Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 01:11
Static task
static1
Behavioral task
behavioral1
Sample
ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exe
Resource
win10v2004-20241007-en
General
-
Target
ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exe
-
Size
814KB
-
MD5
cc6a5cefa6d4d1f5e7ed0a0660e092aa
-
SHA1
dcdf4b8081af60015fe4f10ff50bf0cd816f6875
-
SHA256
ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c
-
SHA512
a3ae3ac7f7814d447ec8253e1f587fb399ac1bd6857147b6a9d8583e8901fb96f52fcdce9597a81f0feb09dc54ce5fe235a3cd2cfbe4c69db96b803f031f6280
-
SSDEEP
12288:SMrIy9072kDVNCCELKNVKggJ51AH3wHQKDb4tagLv+3HMsxAXiLOoxt/y74GMvaB:eyanCFLMEVBu+XD0L6HlIbOk4GDB
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2508-19-0x0000000002880000-0x000000000289A000-memory.dmp healer behavioral1/memory/2508-21-0x0000000004DB0000-0x0000000004DC8000-memory.dmp healer behavioral1/memory/2508-25-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-49-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-47-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-45-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-43-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-41-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-39-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-37-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-35-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-34-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-31-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-29-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-27-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-23-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer behavioral1/memory/2508-22-0x0000000004DB0000-0x0000000004DC2000-memory.dmp healer -
Healer family
-
Processes:
pro4052.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4052.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4052.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4992-2142-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3168-2155-0x0000000000800000-0x0000000000830000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535612.exe family_redline behavioral1/memory/3092-2166-0x0000000000480000-0x00000000004AE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7756.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu7756.exe -
Executes dropped EXE 5 IoCs
Processes:
un301861.exepro4052.exequ7756.exe1.exesi535612.exepid process 2012 un301861.exe 2508 pro4052.exe 4992 qu7756.exe 3168 1.exe 3092 si535612.exe -
Processes:
pro4052.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4052.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4052.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exeun301861.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un301861.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2112 2508 WerFault.exe pro4052.exe 5240 4992 WerFault.exe qu7756.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu7756.exe1.exesi535612.exead1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exeun301861.exepro4052.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7756.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si535612.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un301861.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4052.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4052.exepid process 2508 pro4052.exe 2508 pro4052.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4052.exequ7756.exedescription pid process Token: SeDebugPrivilege 2508 pro4052.exe Token: SeDebugPrivilege 4992 qu7756.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exeun301861.exequ7756.exedescription pid process target process PID 2580 wrote to memory of 2012 2580 ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exe un301861.exe PID 2580 wrote to memory of 2012 2580 ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exe un301861.exe PID 2580 wrote to memory of 2012 2580 ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exe un301861.exe PID 2012 wrote to memory of 2508 2012 un301861.exe pro4052.exe PID 2012 wrote to memory of 2508 2012 un301861.exe pro4052.exe PID 2012 wrote to memory of 2508 2012 un301861.exe pro4052.exe PID 2012 wrote to memory of 4992 2012 un301861.exe qu7756.exe PID 2012 wrote to memory of 4992 2012 un301861.exe qu7756.exe PID 2012 wrote to memory of 4992 2012 un301861.exe qu7756.exe PID 4992 wrote to memory of 3168 4992 qu7756.exe 1.exe PID 4992 wrote to memory of 3168 4992 qu7756.exe 1.exe PID 4992 wrote to memory of 3168 4992 qu7756.exe 1.exe PID 2580 wrote to memory of 3092 2580 ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exe si535612.exe PID 2580 wrote to memory of 3092 2580 ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exe si535612.exe PID 2580 wrote to memory of 3092 2580 ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exe si535612.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exe"C:\Users\Admin\AppData\Local\Temp\ad1c221552d06f371ef28cf0d829ebb2d6e761538c03252b57edeacb1b53396c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un301861.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un301861.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4052.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4052.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 10284⤵
- Program crash
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7756.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7756.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 15284⤵
- Program crash
PID:5240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535612.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535612.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2508 -ip 25081⤵PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4992 -ip 49921⤵PID:5180
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD511c0ab1409f39648488afb2af31b2db2
SHA19c1061e5079baa950b0a2bb8ae80bcd32e33c40c
SHA256268d46825828827cb23c1f6503b537c95be63aa5fdfe39a59b9d0bc1efd5d230
SHA5129241349c7c3859ba7221cf7ed742d323a373f7beadc3e994fd720e7c999bcb901380e9a81b842f58e791022a6d634d4c9158dbd185ffbaa7bab6cc072dd0bc05
-
Filesize
660KB
MD5d9a7ba75bf38ae47f52c70fdc86e4742
SHA1f26dc69975d298b3288580129ebef2eb291b485a
SHA25623c7f6275b3e4901df1c7465a6ab646d762f323e0b0ad25efb6499f3ffb0d66b
SHA51278b6c07af7f4bf052c1a122c5e9b22be577b8eec0b72b8a16bb0ce82f8f7a7f604bdee087d02c55db804dd4fa34d15fd0a8e6a625b903d07e03d4293619e2a44
-
Filesize
312KB
MD509ba8a2191cce743040428e487da2ac1
SHA192aad7a0efe37d57a70fdda12f1e9e16c21b2694
SHA256430dd384858f63ddbf8dc1f373afb979ffb9dcecaf5b4df6367a9ad599fd16f6
SHA5120ee821df9e1966b6f54bb2d2d1e6282cd20ab3561927ea7534f81aa12215eac805aade48bd459af8b28e9452506d1d8df905683b38fefc2cca349f160cc8927b
-
Filesize
495KB
MD58d7efaf283e711665e7695f90e954115
SHA134b65f5cc5206bc397a132c7544568d5cc7156b9
SHA2568bcb615539c5014e15d312ca0eef02e5326381f68a97710558c6f5f9d114e813
SHA512787831ec6bd509d7cb2db71df4a67d2723fbd3454f1bacbd15c00d3f124e3deeab9184c9be0215120123114a3fb43bb0ad22f823689755192f8823f7621ac280
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0