Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exe
Resource
win10v2004-20241007-en
General
-
Target
245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exe
-
Size
810KB
-
MD5
96167d45107ca8081b7a8cd3c02e52e3
-
SHA1
6c3540e9197c2504bd22135f2bc966ee93a16bdd
-
SHA256
245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa
-
SHA512
d71fc94b0eab822e00c9ae5f154fdf8f433765e167eba636c767f2654098dd117d5ee67c3aacf2edd02f2dbaeb2fc62f51e684bb2ec907168f0fad2cd693be67
-
SSDEEP
12288:pMr+y905UQm+B2KqxtihAc0n9njXs1IAdWcyMxQKXPwYME:3yYU82KGt/cmiFdxPXYRE
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3420-19-0x00000000021D0000-0x00000000021EA000-memory.dmp healer behavioral1/memory/3420-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/3420-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-42-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3420-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pr701015.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr701015.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr701015.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr701015.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr701015.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr701015.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr701015.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2584-2205-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5756-2218-0x0000000000EB0000-0x0000000000EDE000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si908557.exe family_redline behavioral1/memory/3944-2229-0x0000000000560000-0x0000000000590000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu846095.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation qu846095.exe -
Executes dropped EXE 5 IoCs
Processes:
un170902.exepr701015.exequ846095.exe1.exesi908557.exepid process 1880 un170902.exe 3420 pr701015.exe 2584 qu846095.exe 5756 1.exe 3944 si908557.exe -
Processes:
pr701015.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr701015.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr701015.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exeun170902.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un170902.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2260 3420 WerFault.exe pr701015.exe 4996 2584 WerFault.exe qu846095.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un170902.exepr701015.exequ846095.exe1.exesi908557.exe245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un170902.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr701015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu846095.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si908557.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr701015.exepid process 3420 pr701015.exe 3420 pr701015.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr701015.exequ846095.exedescription pid process Token: SeDebugPrivilege 3420 pr701015.exe Token: SeDebugPrivilege 2584 qu846095.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exeun170902.exequ846095.exedescription pid process target process PID 4476 wrote to memory of 1880 4476 245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exe un170902.exe PID 4476 wrote to memory of 1880 4476 245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exe un170902.exe PID 4476 wrote to memory of 1880 4476 245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exe un170902.exe PID 1880 wrote to memory of 3420 1880 un170902.exe pr701015.exe PID 1880 wrote to memory of 3420 1880 un170902.exe pr701015.exe PID 1880 wrote to memory of 3420 1880 un170902.exe pr701015.exe PID 1880 wrote to memory of 2584 1880 un170902.exe qu846095.exe PID 1880 wrote to memory of 2584 1880 un170902.exe qu846095.exe PID 1880 wrote to memory of 2584 1880 un170902.exe qu846095.exe PID 2584 wrote to memory of 5756 2584 qu846095.exe 1.exe PID 2584 wrote to memory of 5756 2584 qu846095.exe 1.exe PID 2584 wrote to memory of 5756 2584 qu846095.exe 1.exe PID 4476 wrote to memory of 3944 4476 245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exe si908557.exe PID 4476 wrote to memory of 3944 4476 245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exe si908557.exe PID 4476 wrote to memory of 3944 4476 245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exe si908557.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exe"C:\Users\Admin\AppData\Local\Temp\245948cba3ad48d53ecc91db666e71611c04a717d42bb3418423c08fe7bdcbaa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un170902.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un170902.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr701015.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr701015.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 10164⤵
- Program crash
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu846095.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu846095.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5756 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 13844⤵
- Program crash
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si908557.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si908557.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3420 -ip 34201⤵PID:4348
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2584 -ip 25841⤵PID:3996
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
655KB
MD5da3ef2de6d5d7954798d5623049bec87
SHA1bb6eed0cd25903cb80684584cf192a7e9b5ca216
SHA2567c24482c2a3bd8617c03e0b1fdea2e2c04a73d148301806d030b8126f7ac803f
SHA5125c0aead2af1e2bf0671ec5670a963046e9eef29c761c4ab0396a77bd7300a756773ef15b8f52889c4ddecb93a181d99c7750714d04231f4e5d3bc84607c86889
-
Filesize
254KB
MD56326267a12f217e35161bb4f3a31ff15
SHA1d69dc9ea41ed5c035aefa44f6fa1b4e25fc0f6b6
SHA2567f434686032c501d851cdb34397047574a70c33f56abaa1275c418194bbe5611
SHA51225f8469d36fbc137a30a5fd4f8edab01d396b1706dd87ebccce7a187cb51a88c9115d815c660f560da089c5e86663b8c9f792bfcb6b6dd748010325a43f9c500
-
Filesize
438KB
MD5c5f18d88b43072222adb62b545384b35
SHA12ed936cfc541dd14aeab8ea46e2772efccab2b06
SHA2560560d8a23d521118e2c150165213a586e5adf946fca9bbc61aae7b335a0d1c0b
SHA512131527375c69a35cb0207f2015956d57e1def9bb1283570677e1fff1f1c159f004e59dcadcd4a73740e877090a6f9e013eb043a18379d11f9bda3398adc3c94a
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1