Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exe
Resource
win10v2004-20241007-en
General
-
Target
7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exe
-
Size
787KB
-
MD5
4c7239497239cef9c03489a5972d8efc
-
SHA1
c87e1685f98822f3ac121679a76a792ba337d046
-
SHA256
7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000
-
SHA512
740b155839abf159d336e7716063cc11b1a57250970f6624b862f90d8da80bbe956a44c19540ff43fe4c913ab4f1237c8e6ff8d63880905d86a4771be2ecf596
-
SSDEEP
12288:9Mrqy90mtf0xnWXH5wzQqq5JRgGwfAZMilco707p1mfZdlNX8x+mC2Es:/yxXyQqqfRgGWAZMilclzmhxMx0U
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2040-19-0x0000000002250000-0x000000000226A000-memory.dmp healer behavioral1/memory/2040-21-0x0000000002510000-0x0000000002528000-memory.dmp healer behavioral1/memory/2040-23-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-49-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-48-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-45-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-44-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-41-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-39-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-37-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-35-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-33-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-32-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-29-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-27-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-25-0x0000000002510000-0x0000000002522000-memory.dmp healer behavioral1/memory/2040-22-0x0000000002510000-0x0000000002522000-memory.dmp healer -
Healer family
-
Processes:
pro3814.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3814.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3814.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4988-2143-0x0000000002790000-0x00000000027C2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3344-2156-0x0000000000E60000-0x0000000000E90000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si576831.exe family_redline behavioral1/memory/5436-2167-0x0000000000EB0000-0x0000000000EDE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7071.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu7071.exe -
Executes dropped EXE 5 IoCs
Processes:
un147733.exepro3814.exequ7071.exe1.exesi576831.exepid process 3868 un147733.exe 2040 pro3814.exe 4988 qu7071.exe 3344 1.exe 5436 si576831.exe -
Processes:
pro3814.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3814.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exeun147733.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un147733.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4060 2040 WerFault.exe pro3814.exe 5272 4988 WerFault.exe qu7071.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro3814.exequ7071.exe1.exesi576831.exe7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exeun147733.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3814.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7071.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si576831.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un147733.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro3814.exepid process 2040 pro3814.exe 2040 pro3814.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro3814.exequ7071.exedescription pid process Token: SeDebugPrivilege 2040 pro3814.exe Token: SeDebugPrivilege 4988 qu7071.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exeun147733.exequ7071.exedescription pid process target process PID 840 wrote to memory of 3868 840 7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exe un147733.exe PID 840 wrote to memory of 3868 840 7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exe un147733.exe PID 840 wrote to memory of 3868 840 7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exe un147733.exe PID 3868 wrote to memory of 2040 3868 un147733.exe pro3814.exe PID 3868 wrote to memory of 2040 3868 un147733.exe pro3814.exe PID 3868 wrote to memory of 2040 3868 un147733.exe pro3814.exe PID 3868 wrote to memory of 4988 3868 un147733.exe qu7071.exe PID 3868 wrote to memory of 4988 3868 un147733.exe qu7071.exe PID 3868 wrote to memory of 4988 3868 un147733.exe qu7071.exe PID 4988 wrote to memory of 3344 4988 qu7071.exe 1.exe PID 4988 wrote to memory of 3344 4988 qu7071.exe 1.exe PID 4988 wrote to memory of 3344 4988 qu7071.exe 1.exe PID 840 wrote to memory of 5436 840 7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exe si576831.exe PID 840 wrote to memory of 5436 840 7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exe si576831.exe PID 840 wrote to memory of 5436 840 7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exe si576831.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exe"C:\Users\Admin\AppData\Local\Temp\7e67fcc1549ca694e95855969de58aa8bbf65c7923131dc8b7b9e2aed2b41000.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un147733.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un147733.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3814.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3814.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 10364⤵
- Program crash
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7071.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7071.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3344 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 13844⤵
- Program crash
PID:5272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si576831.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si576831.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2040 -ip 20401⤵PID:3624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4988 -ip 49881⤵PID:2292
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD50f3987c70b8ff4068ec1a9c1bd11d500
SHA1bed294330c13cbe9db46bc1b540ed26ff057147f
SHA256d8434f536cae6eecaa7dbff43d832ac49d2363898e54a5c871567dd9cc21dcec
SHA512b9d577f66e65f2a7bc4857074528a48c60cf63eb1b5e8955da82a799ecb23eaef089daefab4acc1dd79b7a3d7c5aebf0b34f07587fad9bd83133b1dbd2d08b9d
-
Filesize
633KB
MD528a1e7b15b654b2ffc6fb2e586567af8
SHA1b3b6b2c36a4495b40c8d67c37ca26fb55de59af4
SHA256f52486a1789aca93d364dcde9af21fd200b81e140d10e8d8036c512c633b1507
SHA51272f70ad7c034ac521f1be09f3199e5cfdc87eb5e0c77ed95ab36a66f79352ea0f860059cfe940996e601a5be9e92c6f19118c352defe74fb18c2dbd692ee88ee
-
Filesize
231KB
MD56ea75fdedeb50ae52e07cb4a1e6849ef
SHA1753f5e19990db16b38838dbf8dc785eee3967799
SHA256c5eddc6622d4a78102b4ba6178ff53fdc42c7d740d0a7005adf8a8acad9a9489
SHA512bb7e1b62a3427a47c464a0a6f559a6115b84dcae6725bba2e2379e830b469da416d889313cf9f38e304b39f42c2e5848358dbda44e5cde8fe439dbc51900b1c7
-
Filesize
414KB
MD570590da98514bb164b8ceadcf0068e92
SHA1b74c686ac3e1175501ac45e76649603e987a3c8c
SHA25638a5d338779afdc6639da97e6336e2ec80710b41ffce3ef11a9e894e758fad77
SHA512894d93e2b10b11f825b694d76f7095a41bc01dc94ea0a82bd0fcdc82aa7d434168e86261ea459f91950f6d69ad673cd3f41c89aafa8d3c914b388a19b6f1d6fe
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0