Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 11:07
Static task
static1
Behavioral task
behavioral1
Sample
58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exe
Resource
win10v2004-20241007-en
General
-
Target
58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exe
-
Size
814KB
-
MD5
d4d6d198f6009c1719f85f40ae2ae5db
-
SHA1
071e1ae0ef8a6c82b99cebafa29afaaeb631bf73
-
SHA256
58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146
-
SHA512
b24aa72f1d82d8e8886d205589cc1e9602563f878dbe6a5836660b3522f22c208e6045361da8dd38c2d85b10fffcdb58add74a5c4df0f6e05abd21e35aebf699
-
SSDEEP
12288:PMr4y90fv1sbZQtKQ8clh9+NC2WUzxLK7GaYxNyfaJLX+3uMHxbXiLO1xtiJX4yo:LyWv1sbKph9Y9H5K7GrLyukFbDwJXJo
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4712-19-0x0000000002880000-0x000000000289A000-memory.dmp healer behavioral1/memory/4712-21-0x0000000005370000-0x0000000005388000-memory.dmp healer behavioral1/memory/4712-23-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-49-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-47-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-46-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-43-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-41-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-39-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-37-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-35-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-33-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-31-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-30-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-27-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-25-0x0000000005370000-0x0000000005382000-memory.dmp healer behavioral1/memory/4712-22-0x0000000005370000-0x0000000005382000-memory.dmp healer -
Healer family
-
Processes:
pro4017.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4017.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4017.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4140-2142-0x0000000005760000-0x0000000005792000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/624-2155-0x0000000000AE0000-0x0000000000B10000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si670381.exe family_redline behavioral1/memory/4704-2166-0x0000000000010000-0x000000000003E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu6350.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation qu6350.exe -
Executes dropped EXE 5 IoCs
Processes:
un138356.exepro4017.exequ6350.exe1.exesi670381.exepid process 4352 un138356.exe 4712 pro4017.exe 4140 qu6350.exe 624 1.exe 4704 si670381.exe -
Processes:
pro4017.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4017.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4017.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exeun138356.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un138356.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3684 4712 WerFault.exe pro4017.exe 3932 4140 WerFault.exe qu6350.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exeun138356.exepro4017.exequ6350.exe1.exesi670381.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un138356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4017.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6350.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si670381.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4017.exepid process 4712 pro4017.exe 4712 pro4017.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4017.exequ6350.exedescription pid process Token: SeDebugPrivilege 4712 pro4017.exe Token: SeDebugPrivilege 4140 qu6350.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exeun138356.exequ6350.exedescription pid process target process PID 4804 wrote to memory of 4352 4804 58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exe un138356.exe PID 4804 wrote to memory of 4352 4804 58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exe un138356.exe PID 4804 wrote to memory of 4352 4804 58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exe un138356.exe PID 4352 wrote to memory of 4712 4352 un138356.exe pro4017.exe PID 4352 wrote to memory of 4712 4352 un138356.exe pro4017.exe PID 4352 wrote to memory of 4712 4352 un138356.exe pro4017.exe PID 4352 wrote to memory of 4140 4352 un138356.exe qu6350.exe PID 4352 wrote to memory of 4140 4352 un138356.exe qu6350.exe PID 4352 wrote to memory of 4140 4352 un138356.exe qu6350.exe PID 4140 wrote to memory of 624 4140 qu6350.exe 1.exe PID 4140 wrote to memory of 624 4140 qu6350.exe 1.exe PID 4140 wrote to memory of 624 4140 qu6350.exe 1.exe PID 4804 wrote to memory of 4704 4804 58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exe si670381.exe PID 4804 wrote to memory of 4704 4804 58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exe si670381.exe PID 4804 wrote to memory of 4704 4804 58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exe si670381.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exe"C:\Users\Admin\AppData\Local\Temp\58db4380024a691da8b5befb09a75fef6bbb8a1fb6a8c7f0e9c3918acd4a4146.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un138356.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un138356.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4017.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4017.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 10404⤵
- Program crash
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6350.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6350.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 15244⤵
- Program crash
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si670381.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si670381.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4704
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4712 -ip 47121⤵PID:3840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4140 -ip 41401⤵PID:3616
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD576042d39bdea9de2e5b723029cb83dc1
SHA1b9059afc474a879fb0fa1338c8c728200eb219ce
SHA25691b76d4e540bd24f5cf9dbe7bce90022cb71fb0734dc2d28b43f7fd06ce3ba84
SHA512edd9c5c0674e1ff2adf7889faa849e2eb7ef39075d62a809b57716df3f09fd49004f7e6af41abc1b24aeaee415c20759de5d9a1f3ad0a4cef278eb8b4355a14c
-
Filesize
660KB
MD575d6f3529eb19fb9c126eb6d4fbdf800
SHA168ee52a8cf8d52fadbd762fa39922cad83628d09
SHA256b26cdc841c5a15bc69df33c792b2882a39bd0c5050618bf672e0c85923e72f12
SHA5128dca4ed9f519bddb91d853c1ac218789b2f17227eaea51dece3266a0390e2058dcaf6ae96fb09f39ff043798278b0e43e427ed1ac500b4eb81a1b89feb6f5f4a
-
Filesize
312KB
MD569d2a67d87c47d5eef7dbbca5b627a6c
SHA15d9d0abc2aca282a7aa34139da187bf38878de95
SHA256de0c72f80a8310058245b0087a298da2f8f670f795ebf719b30f4a28af6b5088
SHA51247993ed1dd0539b65c8a6c12173f808788c0de589d1586d161ba9d5d089d80b14c42f99c5908e437d8e9d71f2935ff3c3b0867dfb911a724e4d2572833d7beb8
-
Filesize
495KB
MD55e22ea4aec494caa99e8baba3678bc0b
SHA1a5e40572ebf240de47994e5141b9a3082d326957
SHA25684e553464f853b61d0e522298f7876e5455238a2eb1e34f0fcf8ae53af76e173
SHA512ed77a9ba7ee2c49b8312249805ecedc79becf7baa4069e7cfe35e3696244fec3fa8e34cb281777145a136c5f924578dabf83b203cbf9206f8c90b1aa0a296e26
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0