Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 13:16
Static task
static1
Behavioral task
behavioral1
Sample
61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exe
Resource
win10v2004-20241007-en
General
-
Target
61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exe
-
Size
815KB
-
MD5
28f355f504649036a815450774c5d6a4
-
SHA1
909eeaae96019fcbc98328e3cdb2794757ba8b46
-
SHA256
61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a
-
SHA512
6a9e09b5bea863ee0738d5af879ce255897dae17427bb3a73e630a7545544efa2c2f7dc186f9a6de528571227af5984cb058dbfc8fe45bf2eb35c72b805ba942
-
SSDEEP
12288:IMrUy90Wa8RQEr9hKuOw0plci4466eT7y8q2k2ASv8vGrSD3Bvd5uFLgQc/O:syW8WsKFnX4h6e692EIlCx1SgF/O
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4276-19-0x00000000029D0000-0x00000000029EA000-memory.dmp healer behavioral1/memory/4276-21-0x0000000004EE0000-0x0000000004EF8000-memory.dmp healer behavioral1/memory/4276-27-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-49-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-47-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-45-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-43-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-41-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-39-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-37-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-35-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-33-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-31-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-29-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-25-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-23-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer behavioral1/memory/4276-22-0x0000000004EE0000-0x0000000004EF2000-memory.dmp healer -
Healer family
-
Processes:
pro7220.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7220.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7220.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2388-2143-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5592-2156-0x0000000000350000-0x0000000000380000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si095394.exe family_redline behavioral1/memory/5948-2166-0x0000000000030000-0x000000000005E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu0488.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu0488.exe -
Executes dropped EXE 5 IoCs
Processes:
un717421.exepro7220.exequ0488.exe1.exesi095394.exepid process 1624 un717421.exe 4276 pro7220.exe 2388 qu0488.exe 5592 1.exe 5948 si095394.exe -
Processes:
pro7220.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7220.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exeun717421.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un717421.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1728 4276 WerFault.exe pro7220.exe 5804 2388 WerFault.exe qu0488.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exeun717421.exepro7220.exequ0488.exe1.exesi095394.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un717421.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si095394.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7220.exepid process 4276 pro7220.exe 4276 pro7220.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7220.exequ0488.exedescription pid process Token: SeDebugPrivilege 4276 pro7220.exe Token: SeDebugPrivilege 2388 qu0488.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exeun717421.exequ0488.exedescription pid process target process PID 4180 wrote to memory of 1624 4180 61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exe un717421.exe PID 4180 wrote to memory of 1624 4180 61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exe un717421.exe PID 4180 wrote to memory of 1624 4180 61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exe un717421.exe PID 1624 wrote to memory of 4276 1624 un717421.exe pro7220.exe PID 1624 wrote to memory of 4276 1624 un717421.exe pro7220.exe PID 1624 wrote to memory of 4276 1624 un717421.exe pro7220.exe PID 1624 wrote to memory of 2388 1624 un717421.exe qu0488.exe PID 1624 wrote to memory of 2388 1624 un717421.exe qu0488.exe PID 1624 wrote to memory of 2388 1624 un717421.exe qu0488.exe PID 2388 wrote to memory of 5592 2388 qu0488.exe 1.exe PID 2388 wrote to memory of 5592 2388 qu0488.exe 1.exe PID 2388 wrote to memory of 5592 2388 qu0488.exe 1.exe PID 4180 wrote to memory of 5948 4180 61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exe si095394.exe PID 4180 wrote to memory of 5948 4180 61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exe si095394.exe PID 4180 wrote to memory of 5948 4180 61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exe si095394.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exe"C:\Users\Admin\AppData\Local\Temp\61b6a3bdbc1ad83f49e4cbe312c3d1d491539c5655fec13d89c8d7f3a155de0a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un717421.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un717421.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7220.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7220.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4276 -s 10204⤵
- Program crash
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0488.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0488.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 13804⤵
- Program crash
PID:5804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si095394.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si095394.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4276 -ip 42761⤵PID:4640
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2388 -ip 23881⤵PID:5692
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD54ce53a82e430cd4a4d10d5c337de4f97
SHA1510031905785099eb36825ae6f3cd57b1617cc90
SHA2562c486186f7c51b5bfeaff5a5e2caba151809ae7a91fb7352c2bf4f4eaf3534f4
SHA512507f01b325edcb65184868e1819693476bebe9320f0a08a52d3f1394b8ea244a56cf5986068f43f0949818d0e0a6512d7ff03bfc73a30dae7e8717f841208133
-
Filesize
661KB
MD5aae5c21513d4dfcda45cf4cb8069234a
SHA177ececd7e2120c318b9c4dfa96567bc8649a27a4
SHA25675110b6ca6bb8fccc3d6aff48839de2aa7141dac931e1089ac5e861cef82c9e1
SHA5121fb6672e6722cc26aab0658b0385c45a301505880d4e1c50d17168934a69cc9090624ecc7fc7f1c79b251605d5a9dd865d3046a4a038af38ca60927d7e1dd077
-
Filesize
332KB
MD57251448f0eb8ecd6cdb8e8427689dcf3
SHA1f511fac726a0fc5e157f9e7acb51a6d297e15d5a
SHA256433882ac6aad87f3aea51dfd03160603d7937ce3a6ebf99dfbd354e5e074620e
SHA512812d584affffcd94b1361e4b11b89b53d2b47cafef3f0fccac12b8d7f2cf97a6fa1d12aced4774ff512594f6261e0a7c93a7c58b5834fb40f12ddf595928493f
-
Filesize
495KB
MD55d24051ca327289885fb61305ecff49f
SHA1ce012d37f378a2fe3467ca0bf2d01c9d6650dfa0
SHA256ab1083f48300431ddce26113979a829173d9b1f575524dc946b95ca4b0b42b79
SHA5128f406f20ec63ad949c2e7f991649005638beb3f33bbc438604e45ed51e96a5ff83d8fc42c13f9981d1baa368ec8e79f82269204608904a2f240c29818478a392
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0