Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 23:37
Static task
static1
Behavioral task
behavioral1
Sample
86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exe
Resource
win10v2004-20241007-en
General
-
Target
86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exe
-
Size
787KB
-
MD5
d84b1bccab3f61d9ba48c8e037255857
-
SHA1
66efc597a1ebba9435d12b7665c3219ada415057
-
SHA256
86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e
-
SHA512
e0d3ca5834e480f5aac272da6bf8963c8ff5d2ee7f389720975457dc5e51b7b99597dcdb88cfab9139810f0e2c7153a030b986da735e0603bebd5d8c175085af
-
SSDEEP
12288:2Mr2y905FSOTad1OFQQ0lGJ7KVknecOlQ73Qj19dRinxLI1ZD:MyQRYMFQQ0lGJZnecOK73QJgnpIb
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4176-19-0x0000000002310000-0x000000000232A000-memory.dmp healer behavioral1/memory/4176-21-0x0000000002540000-0x0000000002558000-memory.dmp healer behavioral1/memory/4176-29-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-49-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-47-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-45-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-44-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-41-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-39-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-37-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-35-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-34-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-31-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-27-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-25-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-23-0x0000000002540000-0x0000000002552000-memory.dmp healer behavioral1/memory/4176-22-0x0000000002540000-0x0000000002552000-memory.dmp healer -
Healer family
-
Processes:
pro9966.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9966.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3500-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1456-2156-0x0000000000D50000-0x0000000000D80000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si282352.exe family_redline behavioral1/memory/5144-2166-0x0000000000920000-0x000000000094E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu8239.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation qu8239.exe -
Executes dropped EXE 5 IoCs
Processes:
un287564.exepro9966.exequ8239.exe1.exesi282352.exepid process 756 un287564.exe 4176 pro9966.exe 3500 qu8239.exe 1456 1.exe 5144 si282352.exe -
Processes:
pro9966.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9966.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9966.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exeun287564.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un287564.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3324 4176 WerFault.exe pro9966.exe 2408 3500 WerFault.exe qu8239.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un287564.exepro9966.exequ8239.exe1.exesi282352.exe86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un287564.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9966.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8239.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si282352.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9966.exepid process 4176 pro9966.exe 4176 pro9966.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9966.exequ8239.exedescription pid process Token: SeDebugPrivilege 4176 pro9966.exe Token: SeDebugPrivilege 3500 qu8239.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exeun287564.exequ8239.exedescription pid process target process PID 4464 wrote to memory of 756 4464 86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exe un287564.exe PID 4464 wrote to memory of 756 4464 86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exe un287564.exe PID 4464 wrote to memory of 756 4464 86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exe un287564.exe PID 756 wrote to memory of 4176 756 un287564.exe pro9966.exe PID 756 wrote to memory of 4176 756 un287564.exe pro9966.exe PID 756 wrote to memory of 4176 756 un287564.exe pro9966.exe PID 756 wrote to memory of 3500 756 un287564.exe qu8239.exe PID 756 wrote to memory of 3500 756 un287564.exe qu8239.exe PID 756 wrote to memory of 3500 756 un287564.exe qu8239.exe PID 3500 wrote to memory of 1456 3500 qu8239.exe 1.exe PID 3500 wrote to memory of 1456 3500 qu8239.exe 1.exe PID 3500 wrote to memory of 1456 3500 qu8239.exe 1.exe PID 4464 wrote to memory of 5144 4464 86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exe si282352.exe PID 4464 wrote to memory of 5144 4464 86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exe si282352.exe PID 4464 wrote to memory of 5144 4464 86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exe si282352.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exe"C:\Users\Admin\AppData\Local\Temp\86b461379ca76ad96adbc66b34067c59694e1fd537cde0f4200da27e8b0ffd7e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un287564.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un287564.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9966.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9966.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4176 -s 10924⤵
- Program crash
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8239.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8239.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 15324⤵
- Program crash
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si282352.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si282352.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4176 -ip 41761⤵PID:1444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 3500 -ip 35001⤵PID:4844
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5fbbd2cf68abd1148221933586cacd9f3
SHA1321c4861ec86a8ce101a20876d63805cb0a152ab
SHA256fad06c17125b7992ad2df107b2df1b90a9b51a018c162282e24860db0cfd8ab8
SHA5121b65dbc88ff9fa70857a6264bc8d6666cf83eb17309cf2802c8657b79dbf58bb5526110875c2e71b1b0a777e97c44d0e1e52dafd66be20ac42dc921ac55d75e8
-
Filesize
633KB
MD5324e10abb8c92ab645a39bb016016740
SHA1c315931286b5480922fdfc43db0e59532bbfd43b
SHA256502540970791db8c26ca67acb3737923d124d83a370c02f9e3ccb42d0af88b2b
SHA512a1dced47c9ee082b2dc4c2f3ed028a23143ef79569f853f8df9a282cb0105ce8535b964889c5110d3200107500f6f9837a9a7fd92746024d1a4ad8efd9ed7b0d
-
Filesize
230KB
MD5e19b593bd437470759198a209adbfd33
SHA112f98f589b5c21d380ba0ff2ab7ea4207af3c02b
SHA256f0c9af1fe3d9d3f212746ae275b3f32c6ed67a08dbc32c891db78f0b04913152
SHA512ba5c365b50dc1ee6ccd70438fd914c133ac865a4df344f94a4161e11456fb171a4dda8474b5772fc109d4b3127b476f8dcac99987a134c34d306658e4a655c1d
-
Filesize
414KB
MD565fe925eabb1de01c7ad0994b163d210
SHA1a52b03ceee1f9383c4a17296a8d2d35ca9a0eb49
SHA256cca0b305dde687587cb8b25dcfa7e8cd39f79d3bc82208109cf139ecaa849867
SHA512a1446ff677838e86f705d68a0a21f2564bfd3a4454eca7999c2830ba6b3189dda163c3f583f21a0f2510ae30c8f98118d810643cf77e0980ec037f31970be8d6
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0