Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 00:53
Static task
static1
Behavioral task
behavioral1
Sample
403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exe
Resource
win10v2004-20241007-en
General
-
Target
403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exe
-
Size
786KB
-
MD5
5e1de886c62659c6958685d2f4be3d44
-
SHA1
e2deb59ce23fd95860cd3edbb535d811606c118c
-
SHA256
403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a
-
SHA512
c6cb201632be94cceaec60237097d562b5a75a3b268d7f61b2a56e4051885dd15833a298e4dcace85fa19f74a7669d255f0dbb0d8693430182d0827de238c511
-
SSDEEP
12288:eMrqy9053sL5SaL9l6fv5JqsigjbNQoiMp3mh13GykuDbWo1lV8:oyS8L5bIv5JHDjCo9p3mHmuHW7
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1808-19-0x00000000049C0000-0x00000000049DA000-memory.dmp healer behavioral1/memory/1808-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/1808-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-44-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-42-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-40-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-32-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1808-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pro2954.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2954.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1756-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5456-2156-0x00000000006E0000-0x0000000000710000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si441366.exe family_redline behavioral1/memory/5580-2166-0x00000000002B0000-0x00000000002DE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu9280.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation qu9280.exe -
Executes dropped EXE 5 IoCs
Processes:
un769521.exepro2954.exequ9280.exe1.exesi441366.exepid process 1004 un769521.exe 1808 pro2954.exe 1756 qu9280.exe 5456 1.exe 5580 si441366.exe -
Processes:
pro2954.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2954.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2954.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un769521.exe403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un769521.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3668 1808 WerFault.exe pro2954.exe 5532 1756 WerFault.exe qu9280.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un769521.exepro2954.exequ9280.exe1.exesi441366.exe403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un769521.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2954.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9280.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si441366.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro2954.exepid process 1808 pro2954.exe 1808 pro2954.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro2954.exequ9280.exedescription pid process Token: SeDebugPrivilege 1808 pro2954.exe Token: SeDebugPrivilege 1756 qu9280.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exeun769521.exequ9280.exedescription pid process target process PID 4052 wrote to memory of 1004 4052 403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exe un769521.exe PID 4052 wrote to memory of 1004 4052 403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exe un769521.exe PID 4052 wrote to memory of 1004 4052 403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exe un769521.exe PID 1004 wrote to memory of 1808 1004 un769521.exe pro2954.exe PID 1004 wrote to memory of 1808 1004 un769521.exe pro2954.exe PID 1004 wrote to memory of 1808 1004 un769521.exe pro2954.exe PID 1004 wrote to memory of 1756 1004 un769521.exe qu9280.exe PID 1004 wrote to memory of 1756 1004 un769521.exe qu9280.exe PID 1004 wrote to memory of 1756 1004 un769521.exe qu9280.exe PID 1756 wrote to memory of 5456 1756 qu9280.exe 1.exe PID 1756 wrote to memory of 5456 1756 qu9280.exe 1.exe PID 1756 wrote to memory of 5456 1756 qu9280.exe 1.exe PID 4052 wrote to memory of 5580 4052 403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exe si441366.exe PID 4052 wrote to memory of 5580 4052 403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exe si441366.exe PID 4052 wrote to memory of 5580 4052 403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exe si441366.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exe"C:\Users\Admin\AppData\Local\Temp\403d30295bb0e181ef9867c0f50c160d23c3f01459414e5de3d21053c285d85a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769521.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769521.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2954.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2954.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 10964⤵
- Program crash
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9280.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9280.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1756 -s 13764⤵
- Program crash
PID:5532 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si441366.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si441366.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1808 -ip 18081⤵PID:1500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1756 -ip 17561⤵PID:5488
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5590edd59536637ee2a76bbe4ed449a1e
SHA101cfc054587504103b28b41ae013d1bb4e30b65c
SHA2560658c352421645530cfc669d8ca0e3eafa2e571b9d0be59e1dc69544d67630b2
SHA512fe3a7202b767717ebade1f3a889e3ad9e9752251ab86280933539d9e2434594086fdc8cb7321c76a4397903eb2f5a18e80ca1eca15b46b65c4e7b6d0b2325ed8
-
Filesize
633KB
MD59248e50de234fcd63b8797b50adc7f36
SHA1c3091d99162247102453e6571f216dad55810609
SHA256843b77e00035686842df02f26357e55c19fb174b77b01710886100580e17ac1a
SHA512e818ed6679b07b5e6185c4ad97449a7a394be753ae2ce64cbed6b585dff789ba44f6ba0b4fe3941d95cf7c7f7028b80ccd38b2d6711d6d3a7a87ce943b9eae3a
-
Filesize
230KB
MD50ea5f6a386b8733040180eb417409e37
SHA115345895d22053a4ad343176d7a654123e66abcb
SHA2567c75668247598e0bce91009eae7b6c60edee4c59a052e840e2175ddbcf3d272e
SHA51291f473c49b4cdce51c0265db0a37245adcd1c926241cdd3259a04322a9b531346e685f1e6654c01a3d2326c2a6b49d1594645fc581bb01214ef4b09905cf279b
-
Filesize
414KB
MD55df13c0e346bf8e3370bda540be7ada4
SHA1e552d8dfd82a2b82044c8062910c89931c9a71dc
SHA256e53ede6dd2e5bc94c013c8f80155c0becd1b7f74cd205362c4ded7c3defaa373
SHA512c18d665d176e337070852da031239a258ab3682fc50eaf5091bda1ded2cdfccec69e2382a7a362b05d08046f7b8e0af599f4e649c26bf59a71accbbb5eee8af3
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0