Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 06:32
Static task
static1
Behavioral task
behavioral1
Sample
23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exe
Resource
win10v2004-20241007-en
General
-
Target
23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exe
-
Size
786KB
-
MD5
14897fe5bc1e4318f7e8b6c94016cecb
-
SHA1
ace624a32bbe9900c06956d8214dc887cc231abb
-
SHA256
23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d
-
SHA512
e93fea5b6b5bbf9bb32f9e0b42069a30d6cb838ea7c8a9ab0d9c622fae889d6eb34a8162365cf937ea8ba89152e071b497fd001ecbaec928fbfdfc52332546dd
-
SSDEEP
24576:wyud7kfXz83G3Qq3NVWUjyU8ib8SNmy8qA:3+kfjtAq3Drjpz7my8
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3100-19-0x00000000026A0000-0x00000000026BA000-memory.dmp healer behavioral1/memory/3100-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/3100-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-32-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3100-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro5200.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5200.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5200.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4484-2143-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5816-2156-0x0000000000B20000-0x0000000000B50000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si413995.exe family_redline behavioral1/memory/5832-2167-0x0000000000150000-0x000000000017E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu6207.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu6207.exe -
Executes dropped EXE 5 IoCs
Processes:
un315234.exepro5200.exequ6207.exe1.exesi413995.exepid process 5072 un315234.exe 3100 pro5200.exe 4484 qu6207.exe 5816 1.exe 5832 si413995.exe -
Processes:
pro5200.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5200.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exeun315234.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un315234.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1820 3100 WerFault.exe pro5200.exe 5728 4484 WerFault.exe qu6207.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exesi413995.exe23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exeun315234.exepro5200.exequ6207.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si413995.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un315234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5200.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6207.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5200.exepid process 3100 pro5200.exe 3100 pro5200.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5200.exequ6207.exedescription pid process Token: SeDebugPrivilege 3100 pro5200.exe Token: SeDebugPrivilege 4484 qu6207.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exeun315234.exequ6207.exedescription pid process target process PID 3088 wrote to memory of 5072 3088 23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exe un315234.exe PID 3088 wrote to memory of 5072 3088 23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exe un315234.exe PID 3088 wrote to memory of 5072 3088 23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exe un315234.exe PID 5072 wrote to memory of 3100 5072 un315234.exe pro5200.exe PID 5072 wrote to memory of 3100 5072 un315234.exe pro5200.exe PID 5072 wrote to memory of 3100 5072 un315234.exe pro5200.exe PID 5072 wrote to memory of 4484 5072 un315234.exe qu6207.exe PID 5072 wrote to memory of 4484 5072 un315234.exe qu6207.exe PID 5072 wrote to memory of 4484 5072 un315234.exe qu6207.exe PID 4484 wrote to memory of 5816 4484 qu6207.exe 1.exe PID 4484 wrote to memory of 5816 4484 qu6207.exe 1.exe PID 4484 wrote to memory of 5816 4484 qu6207.exe 1.exe PID 3088 wrote to memory of 5832 3088 23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exe si413995.exe PID 3088 wrote to memory of 5832 3088 23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exe si413995.exe PID 3088 wrote to memory of 5832 3088 23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exe si413995.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exe"C:\Users\Admin\AppData\Local\Temp\23a7b7c8bb74526776e5f92faea402ee005dab198c20e21dcb1871aa2004897d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un315234.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un315234.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5200.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5200.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3100 -s 10044⤵
- Program crash
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6207.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6207.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 13844⤵
- Program crash
PID:5728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si413995.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si413995.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5832
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3100 -ip 31001⤵PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4484 -ip 44841⤵PID:2484
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD56b83114458637c7e2c68758343c5dc33
SHA1f2c2a6a7f71d985d00c1975dd963b2ceaf918e2a
SHA256f8f9a1e201b69b9befea5ee0a363bd75ee9be4049e6f74dbdfe6a3e9be1d5a91
SHA5122cd96d88267c2f9e2224692b0784826e9b492bc352e60415eee887773e15e9790d6e53469ed63519a8d21934da19361a489f697952e5af42ec473d576c3b7142
-
Filesize
633KB
MD5d692be9cdbbbdfceb300a0f621f9f56a
SHA18b484eed2fc0379210b7b98d31fda360e8c0f1d9
SHA2564f30f58cfca48c0e82dded08238d1e106db8578b8cd224bc33104b5d176c4ff2
SHA512b8e436a00e69bae3c4330ff1939be25cc842fd01168ef0f153d1f4911d84ef6238101494044ec60965a3b6f33ae670b27bc4b4896f6bddb56b0aaa7a294b3b95
-
Filesize
231KB
MD503aa62341180c43e49f859f1f05f3edd
SHA15c3b18b84125416c8829d55c0a89384cd4cfd9be
SHA256688d5ba8957efa9e86b5848fd97a010bc24a1827c53375d7f40b56b9d3e10b04
SHA51277ffb2bd25e01a38856ac998d68610c3556eaf973bf686c22d56c3402153b6e47bebf9b63b5f5e5a16ae4620c19b1034e7defbd2da17115eda4fb6a8c9545324
-
Filesize
414KB
MD5b2e150f8a33c3e9da124fdd05b46bb88
SHA187304330f33c269daf688d0c2cf9efe50db21dcc
SHA256beed3cdafb2756d92811d01d87d4661439f19cec184a249fa99bd66f4f1eff9b
SHA512eaad747471c732e00635d02fb6c9314c1b759aedba571d5e89330902d53110f927ab84006b0eb6ba0c3d7c48b8dd038b99cd58b7b6ca8e664269f599855a9cc1
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0