Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 11:10
Static task
static1
Behavioral task
behavioral1
Sample
2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe
Resource
win10v2004-20241007-en
General
-
Target
2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe
-
Size
789KB
-
MD5
4327812aac9190829522bd9cc8266224
-
SHA1
7f25219633668fc8f4b1059ccaaa9fd4a08b6ea1
-
SHA256
2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4
-
SHA512
3112bb80639f47aa7ee9040bf6dfc7b5ff3cfb73e68b58264a2f95953b645447d0327392fe4af80b5811e73444ac4dd9ab815965df4326c2c9e37f9af41d932f
-
SSDEEP
24576:1yktRJYogMkfMPdtaepgtOPyHIkTWO4P:QgnYZ5k8ztHA
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1632-19-0x00000000024B0000-0x00000000024CA000-memory.dmp healer behavioral1/memory/1632-21-0x0000000004A50000-0x0000000004A68000-memory.dmp healer behavioral1/memory/1632-49-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-47-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-45-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-43-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-41-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-39-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-37-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-36-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-33-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-31-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-29-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-27-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-25-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-23-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/1632-22-0x0000000004A50000-0x0000000004A62000-memory.dmp healer -
Healer family
-
Processes:
pro7897.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7897.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7897.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1664-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5284-2155-0x00000000005E0000-0x0000000000610000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si796156.exe family_redline behavioral1/memory/4992-2166-0x00000000002C0000-0x00000000002EE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7173.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation qu7173.exe -
Executes dropped EXE 5 IoCs
Processes:
un136953.exepro7897.exequ7173.exe1.exesi796156.exepid process 1096 un136953.exe 1632 pro7897.exe 1664 qu7173.exe 5284 1.exe 4992 si796156.exe -
Processes:
pro7897.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7897.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7897.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exeun136953.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un136953.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 740 1632 WerFault.exe pro7897.exe 2604 1664 WerFault.exe qu7173.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exeun136953.exepro7897.exequ7173.exe1.exesi796156.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un136953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7897.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7173.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si796156.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7897.exepid process 1632 pro7897.exe 1632 pro7897.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7897.exequ7173.exedescription pid process Token: SeDebugPrivilege 1632 pro7897.exe Token: SeDebugPrivilege 1664 qu7173.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exeun136953.exequ7173.exedescription pid process target process PID 3724 wrote to memory of 1096 3724 2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe un136953.exe PID 3724 wrote to memory of 1096 3724 2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe un136953.exe PID 3724 wrote to memory of 1096 3724 2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe un136953.exe PID 1096 wrote to memory of 1632 1096 un136953.exe pro7897.exe PID 1096 wrote to memory of 1632 1096 un136953.exe pro7897.exe PID 1096 wrote to memory of 1632 1096 un136953.exe pro7897.exe PID 1096 wrote to memory of 1664 1096 un136953.exe qu7173.exe PID 1096 wrote to memory of 1664 1096 un136953.exe qu7173.exe PID 1096 wrote to memory of 1664 1096 un136953.exe qu7173.exe PID 1664 wrote to memory of 5284 1664 qu7173.exe 1.exe PID 1664 wrote to memory of 5284 1664 qu7173.exe 1.exe PID 1664 wrote to memory of 5284 1664 qu7173.exe 1.exe PID 3724 wrote to memory of 4992 3724 2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe si796156.exe PID 3724 wrote to memory of 4992 3724 2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe si796156.exe PID 3724 wrote to memory of 4992 3724 2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe si796156.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe"C:\Users\Admin\AppData\Local\Temp\2acea59f0c5c5e4d364d6e0c6ebcf84063b7566a64ada6b6abcacce2088c89d4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136953.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un136953.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7897.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7897.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 10804⤵
- Program crash
PID:740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7173.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7173.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 15284⤵
- Program crash
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si796156.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si796156.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4992
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1632 -ip 16321⤵PID:640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 1664 -ip 16641⤵PID:5152
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5b9f5cccd8a9c49e8df74f482697c50fd
SHA107360a70431cbb5b25b2a5d0421f23505ccbf120
SHA256970a4845526a71573fb03092c778d1820dda4b5f4a40a595029197e2062616e2
SHA5128cfe637248e9a7b5fdf34404b5a10dee649971246c4460ce2a939cd8e7ef9c3d62179e191f95a5e2b2e1849bcbcc7658a0949207a91344be8db5036a9abb16e4
-
Filesize
635KB
MD59fe19bbe67d76c59d91ae8ea59d46710
SHA17c53f6e09f8d5534deac56864d111be4ab780ba6
SHA25686febf27992c1165b8d912239012f68662779940aeba580890a1f47cd854233c
SHA512b9dfbf00bae7c06364277ecb0bf74c40ecf0450b8be05b1ad8e49f520c51d88beba7c69030ae9e59641f1f317261f69710c2e41be1ecc124598a962e04d162d8
-
Filesize
233KB
MD54ee57dc55bfd696cc6a693c3fab76e28
SHA1f2bda54425e95a07dba8d0086d72f72cea57d0e9
SHA2560b4791c9c1484d2f9ad55854e40f19dd5b4e81b91c8769a9fe9ab07317ad61f8
SHA51209ebeeb5b27d4fce3177ec674350999a35198bbd1f1b418e6cbbe6ae44059279f99353f7b49604205e5e84e88232697243e07d3186764556ac7c90aa61cca56c
-
Filesize
417KB
MD587dc680842d066e24377da37cac7139a
SHA141a78ec0fc53d7b6c7389cbd111e229a5d71196d
SHA2568299d3a27c097cc7bcc5e4d17895a07e657786989144cb25c601b1adefd4eb15
SHA51220e9cb2d8cb698f6f14e87675da3721ed7bedacebb8b6d68bd9ede6c301802bf22ec2604c33043c085c51da55fc5b533588d8fded3c5ba49870f741eadd9ca1e
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0