Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:35
Static task
static1
Behavioral task
behavioral1
Sample
c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exe
Resource
win10v2004-20241007-en
General
-
Target
c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exe
-
Size
787KB
-
MD5
8af6c61301917d01df29187866df7360
-
SHA1
78dc44a5de1ebc7d81cc1af62f7f1d5749765e34
-
SHA256
c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455
-
SHA512
ce041281d82f3fb1b1185b8775c6bce83859c70ed9a657fe2b84f8c6823030d1b1bac8d9890adcd680d43127851a16f7f4b042690b835c6d5c302554cb32d7d6
-
SSDEEP
12288:fMrMy90uilKJFsfNHMlki2ib+4JqF1Uspj36pgGVq1z8vAAnKwYQ:HyEQJFOB+rvJSPGciAAnKa
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/388-19-0x0000000002070000-0x000000000208A000-memory.dmp healer behavioral1/memory/388-21-0x0000000002230000-0x0000000002248000-memory.dmp healer behavioral1/memory/388-23-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-41-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-49-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-47-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-45-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-44-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-39-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-37-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-35-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-33-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-31-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-29-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-27-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-25-0x0000000002230000-0x0000000002242000-memory.dmp healer behavioral1/memory/388-22-0x0000000002230000-0x0000000002242000-memory.dmp healer -
Healer family
-
Processes:
pro4013.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4013.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1672-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4520-2156-0x0000000000220000-0x0000000000250000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si827277.exe family_redline behavioral1/memory/5720-2167-0x0000000000230000-0x000000000025E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu2186.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation qu2186.exe -
Executes dropped EXE 5 IoCs
Processes:
un506947.exepro4013.exequ2186.exe1.exesi827277.exepid process 2088 un506947.exe 388 pro4013.exe 1672 qu2186.exe 4520 1.exe 5720 si827277.exe -
Processes:
pro4013.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4013.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4013.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exeun506947.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un506947.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1832 388 WerFault.exe pro4013.exe 5608 1672 WerFault.exe qu2186.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu2186.exe1.exesi827277.exec86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exeun506947.exepro4013.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2186.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si827277.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un506947.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4013.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4013.exepid process 388 pro4013.exe 388 pro4013.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4013.exequ2186.exedescription pid process Token: SeDebugPrivilege 388 pro4013.exe Token: SeDebugPrivilege 1672 qu2186.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exeun506947.exequ2186.exedescription pid process target process PID 224 wrote to memory of 2088 224 c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exe un506947.exe PID 224 wrote to memory of 2088 224 c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exe un506947.exe PID 224 wrote to memory of 2088 224 c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exe un506947.exe PID 2088 wrote to memory of 388 2088 un506947.exe pro4013.exe PID 2088 wrote to memory of 388 2088 un506947.exe pro4013.exe PID 2088 wrote to memory of 388 2088 un506947.exe pro4013.exe PID 2088 wrote to memory of 1672 2088 un506947.exe qu2186.exe PID 2088 wrote to memory of 1672 2088 un506947.exe qu2186.exe PID 2088 wrote to memory of 1672 2088 un506947.exe qu2186.exe PID 1672 wrote to memory of 4520 1672 qu2186.exe 1.exe PID 1672 wrote to memory of 4520 1672 qu2186.exe 1.exe PID 1672 wrote to memory of 4520 1672 qu2186.exe 1.exe PID 224 wrote to memory of 5720 224 c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exe si827277.exe PID 224 wrote to memory of 5720 224 c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exe si827277.exe PID 224 wrote to memory of 5720 224 c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exe si827277.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exe"C:\Users\Admin\AppData\Local\Temp\c86f9f3f604ec5671f16ae2b6a09f4b6b2f7c31f2e846eff3c00c3a65b120455.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un506947.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un506947.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4013.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4013.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 388 -s 10844⤵
- Program crash
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2186.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2186.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1672 -s 13804⤵
- Program crash
PID:5608 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si827277.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si827277.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5720
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 388 -ip 3881⤵PID:1096
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1672 -ip 16721⤵PID:5528
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD55863cd81335ab483b4cf0ac7ac55013a
SHA10aae6e5c5ce55703e04e178eee0af3f4372c5d54
SHA25655e806de4dffbf68fbdcea9ea7dc67b052b26284703968ae1f37a51579aacb07
SHA51253ec043badd8943c35c114b5c49a8e20541ac1b385b1529c63adebe7aab39b2e942f7ac321de39e24f990e371f3e82bbad861302d8eb61ba9443431438f34f44
-
Filesize
634KB
MD570bcf45c340cf62e865dc8d80e88759b
SHA1cfb33a5960d54ec4b6c52fd06fb3c8c9f3f957e7
SHA25677472d7439beb30e0b522e0c83ec4c3e9a3824daf326018c1cd8fc13bafc2fdb
SHA5123cf96b3416440dca6ae1e9f273d6fda3f04482cfd5ff0eb9357e2ff5cb1fd997130385cedeaaf3a82f29534e627977cccfdc6967337af41ac188cbca62ff6e2c
-
Filesize
231KB
MD5564fcdf316c92d388891819d3dcb47db
SHA1d6386c38989d7c65625d6cf92550ec433479bbfa
SHA256391f9a17296a97abc5a41ded43fbf45038421cb3c3a57abf59c260ff406ac623
SHA512037ec630cdd1ccb8606061ef16a4634b243551a220ed3d4e0637f8a3d01baf77b7eef12876c145a14243e5ea7302367e9752326c83ecdbb20266fee13124461e
-
Filesize
415KB
MD5e3020f653c4057cb2ae7860fc68746e3
SHA17de4a1937b53f97b1e02d6050851d3e8028b2e7f
SHA2566337e4ce46d71b7ff7723a4cb148be202247c5002d68b605386fd1776cc9644e
SHA512339de6e1e3bf643d0d62a291289fe1f4d20483a99054721b0e8cc4d27c461371eec6040dbaaeda9c8650c8be7af537f3ebfb08bc9ffc4024b691b1863bbd80c8
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0