Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe
Resource
win10v2004-20241007-en
General
-
Target
98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe
-
Size
789KB
-
MD5
43e43b86b7a8a4075e15a374c7ef298b
-
SHA1
e46190efb99387bc20c1ff9386ec055ba61a1ca7
-
SHA256
98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7
-
SHA512
7bd63e39db4d7573d852f80cca8cbe8678defa8407c8f8405d4e90bef2c00d6e993b12e3181e4c00c16203ae34a10f39762fd0b8bcd6b991a681c9ceb0142347
-
SSDEEP
12288:hMrXy90C7wgZsdpUlI+aLENzJY1AiRkT7fTvA2EiegHXPsrxIwq3Vfo:KyBdZ4cDaGFY1BkT7b9P0xIwqlw
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/5020-19-0x0000000002190000-0x00000000021AA000-memory.dmp healer behavioral1/memory/5020-21-0x0000000002620000-0x0000000002638000-memory.dmp healer behavioral1/memory/5020-45-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-49-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-43-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-41-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-39-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-37-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-35-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-33-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-31-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-29-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-27-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-23-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-22-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-47-0x0000000002620000-0x0000000002632000-memory.dmp healer behavioral1/memory/5020-25-0x0000000002620000-0x0000000002632000-memory.dmp healer -
Healer family
-
Processes:
pro0514.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0514.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/508-2143-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3688-2156-0x00000000002A0000-0x00000000002D0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si432685.exe family_redline behavioral1/memory/3160-2167-0x0000000000740000-0x000000000076E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu9113.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation qu9113.exe -
Executes dropped EXE 5 IoCs
Processes:
un802791.exepro0514.exequ9113.exe1.exesi432685.exepid process 3140 un802791.exe 5020 pro0514.exe 508 qu9113.exe 3688 1.exe 3160 si432685.exe -
Processes:
pro0514.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0514.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0514.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exeun802791.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un802791.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1400 5020 WerFault.exe pro0514.exe 4184 508 WerFault.exe qu9113.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exesi432685.exe98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exeun802791.exepro0514.exequ9113.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si432685.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un802791.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0514.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9113.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0514.exepid process 5020 pro0514.exe 5020 pro0514.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0514.exequ9113.exedescription pid process Token: SeDebugPrivilege 5020 pro0514.exe Token: SeDebugPrivilege 508 qu9113.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exeun802791.exequ9113.exedescription pid process target process PID 2256 wrote to memory of 3140 2256 98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe un802791.exe PID 2256 wrote to memory of 3140 2256 98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe un802791.exe PID 2256 wrote to memory of 3140 2256 98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe un802791.exe PID 3140 wrote to memory of 5020 3140 un802791.exe pro0514.exe PID 3140 wrote to memory of 5020 3140 un802791.exe pro0514.exe PID 3140 wrote to memory of 5020 3140 un802791.exe pro0514.exe PID 3140 wrote to memory of 508 3140 un802791.exe qu9113.exe PID 3140 wrote to memory of 508 3140 un802791.exe qu9113.exe PID 3140 wrote to memory of 508 3140 un802791.exe qu9113.exe PID 508 wrote to memory of 3688 508 qu9113.exe 1.exe PID 508 wrote to memory of 3688 508 qu9113.exe 1.exe PID 508 wrote to memory of 3688 508 qu9113.exe 1.exe PID 2256 wrote to memory of 3160 2256 98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe si432685.exe PID 2256 wrote to memory of 3160 2256 98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe si432685.exe PID 2256 wrote to memory of 3160 2256 98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe si432685.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe"C:\Users\Admin\AppData\Local\Temp\98db8122c5dcf419338fad5fce39c1e3650ed57d69bb09eeadf5a6de8c0fbfb7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un802791.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un802791.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0514.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0514.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5020 -s 10804⤵
- Program crash
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9113.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9113.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 508 -s 13844⤵
- Program crash
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si432685.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si432685.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5020 -ip 50201⤵PID:4996
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 508 -ip 5081⤵PID:3884
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5c53509b87e6fcd36446d675643b2e1ec
SHA12fccffd4a828277427b4b9a67f2ee164b23e87e1
SHA2562c01db534ee59a66ec20bda1f263c6f4efe877e1e87e4cb8d5165ef822006ea3
SHA512c9a176e067b022219ed56097f48b31bbccfd2d9ddbc971c80dcd39cdfb62f00c1cc7fd8cd33c320564ac981df4dc56ff25b4533e781c2364d465fcfa2a3d1328
-
Filesize
635KB
MD5fd564afcce0a47ea8bb176ada3b1b9af
SHA1f8fb42df0c3e24adbf93bad8e9ef902966b2bfb7
SHA256b7d6fab05daaeeb3c1d6076c27333ceac1eaf51f755fe381b176e15e5f1b06cf
SHA5126219854b89f9721dc8783e308da27dfb6e5ef560281a07e95cf274e643a112d2ff7e1e9a2fb45fb989e6c714f34d7bb1aa139e3b7a6a8687131d373e97399e81
-
Filesize
233KB
MD5ab975c7749feeda8e2689936bcca4c5d
SHA19dbc8a362b6c0f37f021373636a2df3088325f8e
SHA256bd0e05fd31d94b97d65a04de0dbfd13449842e0cc11c2cf4ab8d3d30bd48b446
SHA5127afa41cfe41eb0ea47ec1b18206afa3e3cf9016de7744bfb3709d037ccc0dce34618e3aa691e83237905f11eda21f6b8fbcff3498b18c6aa2f36d18aa4f4eace
-
Filesize
417KB
MD519939edad5c78d201ecc2d463b68db43
SHA140361255a7c54351fa914c78ef62e30985b80970
SHA256401fb8129b250d868997d6508a4f1881ad344a454b50d423896612304504111a
SHA512073fa714fa0d640c51ff9219a710124b7f01c3a443d2c1cf016f7f6cf21548534a4fd233d0af6d5ad46c0ac57411dd37286d69159123d00aacd7f14433499d67
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0