048 3360 un147641.exe qu1174.exe PID 1048 wrote to memory of 4344 1048 qu1174.exe 1.exe PID 1048 wrote to memory of 4344 1048 qu1174.exe 1.exe PID 1048 wrote to memory of 4344 1048 qu1174.exe 1.exe PID 4508 wrote to memory of 3804 4508 798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exe si622353.exe PID 4508 wrote to memory of 3804 4508 798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exe si622353.exe PID 4508 wrote to memory of 3804 4508 798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exe si622353.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exe"C:\Users\Admin\AppData\Local\Temp\798b75160c090b9edc525b612a0eb4c8c25bdb6e327a490cc58e3a9238f7c9af.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un147641.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un147641.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7983.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7983.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 10884⤵
- Program crash
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1174.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1174.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 11564⤵
- Program crash
PID:452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si622353.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si622353.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3104 -ip 31041⤵PID:1072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1048 -ip 10481⤵PID:1232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5e243bf1aa615ab33031457819c351119
SHA1844a70d3d036114e67ce9f90ee2bb123e6d4e4dc
SHA256ca1c56c2963217031a6b8a8a24d1b4cab60145174a4d534d5c4ae33cbae1d99c
SHA512a53bf414356198e8e528723c413a5c8d2ffdf524cf14db7ef80036f967eaffb5c5ad29abccf7b64f59f7eb333aab18666c8c6b9d993ca6dda16166d2edcd34c6
-
Filesize
661KB
MD5c99ce996bd13ee1e8efb5c5831fa0613
SHA1679f9deac4e275e8e0eafafa23c0332e9e2ab622
SHA25692727d59b14e10068f8db3a98d227889eb70a59f95e7f9747603f0910bf3d5d1
SHA512795bffe2c30049cdb0f6a6b4b0f4eefabb1abebca36ddbc23c8d1d0a2ea62f3a593599caa362d09bd32ad9a522a49c0e2a266e526f85534ec6c6dc7bb7f2af3b
-
Filesize
312KB
MD5d61230e6ba48fdb1eae8c7837daed82b
SHA1ad7668dcf45acef1410227333b34078191ceb810
SHA2562b94fac5c82302e4d04ea29b9fdd18d016288a54eca73ab3dac698578963df88
SHA512a692cffe9dae20c4e2f375e56d85a73af8cc37f1c18c3368804ad40ec02d9fbd97f2d3ddb5dd845b5487a98a75eb6fc0166554ef9919ad724e163e748fec2ede
-
Filesize
495KB
MD5e52ff2167452ec7c95d19a1346232375
SHA18fd7b2ca9bf24bcd8e320361e42c15a3931b1ab5
SHA25680a809dc9026d48e7bebd752a324b839f0d0a71109eceb51c340384e87d3e14a
SHA5120237c27ece6904bc9a6cca8fed0f512c85aaa01a0c1ac4e1df88729227e66d46dd69d40fde6e75f4744b2be13932fec92f78f83152f390b96457e0df907f2d36
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0