Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 06:17
Static task
static1
Behavioral task
behavioral1
Sample
a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exe
Resource
win10v2004-20241007-en
General
-
Target
a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exe
-
Size
789KB
-
MD5
b0e81ee3ca3cb89cb453b127c3d963e0
-
SHA1
2f412b07ddefb6c63764b4e0139fce456bdb982e
-
SHA256
a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b
-
SHA512
240d3c48592a52e835cc0cee547f62a397b8c4e4e3a2368d2a7a165a09142d72e4d2cadee330972168394e1ad23af41eb7089ce469cf17eedc2ae498595e04a5
-
SSDEEP
12288:JMrGy90G5Q2OLA1eByR8qhf8XsL09zKEyGqIsTtA3DiesppPsiqVfpmhA39w5:fy9uAzRpuWWw5PhciA39w5
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1112-19-0x0000000002570000-0x000000000258A000-memory.dmp healer behavioral1/memory/1112-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/1112-41-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/1112-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pro4688.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4688.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1192-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1616-2155-0x0000000000F40000-0x0000000000F70000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si630171.exe family_redline behavioral1/memory/2240-2166-0x0000000000CC0000-0x0000000000CEE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7802.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation qu7802.exe -
Executes dropped EXE 5 IoCs
Processes:
un447869.exepro4688.exequ7802.exe1.exesi630171.exepid process 1844 un447869.exe 1112 pro4688.exe 1192 qu7802.exe 1616 1.exe 2240 si630171.exe -
Processes:
pro4688.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4688.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exeun447869.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un447869.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4880 1112 WerFault.exe pro4688.exe 3588 1192 WerFault.exe qu7802.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro4688.exequ7802.exe1.exesi630171.exea12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exeun447869.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si630171.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un447869.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4688.exepid process 1112 pro4688.exe 1112 pro4688.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4688.exequ7802.exedescription pid process Token: SeDebugPrivilege 1112 pro4688.exe Token: SeDebugPrivilege 1192 qu7802.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exeun447869.exequ7802.exedescription pid process target process PID 1336 wrote to memory of 1844 1336 a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exe un447869.exe PID 1336 wrote to memory of 1844 1336 a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exe un447869.exe PID 1336 wrote to memory of 1844 1336 a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exe un447869.exe PID 1844 wrote to memory of 1112 1844 un447869.exe pro4688.exe PID 1844 wrote to memory of 1112 1844 un447869.exe pro4688.exe PID 1844 wrote to memory of 1112 1844 un447869.exe pro4688.exe PID 1844 wrote to memory of 1192 1844 un447869.exe qu7802.exe PID 1844 wrote to memory of 1192 1844 un447869.exe qu7802.exe PID 1844 wrote to memory of 1192 1844 un447869.exe qu7802.exe PID 1192 wrote to memory of 1616 1192 qu7802.exe 1.exe PID 1192 wrote to memory of 1616 1192 qu7802.exe 1.exe PID 1192 wrote to memory of 1616 1192 qu7802.exe 1.exe PID 1336 wrote to memory of 2240 1336 a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exe si630171.exe PID 1336 wrote to memory of 2240 1336 a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exe si630171.exe PID 1336 wrote to memory of 2240 1336 a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exe si630171.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exe"C:\Users\Admin\AppData\Local\Temp\a12b89ead0b9cc7f4de2341f7d56db026942f1b19b89e4b264aa13ec8ec73e4b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un447869.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un447869.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4688.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4688.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 10804⤵
- Program crash
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7802.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7802.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 13844⤵
- Program crash
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si630171.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si630171.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1112 -ip 11121⤵PID:2056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1192 -ip 11921⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD559bb734d315bf9083465cf05d8f227d9
SHA1ccb4560d133b8c3c110d70a25d379771b85cc686
SHA256213524deb7f3b78318aefd36cdd10ab2e6a9c734b05580b272c174fd113b54ef
SHA5125934a7272268bd785f39ec716cbaab9cb10080a45b349fd00141f9f943f60c655aa764d46025d749feddc2ba0417daadb84c758ecbea8fe6e8f1dba0bbc14e2b
-
Filesize
635KB
MD59b9f46f523f8c657973b4e9a851eb431
SHA14cc2bfca345bbbde63a82bae8ccfffb2407dc21a
SHA256f40a9cc90249a6b8e07100d3e816c8e5d135cb20b2e8dfd8a012cfe1f19edb15
SHA5129353bea9f2c059ac99e3b3464e0e6043c20d50c05eeb9b89dfde4077d42046a79ef4c1e241111485dec55c559eccd0196651ebc160f11b94aa3cd6afc1385cf9
-
Filesize
233KB
MD5c7cded1b8c6d11430c9a8ea2dc5261b0
SHA1ca9b873cecd0dfbb4a889b88703cb79c1b759152
SHA25684775aac94fbb435729f1ab0548890c9abefdaef06ef19d8384972ee24b58062
SHA5123baf82db2cd550ea5b8a57a1facda4af002bf4aa3151f9c87f7ff9dadde78de6b6ae7191306def3016610157d0efd66530b7a13efb4e1039b4938329e05e0efa
-
Filesize
417KB
MD52a3ba89f5ef6060d83c2e1a42fd05d52
SHA10cbe4b83a6712c3e08dc043fd1e01c3e118d4ed6
SHA25627f5810c9c94aabd21533f54a85c5891056c136329b68c5056f89e59a80100bd
SHA512f71a6f9085e4058a2f7a18954b2ba246ffc1deac0ac2dd07107bfc54c5722c159525d011f6c89dc4d1c248ba39fe16c75166bc1d016277ba3a8dbafda48da3de
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0