Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exe
Resource
win10v2004-20241007-en
General
-
Target
4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exe
-
Size
787KB
-
MD5
bd707d965c65e18e67c21262307fde9f
-
SHA1
7844e915ad9e6bb10c74f3cda6cf4f5fb0140344
-
SHA256
4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a
-
SHA512
846796c3f27733561b8c07e133c485f4b5736a0faea11f4df716abf41f81168cd4f2b0d2a3b8751c32fb8ce9b338f8ab22e56e3d091f9bde4a3979a6044acba6
-
SSDEEP
24576:zym9GlwT9iUmjke8QqvgcDSWo/FJ1XcnJmUqMzZD:GJCT/m5PqvguuNjcmUq
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3724-19-0x00000000023C0000-0x00000000023DA000-memory.dmp healer behavioral1/memory/3724-21-0x0000000004A50000-0x0000000004A68000-memory.dmp healer behavioral1/memory/3724-36-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-49-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-47-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-45-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-43-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-41-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-39-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-38-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-33-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-32-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-29-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-27-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-25-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-23-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/3724-22-0x0000000004A50000-0x0000000004A62000-memory.dmp healer -
Healer family
-
Processes:
pro0244.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0244.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0244.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/972-2142-0x0000000005420000-0x0000000005452000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5516-2155-0x0000000000620000-0x0000000000650000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si182155.exe family_redline behavioral1/memory/5640-2166-0x00000000004D0000-0x00000000004FE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu9716.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu9716.exe -
Executes dropped EXE 5 IoCs
Processes:
un923704.exepro0244.exequ9716.exe1.exesi182155.exepid process 1148 un923704.exe 3724 pro0244.exe 972 qu9716.exe 5516 1.exe 5640 si182155.exe -
Processes:
pro0244.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0244.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0244.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exeun923704.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un923704.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 516 3724 WerFault.exe pro0244.exe 5592 972 WerFault.exe qu9716.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exesi182155.exe4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exeun923704.exepro0244.exequ9716.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si182155.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un923704.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0244.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9716.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0244.exepid process 3724 pro0244.exe 3724 pro0244.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0244.exequ9716.exedescription pid process Token: SeDebugPrivilege 3724 pro0244.exe Token: SeDebugPrivilege 972 qu9716.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exeun923704.exequ9716.exedescription pid process target process PID 4332 wrote to memory of 1148 4332 4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exe un923704.exe PID 4332 wrote to memory of 1148 4332 4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exe un923704.exe PID 4332 wrote to memory of 1148 4332 4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exe un923704.exe PID 1148 wrote to memory of 3724 1148 un923704.exe pro0244.exe PID 1148 wrote to memory of 3724 1148 un923704.exe pro0244.exe PID 1148 wrote to memory of 3724 1148 un923704.exe pro0244.exe PID 1148 wrote to memory of 972 1148 un923704.exe qu9716.exe PID 1148 wrote to memory of 972 1148 un923704.exe qu9716.exe PID 1148 wrote to memory of 972 1148 un923704.exe qu9716.exe PID 972 wrote to memory of 5516 972 qu9716.exe 1.exe PID 972 wrote to memory of 5516 972 qu9716.exe 1.exe PID 972 wrote to memory of 5516 972 qu9716.exe 1.exe PID 4332 wrote to memory of 5640 4332 4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exe si182155.exe PID 4332 wrote to memory of 5640 4332 4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exe si182155.exe PID 4332 wrote to memory of 5640 4332 4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exe si182155.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exe"C:\Users\Admin\AppData\Local\Temp\4f8259fdae30dc2585cf1204a821f77602831064e8c4d8f52ae71609eb48c13a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923704.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923704.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0244.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0244.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3724 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 10884⤵
- Program crash
PID:516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9716.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9716.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 13764⤵
- Program crash
PID:5592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si182155.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si182155.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3724 -ip 37241⤵PID:1264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 972 -ip 9721⤵PID:5544
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5705c02f4a8d43230476adf18db7c2a12
SHA1103d79b3da379459f92460c8fcbe50afd7fb100b
SHA2560367e888523aa4ba43f0a1baaf1ebbca0faa31736ec5f8ca4744e49d6a59ba5d
SHA51269d8ab18d92a7f98aa63d0b3c56abe1a750832d12200f82da7617de2fd0b4ac9c3ccd46f0f425053f87bb0608d6ec9322621bd04a91088fa9c8b1264124b76e6
-
Filesize
633KB
MD570e509ff4c09de4c587a5590d28df352
SHA122d75911caa2280af142301996bf12fa26ccfa28
SHA2565e087e2b48defba1038b35ae12ecff5acad79776919af150062509681c21c812
SHA51284dcd74061bc4d3baab78c0b395eb7056eb0c45feed1e2760a51c36176155273f02bd14b43ab5fb7f1677d6bf0bc95d03213971b972a1e46a73bb228771572ab
-
Filesize
231KB
MD50b21c1193791ba52e008bdf2bad2eddd
SHA1ecba3e01562a9d2dc82d4955207be0e3b83e8642
SHA256520a797666d209cb6cf6dde155584034ccc6e6a75a8f99eec051f95e10fa8757
SHA51284528d952047ac31a8dec961f0604a8b0714c7395c92f8adadcd829e096899fbff516ffe417d475c031e9eb367ca2907cc3f5ffad02851179080ab9d196145f5
-
Filesize
414KB
MD5ffef7dea5663b786ef036773fb4dffb2
SHA135e3b0310edeba0c5b1553d34b8e14bb53f6dd88
SHA256a3f0906bcfe70e085709bfb6d9f525e315c7361335c82b191c5006356473e0fa
SHA512e6416362c80fec7dd1da47c87fdb5cec4917d2a9244fb6cc5dcfb9b4713a1c23b38e0af23c2103d75f59f048cb186c573ca7ab75487d8a2136add88c7f07859d
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0