Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exe
Resource
win10v2004-20241007-en
General
-
Target
4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exe
-
Size
851KB
-
MD5
b2990f1c699ef180444bd7d4f8b9da52
-
SHA1
72a71d18f550722eff74c9923c49805de3a14818
-
SHA256
4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43
-
SHA512
834c72e9def66323ff000659215d049d3509e957f923e9e061a161ccc0baf4479543be099a2581bf5b3ba610fa90a170ae170321119b56af3c0c1cb958f6f1fa
-
SSDEEP
24576:uyDPWpRCahWZwMXjeoclhydK4Drk4MoA:97WbCahUXdc3AKOk47
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1764-19-0x00000000025A0000-0x00000000025BA000-memory.dmp healer behavioral1/memory/1764-21-0x0000000002900000-0x0000000002918000-memory.dmp healer behavioral1/memory/1764-49-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-47-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-45-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-43-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-41-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-39-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-37-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-35-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-33-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-31-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-29-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-27-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-25-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-23-0x0000000002900000-0x0000000002912000-memory.dmp healer behavioral1/memory/1764-22-0x0000000002900000-0x0000000002912000-memory.dmp healer -
Healer family
-
Processes:
pr926846.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr926846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr926846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr926846.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr926846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr926846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr926846.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3104-2206-0x0000000005770000-0x00000000057A2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5728-2218-0x0000000000B10000-0x0000000000B3E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si433936.exe family_redline behavioral1/memory/2692-2225-0x0000000000E80000-0x0000000000EB0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu868750.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation qu868750.exe -
Executes dropped EXE 5 IoCs
Processes:
un674319.exepr926846.exequ868750.exe1.exesi433936.exepid process 4968 un674319.exe 1764 pr926846.exe 3104 qu868750.exe 5728 1.exe 2692 si433936.exe -
Processes:
pr926846.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr926846.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr926846.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exeun674319.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un674319.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4384 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1400 1764 WerFault.exe pr926846.exe 5792 3104 WerFault.exe qu868750.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu868750.exe1.exesi433936.exe4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exeun674319.exepr926846.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu868750.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si433936.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un674319.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr926846.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr926846.exepid process 1764 pr926846.exe 1764 pr926846.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr926846.exequ868750.exedescription pid process Token: SeDebugPrivilege 1764 pr926846.exe Token: SeDebugPrivilege 3104 qu868750.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exeun674319.exequ868750.exedescription pid process target process PID 4788 wrote to memory of 4968 4788 4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exe un674319.exe PID 4788 wrote to memory of 4968 4788 4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exe un674319.exe PID 4788 wrote to memory of 4968 4788 4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exe un674319.exe PID 4968 wrote to memory of 1764 4968 un674319.exe pr926846.exe PID 4968 wrote to memory of 1764 4968 un674319.exe pr926846.exe PID 4968 wrote to memory of 1764 4968 un674319.exe pr926846.exe PID 4968 wrote to memory of 3104 4968 un674319.exe qu868750.exe PID 4968 wrote to memory of 3104 4968 un674319.exe qu868750.exe PID 4968 wrote to memory of 3104 4968 un674319.exe qu868750.exe PID 3104 wrote to memory of 5728 3104 qu868750.exe 1.exe PID 3104 wrote to memory of 5728 3104 qu868750.exe 1.exe PID 3104 wrote to memory of 5728 3104 qu868750.exe 1.exe PID 4788 wrote to memory of 2692 4788 4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exe si433936.exe PID 4788 wrote to memory of 2692 4788 4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exe si433936.exe PID 4788 wrote to memory of 2692 4788 4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exe si433936.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exe"C:\Users\Admin\AppData\Local\Temp\4858006f16420dee035b3049b5e5b9d44dae1e19a10a4d5e5fee3ebcdab96b43.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un674319.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un674319.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr926846.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr926846.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 10884⤵
- Program crash
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu868750.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu868750.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5728 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 13844⤵
- Program crash
PID:5792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si433936.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si433936.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2692
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1764 -ip 17641⤵PID:2348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3104 -ip 31041⤵PID:5232
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4384
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
697KB
MD5e2471d2b4cc94ca0d550fd200d9f4b8c
SHA174c35562542398a2c75dcc4cb12031f1ac2554e1
SHA256744e0e537e4db94cc7f24131114fae00f949a21d42f59afc838515c6debc25d1
SHA512a20ff8303f2549ca7b57c9a33631eed877035db911e3012c8daf1538e318d80875851a5ffe94cf63aa155a12955f77dbce861b304e7a4d70c675c9c44f21b9ef
-
Filesize
403KB
MD505950832c2d89d8fc0a9bede83778b75
SHA134854d18daac9ab7ee823887b5538eda9370cea6
SHA2561eefd1ba0fe89b1ab326cf0661522dc91e90cfdd1e65d3a73a8c1392429e1442
SHA51264217aa37138725357fbd27929238190cc13f2a9aa3108acbcc81eb2c4ed99a6b077f26f42d0033ba0742ff0d4efaace6b70f913edd32821d1316bb202ecf0b0
-
Filesize
586KB
MD57c2039b7d52b650872ec0ad50233c8e3
SHA1016cd9bd3d41a88ba65f6c43fc3afc98b3c1a31a
SHA2564a5332f63293ee1ba53b074c3bd75f0af8674b28f54910e72af5a8583beb6b00
SHA512741d935a642d97749e8c6ee07d6e3d8822d90ad1b61e7e63557f89d28f5c8f41bcf434bb3b721809acd6c1a55a42d037f755117194374f623049f15823df27d7
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1