Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:45
Static task
static1
Behavioral task
behavioral1
Sample
fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exe
Resource
win10v2004-20241007-en
General
-
Target
fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exe
-
Size
797KB
-
MD5
b1f2be4bb067aa4d6431da7a74cc7e20
-
SHA1
c8b1e7246fd862b9fca35a5238ccd33ce976e9c8
-
SHA256
fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645
-
SHA512
f5730300b54ee7a4a2977508d5c7250ab5815504efdc3142ee97f45b375964c5635026a695a95713af1dcba9690a2b5bfc7dc92197b55ecbde52979c1adbd9b8
-
SSDEEP
24576:0ydcfYaM5apqo97wlqqnxamjSiIMf8nb:DdctM5aqm7wlqZmjSiIMk
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4804-19-0x0000000002470000-0x000000000248A000-memory.dmp healer behavioral1/memory/4804-21-0x00000000024F0000-0x0000000002508000-memory.dmp healer behavioral1/memory/4804-23-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-49-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-47-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-45-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-43-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-41-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-39-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-37-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-35-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-33-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-31-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-29-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-27-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-25-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/4804-22-0x00000000024F0000-0x0000000002502000-memory.dmp healer -
Healer family
-
Processes:
pro8099.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8099.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1632-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4020-2156-0x0000000000450000-0x0000000000480000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si403345.exe family_redline behavioral1/memory/4592-2167-0x0000000000B60000-0x0000000000B8E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu4771.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation qu4771.exe -
Executes dropped EXE 5 IoCs
Processes:
un855426.exepro8099.exequ4771.exe1.exesi403345.exepid process 2932 un855426.exe 4804 pro8099.exe 1632 qu4771.exe 4020 1.exe 4592 si403345.exe -
Processes:
pro8099.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8099.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8099.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exeun855426.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un855426.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1448 4804 WerFault.exe pro8099.exe 5624 1632 WerFault.exe qu4771.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exeun855426.exepro8099.exequ4771.exe1.exesi403345.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un855426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8099.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4771.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si403345.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8099.exepid process 4804 pro8099.exe 4804 pro8099.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8099.exequ4771.exedescription pid process Token: SeDebugPrivilege 4804 pro8099.exe Token: SeDebugPrivilege 1632 qu4771.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exeun855426.exequ4771.exedescription pid process target process PID 2012 wrote to memory of 2932 2012 fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exe un855426.exe PID 2012 wrote to memory of 2932 2012 fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exe un855426.exe PID 2012 wrote to memory of 2932 2012 fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exe un855426.exe PID 2932 wrote to memory of 4804 2932 un855426.exe pro8099.exe PID 2932 wrote to memory of 4804 2932 un855426.exe pro8099.exe PID 2932 wrote to memory of 4804 2932 un855426.exe pro8099.exe PID 2932 wrote to memory of 1632 2932 un855426.exe qu4771.exe PID 2932 wrote to memory of 1632 2932 un855426.exe qu4771.exe PID 2932 wrote to memory of 1632 2932 un855426.exe qu4771.exe PID 1632 wrote to memory of 4020 1632 qu4771.exe 1.exe PID 1632 wrote to memory of 4020 1632 qu4771.exe 1.exe PID 1632 wrote to memory of 4020 1632 qu4771.exe 1.exe PID 2012 wrote to memory of 4592 2012 fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exe si403345.exe PID 2012 wrote to memory of 4592 2012 fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exe si403345.exe PID 2012 wrote to memory of 4592 2012 fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exe si403345.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exe"C:\Users\Admin\AppData\Local\Temp\fb2a8f3ce7b4e74b5b7af6baac27e8eb30afbf83b15cf748b5ad8b6f90c34645.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855426.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855426.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8099.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8099.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 10804⤵
- Program crash
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4771.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4771.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 15364⤵
- Program crash
PID:5624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si403345.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si403345.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4804 -ip 48041⤵PID:1004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1632 -ip 16321⤵PID:6112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD50e936733fabc5cbda6464a163198a181
SHA1f85893218738a0dfa22d947efe059593bc1ec4db
SHA2560f3c99b6a8b5bd33498b5ae887d1783a912ef44a92b1f384b1bb1144db628691
SHA5126453d342de0b955f00f7c4113044137af4a36e9ef9cf558e72505cc6faa1184b605e915d61ddd21869c9a53e0840c04253c86e081bca47da6b76794e003d57e5
-
Filesize
643KB
MD5c9c59341577c0fbf0d94972ccfa90c55
SHA1ff00cede9623f7c19adf9743df378f9b755a1315
SHA256cf0708242c25c6ddc8e9efa2271eec0aafab67857367eed2e01a69c415bb7912
SHA512cc48ffe93ffffb0dde5104dde4f144f1a7ac3b65f31bbeb237e9e1d0e26003a6f382738bea42dc26ac04b398d8c45da4a64b1b4e9c3febd3ae2cd0efb2c099a7
-
Filesize
241KB
MD579bb3537c6833674d75ff73ae1a96d4d
SHA106b705663f6f040a70aabbd073651dad9ba3fe48
SHA256ad2a827c903076da28bc54b514ddffb556a7d37f9a850bcc5ad6ad3e72715892
SHA512c51c1d13ab24a6e20fe76ddbf808b634f397e5e72b0e503cfdddbe96caf1693867e10575eff4337aeab926de484aaa8cfb78713f484d3f2433c3c72f4e41118e
-
Filesize
424KB
MD5f2c17a6cf7d157d0f6bedd388c999d25
SHA1ed17d342ed15e8f06991e21d0f7d657a3356ae9c
SHA256c8a7c2b8a8e09774ba749dfda163f9e8525560a0db7c957c6aabe57aa64146fb
SHA512f79bb9a7540b66acc7edb1d79b928254d1cd56fa708b08968c429508ddaa318e23186ab5b5c72cd5cfdc0c157781bce65cebd6c5ef7080cc3ce54e922f1707f3
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0