Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 06:15
Static task
static1
Behavioral task
behavioral1
Sample
08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe
Resource
win10v2004-20241007-en
General
-
Target
08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe
-
Size
789KB
-
MD5
064d81f7b1c80e9ed0fbbc066e291163
-
SHA1
f6eac869b07a41c8db1a5157d92683e39e258245
-
SHA256
08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d
-
SHA512
d0e3867899d42b26a27beecef4b2b536fe3e4297897ca3615245363cc340efc70320f810564a5c29085b35d5fd40f1c31441393355913984a999ae78f6727ff1
-
SSDEEP
12288:PMriy90etOaqLgxr9SLF7lnDpMy5a4/7ffDTNATzieRd6Ps3TV2Z79Wc1l:tyJ7qLzRlDpz/7nPnP8E79W4
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1240-19-0x0000000002380000-0x000000000239A000-memory.dmp healer behavioral1/memory/1240-21-0x0000000002830000-0x0000000002848000-memory.dmp healer behavioral1/memory/1240-47-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-45-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-43-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-41-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-39-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-49-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-37-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-35-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-33-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-31-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-29-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-27-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-25-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-23-0x0000000002830000-0x0000000002842000-memory.dmp healer behavioral1/memory/1240-22-0x0000000002830000-0x0000000002842000-memory.dmp healer -
Healer family
-
Processes:
pro1038.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1038.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2768-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5060-2155-0x0000000000200000-0x0000000000230000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si136048.exe family_redline behavioral1/memory/2380-2166-0x0000000000150000-0x000000000017E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu6113.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu6113.exe -
Executes dropped EXE 5 IoCs
Processes:
un229110.exepro1038.exequ6113.exe1.exesi136048.exepid process 1204 un229110.exe 1240 pro1038.exe 2768 qu6113.exe 5060 1.exe 2380 si136048.exe -
Processes:
pro1038.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1038.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1038.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exeun229110.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un229110.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4836 1240 WerFault.exe pro1038.exe 1416 2768 WerFault.exe qu6113.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exesi136048.exe08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exeun229110.exepro1038.exequ6113.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si136048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un229110.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1038.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6113.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1038.exepid process 1240 pro1038.exe 1240 pro1038.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1038.exequ6113.exedescription pid process Token: SeDebugPrivilege 1240 pro1038.exe Token: SeDebugPrivilege 2768 qu6113.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exeun229110.exequ6113.exedescription pid process target process PID 4916 wrote to memory of 1204 4916 08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe un229110.exe PID 4916 wrote to memory of 1204 4916 08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe un229110.exe PID 4916 wrote to memory of 1204 4916 08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe un229110.exe PID 1204 wrote to memory of 1240 1204 un229110.exe pro1038.exe PID 1204 wrote to memory of 1240 1204 un229110.exe pro1038.exe PID 1204 wrote to memory of 1240 1204 un229110.exe pro1038.exe PID 1204 wrote to memory of 2768 1204 un229110.exe qu6113.exe PID 1204 wrote to memory of 2768 1204 un229110.exe qu6113.exe PID 1204 wrote to memory of 2768 1204 un229110.exe qu6113.exe PID 2768 wrote to memory of 5060 2768 qu6113.exe 1.exe PID 2768 wrote to memory of 5060 2768 qu6113.exe 1.exe PID 2768 wrote to memory of 5060 2768 qu6113.exe 1.exe PID 4916 wrote to memory of 2380 4916 08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe si136048.exe PID 4916 wrote to memory of 2380 4916 08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe si136048.exe PID 4916 wrote to memory of 2380 4916 08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe si136048.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe"C:\Users\Admin\AppData\Local\Temp\08d42397bf8baa95d619a00b2619c9008ce603921a0b7f7899cde0fc42a8c40d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229110.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229110.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1038.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1038.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 10164⤵
- Program crash
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6113.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6113.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 15204⤵
- Program crash
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si136048.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si136048.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1240 -ip 12401⤵PID:4796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2768 -ip 27681⤵PID:1576
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5f2a75c90fdc16db69f48d1c0cff1757a
SHA174ef5d3530570b12feb28f77f18539595a798a8e
SHA25674a0f0180ed51ee27b0c105a6e7275db04f53414fa7154e790f97eb1a213f119
SHA512a476dcb5c0f325ad85a0bf84d47a7da48a4718e5ed9da5fbe1c7afa58f6b71d9719fca3073bb5ec5937145475585c7e785d975d2fd31986765a9a5cc74149577
-
Filesize
635KB
MD5fff3b10c964ec9bdbad804e46844b6da
SHA15baf4ea3acf11920c531f9d279916015cda142aa
SHA256c65e2f7eebd0ee36582bf24fde0c9e39e596884b1cc8f5541d7d7f0f4f9d8a9a
SHA51292125c92d737299e2e041ceeab8a1370a4595d6f0ed70cc7d77a2ef777a6da03edacce72cb80392c72a12be14b14b81c571313707118f72facc2384ff3cae855
-
Filesize
233KB
MD52db72a880c24080973c3c38db2b86030
SHA1cc0625f9132a6625571774bdaaa19868eb41095c
SHA25634ec0c396a0eb6af157be8be480503c2872c48b5c2e563b6402da44968e3a867
SHA51286a1c59ee09779a4afc1ad21773610d3e69de1671e82bbd66d081af33f7f8a99816d5ac7db9aae1e1549f933f6c61e670fe826ba0211886e1f40fe1029999cd9
-
Filesize
417KB
MD590c4666c8ae116850eca55c35f36cbab
SHA16a3ebf2159d01b577aeefee8feab3c4816daa928
SHA2562d99461a6b2842daea1c8b334e7563b6b9956118607257829caa8e5976a77be8
SHA512267ce9a0bf4bf67b356ed1bf7ba5bf00ef794035128d8d35ac2e7431560ec74cd6b3e8213da8c392d6f27a3f7a547a7946ee66c74330d3c46c142dd39ec09ae6
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0