Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 02:02
Static task
static1
Behavioral task
behavioral1
Sample
31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe
Resource
win10v2004-20241007-en
General
-
Target
31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe
-
Size
787KB
-
MD5
943e547cca18bc0cb4900387fd019189
-
SHA1
2c22d326ba40b052e900c7c20f451741ff8b80ba
-
SHA256
31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544
-
SHA512
e474a77095f4f9b5fa4f24d7adc00f565e7a91b4917fc3af6b0c759bdbba192e441da119de7e272146fb1bebc0085b9eda6eee2203b6319482c46e4ad5f9e2de
-
SSDEEP
12288:3Mryy90uWnpgG4ykAdvjABkJWV7HPvJvY5dix3DN1TdNdP88XjjEH:xylWnMQJjABkJiPvy5wx3DblP88vk
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2512-19-0x00000000021E0000-0x00000000021FA000-memory.dmp healer behavioral1/memory/2512-21-0x0000000002210000-0x0000000002228000-memory.dmp healer behavioral1/memory/2512-22-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-49-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-47-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-45-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-43-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-41-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-39-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-37-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-35-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-33-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-31-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-29-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-27-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-25-0x0000000002210000-0x0000000002222000-memory.dmp healer behavioral1/memory/2512-23-0x0000000002210000-0x0000000002222000-memory.dmp healer -
Healer family
-
Processes:
pro0059.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0059.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0059.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/608-2142-0x0000000005420000-0x0000000005452000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5860-2155-0x0000000000090000-0x00000000000C0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767932.exe family_redline behavioral1/memory/2860-2165-0x0000000000720000-0x000000000074E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu8166.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation qu8166.exe -
Executes dropped EXE 5 IoCs
Processes:
un447744.exepro0059.exequ8166.exe1.exesi767932.exepid process 1684 un447744.exe 2512 pro0059.exe 608 qu8166.exe 5860 1.exe 2860 si767932.exe -
Processes:
pro0059.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0059.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0059.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exeun447744.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un447744.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2216 2512 WerFault.exe pro0059.exe 6056 608 WerFault.exe qu8166.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
si767932.exe31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exeun447744.exepro0059.exequ8166.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si767932.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un447744.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0059.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8166.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0059.exepid process 2512 pro0059.exe 2512 pro0059.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0059.exequ8166.exedescription pid process Token: SeDebugPrivilege 2512 pro0059.exe Token: SeDebugPrivilege 608 qu8166.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exeun447744.exequ8166.exedescription pid process target process PID 4560 wrote to memory of 1684 4560 31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe un447744.exe PID 4560 wrote to memory of 1684 4560 31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe un447744.exe PID 4560 wrote to memory of 1684 4560 31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe un447744.exe PID 1684 wrote to memory of 2512 1684 un447744.exe pro0059.exe PID 1684 wrote to memory of 2512 1684 un447744.exe pro0059.exe PID 1684 wrote to memory of 2512 1684 un447744.exe pro0059.exe PID 1684 wrote to memory of 608 1684 un447744.exe qu8166.exe PID 1684 wrote to memory of 608 1684 un447744.exe qu8166.exe PID 1684 wrote to memory of 608 1684 un447744.exe qu8166.exe PID 608 wrote to memory of 5860 608 qu8166.exe 1.exe PID 608 wrote to memory of 5860 608 qu8166.exe 1.exe PID 608 wrote to memory of 5860 608 qu8166.exe 1.exe PID 4560 wrote to memory of 2860 4560 31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe si767932.exe PID 4560 wrote to memory of 2860 4560 31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe si767932.exe PID 4560 wrote to memory of 2860 4560 31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe si767932.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe"C:\Users\Admin\AppData\Local\Temp\31a0792889b438d8b319c8ebbe60cec91e7075c61106f0b16470634b4ba91544.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un447744.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un447744.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0059.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0059.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2512 -s 10844⤵
- Program crash
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8166.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8166.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 13844⤵
- Program crash
PID:6056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767932.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767932.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2512 -ip 25121⤵PID:3324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 608 -ip 6081⤵PID:5936
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD566a14dd54550f9a445bddd71093f7925
SHA1d7f6d91a71e562a8c60fc500e40eec6268d3ee34
SHA2567b320ae4b0eb692ad359be576e9b3946f4e5b079624c74f9821a040649e09e32
SHA5127efffd5673003534cbbec6acd7cc3f87d8ee471a653f67ee16728989ed60282361ec8ff1e9107d77fc276f2de4fc04a5ff3e4d4c9bead040e7093a7e5c5e3dda
-
Filesize
633KB
MD5b39c680aad47988319a53cadc45466d3
SHA1c15d65c7c0443f59cd841f57f427065e1ba45632
SHA256daaf609feb7bd61400e3b546f87d07dec235f7b94f4484de5163634b3e97f753
SHA51232110524337601cbfbd8b59b0a8204618b126242805807efae0176779b786bdfe3ad95c0d353b5d75e8d665a29ec37ac43cc40bf2348933f24671940e83092f2
-
Filesize
230KB
MD52f716347e5d1ac9404375e44d2386f8c
SHA1d8e682eec589b8fb776efcdc5194bba8df056b52
SHA256e2210f7cda19c12bfe36aa2c1f0630b60f49f243683ebd5f78f662a7c331d23d
SHA512d718fb15f56b2ab61d01977650e4578e8027f92fd05c57a540276315be4337e960a37d50006dd7156e60a5ba547b01ffad620ecd19ec2a1768522dd1cd611309
-
Filesize
414KB
MD5c82f0851c0d4ab73ee3eb2d73e9e82b6
SHA16dee173afb0a2e1da64e46c974e7e17e9978f139
SHA2561f8ddc00204aa9dba4fbb9e3a67c36ad297325b95bd4339054fec79465e0d6c2
SHA512f82c583f4e15dd819e45a607f3ec79ec96b5b170eef2ba2d26832f506ce8f2e15c7492de3b4599760333005282d9c29671a9c5cc4a083be54de2be2111dd05dc
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0