Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 13:31
Static task
static1
Behavioral task
behavioral1
Sample
684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exe
Resource
win10v2004-20241007-en
General
-
Target
684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exe
-
Size
852KB
-
MD5
2b9a4061be08d9ed11bb133c1001d238
-
SHA1
5523a3dc826fd709cb74ddc2064723c82f392da5
-
SHA256
684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259
-
SHA512
745096b2a5b87026d56dfa182664af1e94b1924c2ecc31b13931ac309598769d58fb0e23e01e3bea22b91bc8aedbd2863a64da70df1b44c5724df826be954e44
-
SSDEEP
24576:ByqrzyTz9By9UaD4AlWvQktMIQOGrSJx4GlPF6a:0qrzyTzjytevztfvG6x4j
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4488-19-0x0000000002760000-0x000000000277A000-memory.dmp healer behavioral1/memory/4488-21-0x0000000002960000-0x0000000002978000-memory.dmp healer behavioral1/memory/4488-27-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-49-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-47-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-45-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-43-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-41-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-39-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-37-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-35-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-33-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-31-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-29-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-25-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-23-0x0000000002960000-0x0000000002972000-memory.dmp healer behavioral1/memory/4488-22-0x0000000002960000-0x0000000002972000-memory.dmp healer -
Healer family
-
Processes:
pr992912.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr992912.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr992912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr992912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr992912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr992912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr992912.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2412-2205-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5264-2218-0x0000000000330000-0x000000000035E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si671424.exe family_redline behavioral1/memory/2716-2229-0x0000000000340000-0x0000000000370000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu796803.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation qu796803.exe -
Executes dropped EXE 5 IoCs
Processes:
un962316.exepr992912.exequ796803.exe1.exesi671424.exepid process 4632 un962316.exe 4488 pr992912.exe 2412 qu796803.exe 5264 1.exe 2716 si671424.exe -
Processes:
pr992912.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr992912.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr992912.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un962316.exe684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un962316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3384 4488 WerFault.exe pr992912.exe 796 2412 WerFault.exe qu796803.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un962316.exepr992912.exequ796803.exe1.exesi671424.exe684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un962316.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr992912.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu796803.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si671424.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr992912.exepid process 4488 pr992912.exe 4488 pr992912.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr992912.exequ796803.exedescription pid process Token: SeDebugPrivilege 4488 pr992912.exe Token: SeDebugPrivilege 2412 qu796803.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exeun962316.exequ796803.exedescription pid process target process PID 3904 wrote to memory of 4632 3904 684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exe un962316.exe PID 3904 wrote to memory of 4632 3904 684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exe un962316.exe PID 3904 wrote to memory of 4632 3904 684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exe un962316.exe PID 4632 wrote to memory of 4488 4632 un962316.exe pr992912.exe PID 4632 wrote to memory of 4488 4632 un962316.exe pr992912.exe PID 4632 wrote to memory of 4488 4632 un962316.exe pr992912.exe PID 4632 wrote to memory of 2412 4632 un962316.exe qu796803.exe PID 4632 wrote to memory of 2412 4632 un962316.exe qu796803.exe PID 4632 wrote to memory of 2412 4632 un962316.exe qu796803.exe PID 2412 wrote to memory of 5264 2412 qu796803.exe 1.exe PID 2412 wrote to memory of 5264 2412 qu796803.exe 1.exe PID 2412 wrote to memory of 5264 2412 qu796803.exe 1.exe PID 3904 wrote to memory of 2716 3904 684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exe si671424.exe PID 3904 wrote to memory of 2716 3904 684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exe si671424.exe PID 3904 wrote to memory of 2716 3904 684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exe si671424.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exe"C:\Users\Admin\AppData\Local\Temp\684bc1b262a497ed46f48d206005da97e82bc50d50e236feab0396746218f259.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un962316.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un962316.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr992912.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr992912.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 10924⤵
- Program crash
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu796803.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu796803.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2412 -s 13324⤵
- Program crash
PID:796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si671424.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si671424.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4488 -ip 44881⤵PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2412 -ip 24121⤵PID:3604
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
698KB
MD5906faf847bacfbae52ac84bfa94ff72d
SHA1f4d1281086881d6d3aa13e9dc72f78d23837a35a
SHA256e7e083acf9f26bea42015f06d7814b81c46a8c0c4360db12ff07ac9d496f104e
SHA512f520109cb9c807b9ab797a75f0b584c622a6f860ffc9d01d15ec4c1742e389ade8c47046fa054ca11cbe52be0913eb0eba23517b9a08c529e633260a8fa5b253
-
Filesize
403KB
MD5f29a783444a7ac89f233178741e41ca9
SHA1ef0fdbb1ea15a92ae1bcaeee472b36948cd3e63a
SHA256e84690dd23089103aa3583a10d0910d42f9e1ac69cd3b162f2312a70d50dc790
SHA51255d92c369c052e5c09e0214868f6b2612c6d19ea67656957e3af9a728943f0b047a6cf303f1ea8c7ca9b99d5dc53f36c7ab82ea900a8b6f6f0b3c98df19acfc9
-
Filesize
586KB
MD59d2239b8f1e2b764eadde19d20c89827
SHA193565ca4acaeb9b09d9d35387b60ce6a5f8fbed8
SHA256b0602ef359a9b98d4f908c109ca7135a0cccd5cf05084615466151bb83093a26
SHA5124cd92a69638f8ad0c5206e95ee16b2db3ad9527de5abb9af2bededcc72bae56fa5386909fbdb6d93d920f70788819f6c2b01e92ecf3b061340efe6d54eecb625
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1