Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 11:22
Static task
static1
Behavioral task
behavioral1
Sample
13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exe
Resource
win10v2004-20241007-en
General
-
Target
13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exe
-
Size
800KB
-
MD5
3452ccefe939b662a8c7bb39af8fd864
-
SHA1
7d4a99051b875df8b8b49194804fe60b52dc2c00
-
SHA256
13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc
-
SHA512
eaa191bc21ad415c5316cce30b613331a25fb399966e19b60d84e613a5c72bdb68f046337e9501089707b6927f865ac395289679b9205527c0f25d1007cea886
-
SSDEEP
24576:SyNk1i30Kdp1j1smrBijBGmf2depxShX6m:5SOzdp1BjUjBrJxs
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4828-19-0x0000000002400000-0x000000000241A000-memory.dmp healer behavioral1/memory/4828-21-0x00000000025F0000-0x0000000002608000-memory.dmp healer behavioral1/memory/4828-49-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-47-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-45-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-43-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-41-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-39-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-37-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-35-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-33-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-31-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-29-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-27-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-25-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-23-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/4828-22-0x00000000025F0000-0x0000000002602000-memory.dmp healer -
Healer family
-
Processes:
pro1522.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1522.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1522.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1522.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1522.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1522.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1522.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3260-2142-0x0000000002690000-0x00000000026C2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5480-2155-0x0000000000010000-0x0000000000040000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si525975.exe family_redline behavioral1/memory/5696-2166-0x0000000000500000-0x000000000052E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu0396.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation qu0396.exe -
Executes dropped EXE 5 IoCs
Processes:
un327318.exepro1522.exequ0396.exe1.exesi525975.exepid process 3428 un327318.exe 4828 pro1522.exe 3260 qu0396.exe 5480 1.exe 5696 si525975.exe -
Processes:
pro1522.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1522.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1522.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exeun327318.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un327318.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4960 4828 WerFault.exe pro1522.exe 5596 3260 WerFault.exe qu0396.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exesi525975.exe13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exeun327318.exepro1522.exequ0396.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si525975.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un327318.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1522.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0396.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1522.exepid process 4828 pro1522.exe 4828 pro1522.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1522.exequ0396.exedescription pid process Token: SeDebugPrivilege 4828 pro1522.exe Token: SeDebugPrivilege 3260 qu0396.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exeun327318.exequ0396.exedescription pid process target process PID 3844 wrote to memory of 3428 3844 13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exe un327318.exe PID 3844 wrote to memory of 3428 3844 13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exe un327318.exe PID 3844 wrote to memory of 3428 3844 13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exe un327318.exe PID 3428 wrote to memory of 4828 3428 un327318.exe pro1522.exe PID 3428 wrote to memory of 4828 3428 un327318.exe pro1522.exe PID 3428 wrote to memory of 4828 3428 un327318.exe pro1522.exe PID 3428 wrote to memory of 3260 3428 un327318.exe qu0396.exe PID 3428 wrote to memory of 3260 3428 un327318.exe qu0396.exe PID 3428 wrote to memory of 3260 3428 un327318.exe qu0396.exe PID 3260 wrote to memory of 5480 3260 qu0396.exe 1.exe PID 3260 wrote to memory of 5480 3260 qu0396.exe 1.exe PID 3260 wrote to memory of 5480 3260 qu0396.exe 1.exe PID 3844 wrote to memory of 5696 3844 13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exe si525975.exe PID 3844 wrote to memory of 5696 3844 13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exe si525975.exe PID 3844 wrote to memory of 5696 3844 13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exe si525975.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exe"C:\Users\Admin\AppData\Local\Temp\13e260006ebfaa744e8f6a3dc28a0f7bb17f842541fae948cabda9635a5801cc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un327318.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un327318.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1522.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1522.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4828 -s 10844⤵
- Program crash
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0396.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0396.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5480 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3260 -s 13844⤵
- Program crash
PID:5596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si525975.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si525975.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4828 -ip 48281⤵PID:2280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3260 -ip 32601⤵PID:5532
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD526d2812abc15931918d8af4942badfb5
SHA16a166fe4eae4b511b3aa6efd47136f6dfd464da7
SHA2567ffba339b4f8356bffd04518a3ef343d595c4d0533a21b69d11aef945c806550
SHA512dbdea748e3e29d6cd0a6840e1c09a0edeb0f0d26637fb4e99a31363af31e63d34f9b469fe3b8b7fc9c911ceca646834cf320f32119d08f1bb5382a7a1d2c555d
-
Filesize
647KB
MD5b712e99898c18602c33e11df8e4b467b
SHA1912bd8ae88000ebd788af12083513d217782bea1
SHA256dc113225085edc6f724a0877411c2d0455fc335f5b3446e2089dcd334c6dd18f
SHA5123023a618f5f02fff5cc968c8816f1c38add3ba9c1d408eac3af1cb0d879606063e707062c276f4d98cd94cc7614dbc8736fa1f5c0cddf7f07550fb66c15d214d
-
Filesize
252KB
MD5c61fd2ce8e8a500d2cab76a378bdf937
SHA1efd0cffcd4e3bd697ad6be7f8677f6648c3a9e86
SHA256a0a95304c31e01f96156847ccec5c234f85e327dabb127aef1deb2a91357490b
SHA51271bbbc7ac4dd4ccb560f9a6872e1291a0a467b7f86400f91f28508b3b7461749267160ee77ba07f6657932f810c77c35ba47ff38b58f7bbef34a3a5f9435d0da
-
Filesize
435KB
MD5216ac54cb72b76c00c6c47e06e36e738
SHA134d3b1b358ba6e258f043c1a12a5a0756f4a179d
SHA2560ec9e544a2670b1232152731b65899e5f36285d6e3309e959ed6481816d5746a
SHA5123ef8e6cf545daa23c5e9e78f7bcb0c331681e55b0f6fe56904296e12a6dc595dc584a538dbb8ab8f7513bac15724986e3c9359e76d602ef8a8b980774661c7ed
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0