Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exe
Resource
win10v2004-20241007-en
General
-
Target
353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exe
-
Size
801KB
-
MD5
9e645f9aed07473d4c342ff0cbe7d219
-
SHA1
9153b5637a8a68f92cff6136ae4cd53735a69774
-
SHA256
353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3
-
SHA512
34bd3d8d26a06c1f7ca126d7772af6f19c5e9eb10b2b91f2aab38ece46bcff1226f962f27b7ba96beec1cd303edde1dece41d6d3de6b960523d8b650972bf197
-
SSDEEP
24576:6yZ8n6xVq38sDZ0KCHqPhXphZajBRSf2RLIZM:BOn6xVgdNz8aphQjBKBZ
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1980-19-0x0000000002440000-0x000000000245A000-memory.dmp healer behavioral1/memory/1980-21-0x0000000005000000-0x0000000005018000-memory.dmp healer behavioral1/memory/1980-33-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-47-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-45-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-43-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-41-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-39-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-49-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-37-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-35-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-31-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-29-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-27-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-25-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-23-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/1980-22-0x0000000005000000-0x0000000005012000-memory.dmp healer -
Healer family
-
Processes:
pro9077.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro9077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro9077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro9077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro9077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro9077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro9077.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4540-2143-0x0000000005420000-0x0000000005452000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5584-2156-0x0000000000220000-0x0000000000250000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si494881.exe family_redline behavioral1/memory/1436-2167-0x0000000000D60000-0x0000000000D8E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu4654.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu4654.exe -
Executes dropped EXE 5 IoCs
Processes:
un768883.exepro9077.exequ4654.exe1.exesi494881.exepid process 1296 un768883.exe 1980 pro9077.exe 4540 qu4654.exe 5584 1.exe 1436 si494881.exe -
Processes:
pro9077.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro9077.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro9077.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un768883.exe353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un768883.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5840 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4716 1980 WerFault.exe pro9077.exe 436 4540 WerFault.exe qu4654.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exeun768883.exepro9077.exequ4654.exe1.exesi494881.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un768883.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro9077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4654.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si494881.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro9077.exepid process 1980 pro9077.exe 1980 pro9077.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro9077.exequ4654.exedescription pid process Token: SeDebugPrivilege 1980 pro9077.exe Token: SeDebugPrivilege 4540 qu4654.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exeun768883.exequ4654.exedescription pid process target process PID 116 wrote to memory of 1296 116 353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exe un768883.exe PID 116 wrote to memory of 1296 116 353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exe un768883.exe PID 116 wrote to memory of 1296 116 353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exe un768883.exe PID 1296 wrote to memory of 1980 1296 un768883.exe pro9077.exe PID 1296 wrote to memory of 1980 1296 un768883.exe pro9077.exe PID 1296 wrote to memory of 1980 1296 un768883.exe pro9077.exe PID 1296 wrote to memory of 4540 1296 un768883.exe qu4654.exe PID 1296 wrote to memory of 4540 1296 un768883.exe qu4654.exe PID 1296 wrote to memory of 4540 1296 un768883.exe qu4654.exe PID 4540 wrote to memory of 5584 4540 qu4654.exe 1.exe PID 4540 wrote to memory of 5584 4540 qu4654.exe 1.exe PID 4540 wrote to memory of 5584 4540 qu4654.exe 1.exe PID 116 wrote to memory of 1436 116 353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exe si494881.exe PID 116 wrote to memory of 1436 116 353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exe si494881.exe PID 116 wrote to memory of 1436 116 353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exe si494881.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exe"C:\Users\Admin\AppData\Local\Temp\353d3848e8baddcd7a95b01d0a474a5f3b559e8621a45018baf4db894e0107b3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un768883.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un768883.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9077.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9077.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 10804⤵
- Program crash
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4654.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4654.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 13844⤵
- Program crash
PID:436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si494881.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si494881.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1980 -ip 19801⤵PID:64
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4540 -ip 45401⤵PID:4460
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5636c8913655f9cb1db61fee80479688f
SHA116c3c95d23a712f5324f06d45043711ea24c46c6
SHA256fb930d681b7321c57feeb14b6b327ba569cfd133502cc6091672bbcefc7d361f
SHA512f9de6f019068175457cc8ebc5c632026ab683eed829f60808cb1e51103e09d84f37008f51ede844007faedf2177346f9783ae34eec1cacd4820ea8abe13d4ea2
-
Filesize
648KB
MD5fb2afc68ac03b8299ab38a9044e6d59f
SHA16c7d4613fbc5a0c4dbe201634fa202f9de4fd580
SHA256fe710442b789f9210ff238bc9b8e27d3ef1928521b0bba35ad6f84ba29d1296a
SHA512ad47e94d3b33bab1b38dd14afe585833e8997ecd4839f5d4cac251597d82c493d03523d76490772a0599e72f8771e477c1c534d33ab2d6ffc0a695a5241dc52c
-
Filesize
252KB
MD509b3c5227fc74183674213bd6b18c624
SHA19aa7d5924b04eb93ae0adcd192c44cab14497a5b
SHA256054f17383ab4fdf68d3cd8ee1f9eb1e2a1cca8be2db60aa2cde16205f4bd44e8
SHA5128a063e00f8aeddd3e403dc13aabdc0ea254963c765cfd78377da075bab1200810a03640b3a2b6c656c7af2b9203488fbb726c9160d0e30cd356a1ea54bf4ce7e
-
Filesize
435KB
MD59df30021bf1d650786ad86f6c4f02684
SHA1122645a2a7121b8c082a8d544545663bc18ccfc7
SHA256df7c58024fa922c09d0365f19ce7f2b55822a10e35d834f9562242d8d4e1dc96
SHA5125f8eddbb3c37acc49ddf2f4297b8c11a855829abc01f9f1b4a2725798259a846164fd856f83a1e89b1bf9a38f124a53457358b2c15e36b30b8de8e9632e1acc1
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0