Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 11:42
Static task
static1
Behavioral task
behavioral1
Sample
46f9f644ec11f746552e12d5e5ef7b874d6fdbcd5381ae1752a6ba5b3eed3962.exe
Resource
win10v2004-20241007-en
General
-
Target
46f9f644ec11f746552e12d5e5ef7b874d6fdbcd5381ae1752a6ba5b3eed3962.exe
-
Size
991KB
-
MD5
03bb373e9c9c9e5dd00eba4ef9f1fe6c
-
SHA1
68926ef612d0d8f1b2cc60f5ab71c64e94b9a584
-
SHA256
46f9f644ec11f746552e12d5e5ef7b874d6fdbcd5381ae1752a6ba5b3eed3962
-
SHA512
f2da74fe13cf62d8bafe99e3fcd155261a2a861f01f744db2f0e04e12e1bd0c85a18226a141097a9d94b7cba4970abe189ebd08a27a389c90728f010c27dfd57
-
SSDEEP
12288:nMray904XhZMbgx1UGHvF19+d2kCSBn9ttrPDAPFv8XW7osNxehH1Gdv9BlhYvk+:hyKE1Fx+kkB58PFvFXA1GdbYR
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2056-25-0x0000000002340000-0x000000000235A000-memory.dmp healer behavioral1/memory/2056-27-0x00000000025F0000-0x0000000002608000-memory.dmp healer behavioral1/memory/2056-49-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-55-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-53-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-52-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-45-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-43-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-41-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-39-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-37-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-35-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-31-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-28-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-47-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-33-0x00000000025F0000-0x0000000002602000-memory.dmp healer behavioral1/memory/2056-29-0x00000000025F0000-0x0000000002602000-memory.dmp healer -
Healer family
-
Processes:
pr244677.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr244677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr244677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr244677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr244677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr244677.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr244677.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2948-2210-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2356-2223-0x0000000000BB0000-0x0000000000BDE000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk661170.exe family_redline behavioral1/memory/5964-2234-0x00000000005E0000-0x0000000000610000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu608580.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation qu608580.exe -
Executes dropped EXE 6 IoCs
Processes:
un401268.exeun668662.exepr244677.exequ608580.exe1.exerk661170.exepid process 1388 un401268.exe 3044 un668662.exe 2056 pr244677.exe 2948 qu608580.exe 2356 1.exe 5964 rk661170.exe -
Processes:
pr244677.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr244677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr244677.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
46f9f644ec11f746552e12d5e5ef7b874d6fdbcd5381ae1752a6ba5b3eed3962.exeun401268.exeun668662.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 46f9f644ec11f746552e12d5e5ef7b874d6fdbcd5381ae1752a6ba5b3eed3962.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un401268.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un668662.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2036 2056 WerFault.exe pr244677.exe 1256 2948 WerFault.exe qu608580.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
46f9f644ec11f746552e12d5e5ef7b874d6fdbcd5381ae1752a6ba5b3eed3962.exeun401268.exeun668662.exepr244677.exequ608580.exe1.exerk661170.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46f9f644ec11f746552e12d5e5ef7b874d6fdbcd5381ae1752a6ba5b3eed3962.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un401268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un668662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr244677.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu608580.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk661170.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr244677.exepid process 2056 pr244677.exe 2056 pr244677.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr244677.exequ608580.exedescription pid process Token: SeDebugPrivilege 2056 pr244677.exe Token: SeDebugPrivilege 2948 qu608580.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
