Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 12:42
Static task
static1
Behavioral task
behavioral1
Sample
f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exe
Resource
win10v2004-20241007-en
General
-
Target
f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exe
-
Size
787KB
-
MD5
c5f89b453267ce62edb49af2118a85f3
-
SHA1
80c112ae5993c5d3668d182f6800c2ac69b0f704
-
SHA256
f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53
-
SHA512
d34cec8bc6c840dcbdd32204011b36c8e8f442426438a211d3942cd31bc66eecc0a8b54b90c3741b282a05df1a12867ac2dc5014fa4350054ff84ae830e4656b
-
SSDEEP
24576:cykQQdEnjvPYP9JPtq+mu3lIaSxh1+i3g:LFrnU3PhxFSP9
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4588-19-0x00000000021C0000-0x00000000021DA000-memory.dmp healer behavioral1/memory/4588-21-0x0000000004A50000-0x0000000004A68000-memory.dmp healer behavioral1/memory/4588-40-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-49-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-48-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-45-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-43-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-41-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-37-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-35-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-33-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-31-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-27-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-25-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-23-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-22-0x0000000004A50000-0x0000000004A62000-memory.dmp healer behavioral1/memory/4588-29-0x0000000004A50000-0x0000000004A62000-memory.dmp healer -
Healer family
-
Processes:
pro6600.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6600.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6600.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/852-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5244-2156-0x0000000000D70000-0x0000000000DA0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si561838.exe family_redline behavioral1/memory/5396-2167-0x00000000009D0000-0x00000000009FE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu6996.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation qu6996.exe -
Executes dropped EXE 5 IoCs
Processes:
un467620.exepro6600.exequ6996.exe1.exesi561838.exepid process 4544 un467620.exe 4588 pro6600.exe 852 qu6996.exe 5244 1.exe 5396 si561838.exe -
Processes:
pro6600.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6600.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6600.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exeun467620.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un467620.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4240 4588 WerFault.exe pro6600.exe 5476 852 WerFault.exe qu6996.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu6996.exe1.exesi561838.exef608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exeun467620.exepro6600.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6996.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si561838.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un467620.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6600.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6600.exepid process 4588 pro6600.exe 4588 pro6600.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6600.exequ6996.exedescription pid process Token: SeDebugPrivilege 4588 pro6600.exe Token: SeDebugPrivilege 852 qu6996.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exeun467620.exequ6996.exedescription pid process target process PID 3856 wrote to memory of 4544 3856 f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exe un467620.exe PID 3856 wrote to memory of 4544 3856 f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exe un467620.exe PID 3856 wrote to memory of 4544 3856 f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exe un467620.exe PID 4544 wrote to memory of 4588 4544 un467620.exe pro6600.exe PID 4544 wrote to memory of 4588 4544 un467620.exe pro6600.exe PID 4544 wrote to memory of 4588 4544 un467620.exe pro6600.exe PID 4544 wrote to memory of 852 4544 un467620.exe qu6996.exe PID 4544 wrote to memory of 852 4544 un467620.exe qu6996.exe PID 4544 wrote to memory of 852 4544 un467620.exe qu6996.exe PID 852 wrote to memory of 5244 852 qu6996.exe 1.exe PID 852 wrote to memory of 5244 852 qu6996.exe 1.exe PID 852 wrote to memory of 5244 852 qu6996.exe 1.exe PID 3856 wrote to memory of 5396 3856 f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exe si561838.exe PID 3856 wrote to memory of 5396 3856 f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exe si561838.exe PID 3856 wrote to memory of 5396 3856 f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exe si561838.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exe"C:\Users\Admin\AppData\Local\Temp\f608f05ba93b913e81331fc522190cb5556234d3c8da8522771bc44e9dc1fb53.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un467620.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un467620.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6600.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6600.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 10804⤵
- Program crash
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6996.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6996.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5244 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 13804⤵
- Program crash
PID:5476 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si561838.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si561838.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4588 -ip 45881⤵PID:2568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 852 -ip 8521⤵PID:5332
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD59b6ce727a1c93286f3f4e86da770907e
SHA1e5e27857b53c481db6b72ac7061665cf099d905c
SHA2569ed83eaa0ffc7543b9611eb1a4f907c8f71f273369e4d846898b9f56c2a3d709
SHA5120c314b95011fcfe54ff58b010506b1d9898510c919ceee94740635c88901712b215c5fa4e5e62b72787bf93f5d077bf2f96deff029de15982b3ab97d84c259c4
-
Filesize
633KB
MD5aa3e58296faa4886e8fb6f99ae9523a6
SHA18e98b9d7a4ad15db1bee9865413d49f390b7875c
SHA25610cd28518da72bd3d88eed75e255451fd1d1b1339f06ac6891776c043398cdf1
SHA512ae132cd787cd7cacec70764a830d71f41474934d03cda52810cf4b21d7888539fba29658d5aa57690f094eaa6e8771d6d2df7628e4a6d82d170ca1fe328245d5
-
Filesize
230KB
MD52441c12681999f5baa59788e0068b756
SHA18506b62bc4901ab73d387aadeb8b316581f10f08
SHA256c1fb8cf53b06314a43172c620129ede44fd575b0fc5f41c45fdcaf709f4a7f46
SHA512c840b85be4ce11b801b55ba384a13fab4b11e07d887ac76858a86aba71c299b58f90d1e4160875395f66a61eed9dbfa5108ab5bb8f700ff226201449fbd64693
-
Filesize
414KB
MD5c1ccb9d2456b35cb18a6fb3641989f0f
SHA13ce3c148284d016dc41f97ccffba50828801087a
SHA256e1337740e6cff89bf165bbd1f857bf7065acaaa53e258d85f819d8ac8b4ae8cb
SHA512baccffdcfa4a8b27753760b0c5b8fcfb8b349dd05d9a5f435d62969a3410011e49196d610cd57b69d947a56852a71ed536538967f6ab34e14c5c09277374cec5
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0