Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:34
Static task
static1
Behavioral task
behavioral1
Sample
80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exe
Resource
win10v2004-20241007-en
General
-
Target
80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exe
-
Size
789KB
-
MD5
ce31e62dc3ebafec491b9b569bb2a1ad
-
SHA1
a6404213cc9a6e012739ad185f3d9f76da0efdd5
-
SHA256
80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2
-
SHA512
f2b62e0e209f66136d95693e95d874c8155f8667f7c060032d429ff7121a10d35e705f7b1a581e5a951741ba908d11b27930ec9a20f5280816176adc24cf6a84
-
SSDEEP
12288:gMrIy90EyIr95Hmcf0osL0Fi3WdJ0SAXVOT2AAriePAfPs3rr7JO1eo8iBN:YyCyjiC2OTzP637JO1zfN
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2448-19-0x00000000024E0000-0x00000000024FA000-memory.dmp healer behavioral1/memory/2448-21-0x0000000002590000-0x00000000025A8000-memory.dmp healer behavioral1/memory/2448-27-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-49-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-47-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-45-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-43-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-41-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-39-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-37-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-35-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-32-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-29-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-25-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-23-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-22-0x0000000002590000-0x00000000025A2000-memory.dmp healer behavioral1/memory/2448-33-0x0000000002590000-0x00000000025A2000-memory.dmp healer -
Healer family
-
Processes:
pro3168.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3168.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3168.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3972-2142-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4884-2155-0x0000000000FA0000-0x0000000000FD0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si170723.exe family_redline behavioral1/memory/628-2166-0x00000000008E0000-0x000000000090E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu3323.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation qu3323.exe -
Executes dropped EXE 5 IoCs
Processes:
un178345.exepro3168.exequ3323.exe1.exesi170723.exepid process 4464 un178345.exe 2448 pro3168.exe 3972 qu3323.exe 4884 1.exe 628 si170723.exe -
Processes:
pro3168.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3168.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3168.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exeun178345.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un178345.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1404 2448 WerFault.exe pro3168.exe 3316 3972 WerFault.exe qu3323.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exeun178345.exepro3168.exequ3323.exe1.exesi170723.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un178345.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3168.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3323.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si170723.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro3168.exepid process 2448 pro3168.exe 2448 pro3168.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro3168.exequ3323.exedescription pid process Token: SeDebugPrivilege 2448 pro3168.exe Token: SeDebugPrivilege 3972 qu3323.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exeun178345.exequ3323.exedescription pid process target process PID 4592 wrote to memory of 4464 4592 80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exe un178345.exe PID 4592 wrote to memory of 4464 4592 80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exe un178345.exe PID 4592 wrote to memory of 4464 4592 80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exe un178345.exe PID 4464 wrote to memory of 2448 4464 un178345.exe pro3168.exe PID 4464 wrote to memory of 2448 4464 un178345.exe pro3168.exe PID 4464 wrote to memory of 2448 4464 un178345.exe pro3168.exe PID 4464 wrote to memory of 3972 4464 un178345.exe qu3323.exe PID 4464 wrote to memory of 3972 4464 un178345.exe qu3323.exe PID 4464 wrote to memory of 3972 4464 un178345.exe qu3323.exe PID 3972 wrote to memory of 4884 3972 qu3323.exe 1.exe PID 3972 wrote to memory of 4884 3972 qu3323.exe 1.exe PID 3972 wrote to memory of 4884 3972 qu3323.exe 1.exe PID 4592 wrote to memory of 628 4592 80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exe si170723.exe PID 4592 wrote to memory of 628 4592 80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exe si170723.exe PID 4592 wrote to memory of 628 4592 80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exe si170723.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exe"C:\Users\Admin\AppData\Local\Temp\80007806f7229a6c7a8fcf01e5f416bd7d938c6293b35942d82da917cf2565a2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178345.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178345.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3168.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3168.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2448 -s 10804⤵
- Program crash
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3323.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3323.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 15364⤵
- Program crash
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si170723.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si170723.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2448 -ip 24481⤵PID:1976
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3972 -ip 39721⤵PID:1384
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD52b5cc1a19760e716c184980f1fe25728
SHA183f9d064550f71feaa0c5cfe51b6669796eafead
SHA25688dd48cc9049113a32368440400bc32042579401fb329879b312e578162d5f04
SHA5128b2a815e1a1e25f95b8f48d631906e81071cb2881edc087a4bc12565cca8e1e87c985a9d029bb43b6037e1d91f902cfbc9d9bca99922cd775ef59eff361df3c7
-
Filesize
635KB
MD56064b4568f69ab9c4f4e02ffd0eba468
SHA1ccfd83d61367a0d3df9f78f966372a6193deee80
SHA2568bab8f4aedc5c67e4b398a2429ddacb7b90283c369ddf1e81b669444f63fa44e
SHA5121795b47c00b81203483055359252e62412800498c296dd7e4e5ffa13232cd4b29e009e6b9c7b1d0dedab54764f18710519be05d847d4a4c3f05835691d846209
-
Filesize
233KB
MD5550d6483ceca7480c96f191b843a6aa7
SHA1ae1619e5d2517e778a49d9b9a6d4a06895b827ed
SHA25600a711c0d9fa637328e491f4909f892906938fce56b0b003bb2703f1995b9fd2
SHA512c1fae2dd2a71c04e0af03646eeeaf0d7056de7b4357578cb6082edd49b3a41852483816411b850f1bad1726a10ca10bc690653c8df0b53b73d3a51aba15fe717
-
Filesize
417KB
MD5a411992de879c0b8a251f2c3e490d8d8
SHA1636178b8b94036c5db720f9839e99f58c74ba784
SHA256e1cffa9b455d1e82962abc93ee927420ecfbd96cbc999120bdcb0db8338091b5
SHA512b34c179a00dd9769db20bcc099b6c181a99ee050f6c06e25a4e1652c8e130c3bf0bdbfb4c41a52cfd28208c2dadf47334de88093ff1ef18a5fa01a0488fcb5d1
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0