46f9f644ec11f746552e12d5e5ef7b874d6fdbcd5381ae1752a6ba5b3eed3962.exeun401268.exeun668662.exequ608580.exedescription pid process target process PID 1752 wrote to memory of 1388 1752 46f9f644ec11f746552e12d5e5ef7b874d6fdbcd5381ae1752a6ba5b3eed3962.exe un401268.exe PID 1752 wrote to memory of 1388 1752 46f9f644ec11f746552e12d5e5ef7b874d6fdbcd5381ae1752a6ba5b3eed3962.exe un401268.exe PID 1752 wrote to memory of 1388 1752 46f9f644ec11f746552e12d5e5ef7b874d6fdbcd5381ae1752a6ba5b3eed3962.exe un401268.exe PID 1388 wrote to memory of 3044 1388 un401268.exe un668662.exe PID 1388 wrote to memory of 3044 1388 un401268.exe un668662.exe PID 1388 wrote to memory of 3044 1388 un401268.exe un668662.exe PID 3044 wrote to memory of 2056 3044 un668662.exe pr244677.exe PID 3044 wrote to memory of 2056 3044 un668662.exe pr244677.exe PID 3044 wrote to memory of 2056 3044 un668662.exe pr244677.exe PID 3044 wrote to memory of 2948 3044 un668662.exe qu608580.exe PID 3044 wrote to memory of 2948 3044 un668662.exe qu608580.exe PID 3044 wrote to memory of 2948 3044 un668662.exe qu608580.exe PID 2948 wrote to memory of 2356 2948 qu608580.exe 1.exe PID 2948 wrote to memory of 2356 2948 qu608580.exe 1.exe PID 2948 wrote to memory of 2356 2948 qu608580.exe 1.exe PID 1388 wrote to memory of 5964 1388 un401268.exe rk661170.exe PID 1388 wrote to memory of 5964 1388 un401268.exe rk661170.exe PID 1388 wrote to memory of 5964 1388 un401268.exe rk661170.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46f9f644ec11f746552e12d5e5ef7b874d6fdbcd5381ae1752a6ba5b3eed3962.exe"C:\Users\Admin\AppData\Local\Temp\46f9f644ec11f746552e12d5e5ef7b874d6fdbcd5381ae1752a6ba5b3eed3962.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un401268.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un401268.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un668662.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un668662.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr244677.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr244677.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 11085⤵
- Program crash
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu608580.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu608580.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 15245⤵
- Program crash
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk661170.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk661170.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5964
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2056 -ip 20561⤵PID:3008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2948 -ip 29481⤵PID:4720
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
808KB
MD560832e1da11414350bca5770e64a4594
SHA10d7e72fe7ae2becf47cf25a064e43d2bb60d310f
SHA2569dbd092d6dc8be8d516491f45717d519f4ad2807e95d255d8b2ccbe2c974ef66
SHA512a93208c12afbba64e06c7aef68da90d06e5cb3d1ec530361f60ebdddf7a62e0341b0e65ebd153cfa4ac1b02a667353510c5c66f08a0a7aa65fb6f9bb4caf8af9
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
655KB
MD544c56f136bfb308ff5d8c01db869aa28
SHA150532dc5f6d1438edbc55928f7fa14fc98d2f4c5
SHA2565adaeeb68773d00d4a773abd3b9ce5f89b0717c55959d0e3f8bc264f728b1aa7
SHA512baea098fe643606986aa47ca846b57c8201de177c7c1e6360c88be12d48b3bb13351753440fd6a532bfafb766ee74807cea7fd336a83401fc35d5e94915a5d43
-
Filesize
255KB
MD5373e871ecbe3200301111cf95190f06f
SHA1367701177da45c68abaa65ecff17637907af972d
SHA25673ff140362e15c11e43d12a0dc4b4f8cb147e080d1caf0ee80510ed1881aae45
SHA512672576324c07bfd4e5cfeb389ba888309bd57325603a90bacce9e5ef90b4affc2c7be773e731dee5785fc7c0c9c2aefdadb492b1953de87404e6aeaf420bf217
-
Filesize
438KB
MD55e6e15ce7b7a2eb4c29df9cb98a9481d
SHA1fedf1536e3a704a51eb06e15d0a22a105c04a4c4
SHA25678072bfe2a0c54668aa7450722a810cd14bf6726755fd047aa4b8096ec8d8fa4
SHA51269525f6c6baa685a573faf048fc7959c68c53eaed6aceda4d3b221602741b1a243ee2ca30855deecf7df0c3986348496fa614b9cc7446c7238bcf857cdb25808
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1