Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exe
Resource
win10v2004-20241007-en
General
-
Target
af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exe
-
Size
802KB
-
MD5
1e9fb9fe48c1177246179fce23f828a5
-
SHA1
93360487839feac845c0a39475267ffd5513ed3b
-
SHA256
af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f
-
SHA512
cb44dddabef0649e792bfb13bed72cb4304fb557ade5602101402533a888317cf03d322dd8839dc9a62a8f74a58774690cf59badb7b4a27ba9879dc1badf2333
-
SSDEEP
12288:OMrLy90QgpWGMLej/cDFv8ystBVHfWiOrZIcJy4CwQ4EUVGTz/ojAMaPiGQIdxQ:RyJveADFQHJW9rDbjjX88vod3Q
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2860-19-0x0000000002280000-0x000000000229A000-memory.dmp healer behavioral1/memory/2860-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/2860-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-41-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2860-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pro6945.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6945.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6945.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3912-2143-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5892-2156-0x0000000000AC0000-0x0000000000AF0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085064.exe family_redline behavioral1/memory/2068-2167-0x0000000000AC0000-0x0000000000AEE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu8738.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation qu8738.exe -
Executes dropped EXE 5 IoCs
Processes:
un974925.exepro6945.exequ8738.exe1.exesi085064.exepid process 3512 un974925.exe 2860 pro6945.exe 3912 qu8738.exe 5892 1.exe 2068 si085064.exe -
Processes:
pro6945.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6945.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6945.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un974925.exeaf39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un974925.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4736 2860 WerFault.exe pro6945.exe 700 3912 WerFault.exe qu8738.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro6945.exequ8738.exe1.exesi085064.exeaf39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exeun974925.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6945.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8738.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si085064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un974925.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6945.exepid process 2860 pro6945.exe 2860 pro6945.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6945.exequ8738.exedescription pid process Token: SeDebugPrivilege 2860 pro6945.exe Token: SeDebugPrivilege 3912 qu8738.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exeun974925.exequ8738.exedescription pid process target process PID 4544 wrote to memory of 3512 4544 af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exe un974925.exe PID 4544 wrote to memory of 3512 4544 af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exe un974925.exe PID 4544 wrote to memory of 3512 4544 af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exe un974925.exe PID 3512 wrote to memory of 2860 3512 un974925.exe pro6945.exe PID 3512 wrote to memory of 2860 3512 un974925.exe pro6945.exe PID 3512 wrote to memory of 2860 3512 un974925.exe pro6945.exe PID 3512 wrote to memory of 3912 3512 un974925.exe qu8738.exe PID 3512 wrote to memory of 3912 3512 un974925.exe qu8738.exe PID 3512 wrote to memory of 3912 3512 un974925.exe qu8738.exe PID 3912 wrote to memory of 5892 3912 qu8738.exe 1.exe PID 3912 wrote to memory of 5892 3912 qu8738.exe 1.exe PID 3912 wrote to memory of 5892 3912 qu8738.exe 1.exe PID 4544 wrote to memory of 2068 4544 af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exe si085064.exe PID 4544 wrote to memory of 2068 4544 af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exe si085064.exe PID 4544 wrote to memory of 2068 4544 af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exe si085064.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exe"C:\Users\Admin\AppData\Local\Temp\af39320f314ec78ea1153ccc035908072af0fa701a81b2e84bde9330e1c9d58f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un974925.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un974925.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6945.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6945.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2860 -s 9764⤵
- Program crash
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8738.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8738.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 13804⤵
- Program crash
PID:700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085064.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085064.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2860 -ip 28601⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3912 -ip 39121⤵PID:4972
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD522a1e3d2e41003d816a88f646d897f1d
SHA1001efd432724aebf1f763364eace6919a81c2f97
SHA2561fd448becc1b67e2dd89059a15d294a94a6cb52307c376f946254fec5bad121a
SHA51229b5b1ddb168cef4059515b9aee37db18ac28ee48c0cd6b32ca2efc712452270d712d2a4dfe058d085d41539c36bc4d66557eaca9677cbbbfb8be45aa90fba37
-
Filesize
648KB
MD5177450b5d419027b4ff09d44f75a4d44
SHA1c208b7963e5b58da603fc9153184138ff96dd8a8
SHA25645e8b5cd4df0d6fe968538021b1d167cb45f745886d60ecca3cf7575668aee6e
SHA5125fd1717ccb1c2e3d1535ce39fd96dfbc3b5fcbae82bfdf5cf1133d787ca3a04a5007d3aab63fd5909fb3cf1508dfacd540bfe4816742edc28f21f21f76d9a512
-
Filesize
252KB
MD5e4291a3c7e3aff681ea1bc71d192b9f3
SHA1d02eaf05fe9094226c56b084c4a974498aba1cac
SHA2568c24ac9b19c9b3a291b72f8cac75e91618bc070b51c36bd3e13cd18d4613fa62
SHA512787faaa6b99bca14fb09a97e621316d06b9b94d71109dfd6c0dbbbae84136cf271c793b6980eca5fad5a1a7053947eacebf7d89a89977658e6a65780795d6c21
-
Filesize
435KB
MD59dc42f953d93487ddd6fe9cb2766f1c1
SHA1815ec7bb576f7e211ea50a927152e7bbaf018462
SHA256072b0cfd49b48a18b748992d90239931a2d9e73f2304965a9ba03c4e205a37f3
SHA512543df2fbe5b3bcfe711c4f6479ec797e11c656a41544c49560312e9215f551b8baafecf4b5d6156bc43b3d9d084e18a97c2843d201af69d4cf2d76a451e2b612
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0