Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 01:00
Static task
static1
Behavioral task
behavioral1
Sample
ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exe
Resource
win10v2004-20241007-en
General
-
Target
ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exe
-
Size
801KB
-
MD5
7e6c29b280be9d165b1a8c0618cef74a
-
SHA1
0138503933340981eddb8abc1639860c56fdcaa9
-
SHA256
ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8
-
SHA512
b135f51a6ae2472d0ef59849974146363864e05899a5056b5adb30477712be03c79744fc495d1b1687ece18e664ce3be49e937cc7ee39738d7a2920e3f01e92d
-
SSDEEP
24576:vyE8Z72/o5hLtcU0Kzj1ElLMuZUjBX4f2V40qQaeW:6Eiuo5hLnzzj1ubujBSkhae
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3176-19-0x0000000002400000-0x000000000241A000-memory.dmp healer behavioral1/memory/3176-21-0x00000000024E0000-0x00000000024F8000-memory.dmp healer behavioral1/memory/3176-45-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-49-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-47-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-43-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-42-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-39-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-38-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-35-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-33-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-31-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-29-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-22-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-25-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-27-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/3176-23-0x00000000024E0000-0x00000000024F2000-memory.dmp healer -
Healer family
-
Processes:
pro3976.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3976.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3548-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5700-2156-0x0000000000260000-0x0000000000290000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si704708.exe family_redline behavioral1/memory/3464-2167-0x0000000000730000-0x000000000075E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu0716.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation qu0716.exe -
Executes dropped EXE 5 IoCs
Processes:
un671993.exepro3976.exequ0716.exe1.exesi704708.exepid process 3096 un671993.exe 3176 pro3976.exe 3548 qu0716.exe 5700 1.exe 3464 si704708.exe -
Processes:
pro3976.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3976.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3976.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exeun671993.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un671993.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4124 3176 WerFault.exe pro3976.exe 6088 3548 WerFault.exe qu0716.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu0716.exe1.exesi704708.exeba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exeun671993.exepro3976.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0716.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si704708.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un671993.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3976.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro3976.exepid process 3176 pro3976.exe 3176 pro3976.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro3976.exequ0716.exedescription pid process Token: SeDebugPrivilege 3176 pro3976.exe Token: SeDebugPrivilege 3548 qu0716.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exeun671993.exequ0716.exedescription pid process target process PID 4716 wrote to memory of 3096 4716 ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exe un671993.exe PID 4716 wrote to memory of 3096 4716 ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exe un671993.exe PID 4716 wrote to memory of 3096 4716 ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exe un671993.exe PID 3096 wrote to memory of 3176 3096 un671993.exe pro3976.exe PID 3096 wrote to memory of 3176 3096 un671993.exe pro3976.exe PID 3096 wrote to memory of 3176 3096 un671993.exe pro3976.exe PID 3096 wrote to memory of 3548 3096 un671993.exe qu0716.exe PID 3096 wrote to memory of 3548 3096 un671993.exe qu0716.exe PID 3096 wrote to memory of 3548 3096 un671993.exe qu0716.exe PID 3548 wrote to memory of 5700 3548 qu0716.exe 1.exe PID 3548 wrote to memory of 5700 3548 qu0716.exe 1.exe PID 3548 wrote to memory of 5700 3548 qu0716.exe 1.exe PID 4716 wrote to memory of 3464 4716 ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exe si704708.exe PID 4716 wrote to memory of 3464 4716 ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exe si704708.exe PID 4716 wrote to memory of 3464 4716 ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exe si704708.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exe"C:\Users\Admin\AppData\Local\Temp\ba3191ade530837f687344b1ff0a5bf3f7956fc1b3bf758060e25609182cadd8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un671993.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un671993.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3976.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3976.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 10844⤵
- Program crash
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0716.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0716.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 14844⤵
- Program crash
PID:6088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si704708.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si704708.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3176 -ip 31761⤵PID:3496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3548 -ip 35481⤵PID:5844
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5e3787145236ee385888e82d630c985f6
SHA175e6052ab6fe8bb048bf66d3937e89c83ec289a4
SHA256969872cfbbd6ca182bd322d1b07c22978a59169edce0171942deabdb4f9cd5c6
SHA512448f8e670e97a34cc4b2a2887678f0556319b13c09813917c9679a9adc4c2199a9824ec7a79874ddca3106cbf9f48a0c6a1049495491275799c1ef1502f818c4
-
Filesize
648KB
MD506934cdcad6a6378a9c741b0d47f11d9
SHA1974f6f20655a6f0107c01f20ee1427823766b5f3
SHA256603de69a7181bfef4e53d681fb7a5708622cce35e43815fc4040d7ef6333f8dc
SHA512881aee59f4aa59e277b8aad2b37ce966393040a3d578c58dc36728de3bfadcbeab3bfb2698cacc3d90a6f48188d15ba183c309098743d72316e17fd77aad86fa
-
Filesize
252KB
MD5d626a0cb291817888729482041e84bee
SHA179ff2127bebe5651c1a06e6f6cb0dfdb04147746
SHA256c4df78a91762ebd5a82a5e788783089f88e93a7c84ea27416a2777d8e05cfe87
SHA512eb0ce6c004466e69ab79808bb9567beb8bf3a7eb0a454a29291fe265b2eb8a5659765f118e6c195e33f30636ac42aeb2bd091731e1f256bff19d429ce5a0abc4
-
Filesize
435KB
MD52b2a0987a48776d7533bf450a59fd751
SHA18bf360d91c21b1f084458605b5a3dcc67986d951
SHA256b0c5bddc8af4aac15ebd458e1291cfa025ddf759f8677d2cc79f9fbd1daee4bf
SHA512eef0b6649d3caed1d7c00268088c201892bb5dd8c0784b8a259eea2e77c9888590271a6b9bccbed33377a7391c80df7f34260a7c74d2faf14654f8d8c4055525
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0