Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe
Resource
win10v2004-20241007-en
General
-
Target
dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe
-
Size
801KB
-
MD5
1269e16a9c10d78a4991ff8409896beb
-
SHA1
288a5045939d8710f0eb61c3b51534021921a4c6
-
SHA256
dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c
-
SHA512
69f400d067ef44a5d3bc14d6321ce69a3e6955fb82b9e2ddad48b471b1678ffdce5eedb75f025fa67808baf51a60a4feee41248782d9c0772a41596c7e9f2eb8
-
SSDEEP
24576:Sy+PhrIM0K/Kes2ZIjBdKf2LX7vo7evS:5+5z/zOjB6ivo7
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4896-19-0x00000000023A0000-0x00000000023BA000-memory.dmp healer behavioral1/memory/4896-21-0x0000000002620000-0x0000000002638000-memory.dmp healer behavioral1/memory/4896-49-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-47-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-45-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-43-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-41-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-39-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-37-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-35-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-33-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-31-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-29-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-27-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-25-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-23-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/4896-22-0x0000000002620000-0x0000000002632000-memory.dmp healer -
Healer family
-
Processes:
pro8343.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8343.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8343.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8343.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8343.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8343.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8343.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2608-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3016-2156-0x0000000000E20000-0x0000000000E50000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867965.exe family_redline behavioral1/memory/3260-2167-0x0000000000DB0000-0x0000000000DDE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7486.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation qu7486.exe -
Executes dropped EXE 5 IoCs
Processes:
un488683.exepro8343.exequ7486.exe1.exesi867965.exepid process 4252 un488683.exe 4896 pro8343.exe 2608 qu7486.exe 3016 1.exe 3260 si867965.exe -
Processes:
pro8343.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8343.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8343.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exeun488683.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un488683.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 444 4896 WerFault.exe pro8343.exe 2308 2608 WerFault.exe qu7486.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro8343.exequ7486.exe1.exesi867965.exedadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exeun488683.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8343.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7486.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si867965.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un488683.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8343.exepid process 4896 pro8343.exe 4896 pro8343.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8343.exequ7486.exedescription pid process Token: SeDebugPrivilege 4896 pro8343.exe Token: SeDebugPrivilege 2608 qu7486.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exeun488683.exequ7486.exedescription pid process target process PID 2932 wrote to memory of 4252 2932 dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe un488683.exe PID 2932 wrote to memory of 4252 2932 dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe un488683.exe PID 2932 wrote to memory of 4252 2932 dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe un488683.exe PID 4252 wrote to memory of 4896 4252 un488683.exe pro8343.exe PID 4252 wrote to memory of 4896 4252 un488683.exe pro8343.exe PID 4252 wrote to memory of 4896 4252 un488683.exe pro8343.exe PID 4252 wrote to memory of 2608 4252 un488683.exe qu7486.exe PID 4252 wrote to memory of 2608 4252 un488683.exe qu7486.exe PID 4252 wrote to memory of 2608 4252 un488683.exe qu7486.exe PID 2608 wrote to memory of 3016 2608 qu7486.exe 1.exe PID 2608 wrote to memory of 3016 2608 qu7486.exe 1.exe PID 2608 wrote to memory of 3016 2608 qu7486.exe 1.exe PID 2932 wrote to memory of 3260 2932 dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe si867965.exe PID 2932 wrote to memory of 3260 2932 dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe si867965.exe PID 2932 wrote to memory of 3260 2932 dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe si867965.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe"C:\Users\Admin\AppData\Local\Temp\dadb78bca264d95b47739456b624336522274c056c267b7719eb5f23524cdc2c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un488683.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un488683.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8343.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8343.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4896 -s 10844⤵
- Program crash
PID:444 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7486.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7486.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 15284⤵
- Program crash
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867965.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867965.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4896 -ip 48961⤵PID:2580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2608 -ip 26081⤵PID:3172
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5b639c03de77b1866a5a34c8649e8a67d
SHA13414ff2fcf92be731e99e21086781284ded70814
SHA256081bf8d3cfddc090c959aa6bde3474050ee770c3428f01401c1a9628bf4e307e
SHA51232e1d66d8f324c44c496537efe12d139bd91a17d1788cb741869c7e8e92b33cac695381795cc32d3e9d09c3cfefef78ac2bca6e5a52bbd2d4c099da4f31e3969
-
Filesize
648KB
MD561084affb98aed98e2f4bb9a16e1f092
SHA1bec4984762a948a9536764d1f1ee541f07ce7668
SHA256b7a85c511624fd221d2c8d4a7be2bc9bf1969cd99ea384378f62a5c51a609289
SHA51268cdea5a3bc40e75094f9ea689f1b756a2054fbef078a7728d535a772ae7358c571a8d6ae584c4f86dedd28c6f555ed0ec049785e93641bf6b63d9607ad1b007
-
Filesize
252KB
MD50e3642a3b2a7042ecb569aa58c999935
SHA1473213f3eaf2609cc8b4b60419884ea7f5ba4438
SHA256547cfb9cfe910340af897567f83ff3257476a7deb0f5369d505072ea30bdec5c
SHA512743ec16a1b3c1be197e9a630a195a03ac0cfd5501c1bbb41844423ff1562c005cfc92623e27aa463967111da635f0a87c4b82632a31a9151af48bc253444d2f7
-
Filesize
435KB
MD508809534771fa34e28f6220f8dced211
SHA18c89399cbe2972c052b16b7e9c3a35859cfea83c
SHA2566512ac8b9ade8be7a2da18c32488447302866b627493d074ec385d6670c94774
SHA51239bd7260949382a986f709fd6fcf625ed1abb7f39321bf22d8b4783f80892f82aecaf4164dccdba430c4fe8d463d6100f188effbc5333ecbcf6cbc240a918ab6
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0