Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
ab4857e1748bb7cf0f2b26d33ec7bbba379696a332c895f6fe33b1f6111bc811.exe
Resource
win10v2004-20241007-en
General
-
Target
ab4857e1748bb7cf0f2b26d33ec7bbba379696a332c895f6fe33b1f6111bc811.exe
-
Size
1.1MB
-
MD5
523702d3f6347f163bdc32a6ced2b2b7
-
SHA1
850e077c266bb2040beae4ffad13f3a167d22080
-
SHA256
ab4857e1748bb7cf0f2b26d33ec7bbba379696a332c895f6fe33b1f6111bc811
-
SHA512
5b3a066e58cb126662910d92932abc9981ed5da9e0c6d670bbfdde2e99bff711f5629bb88cfc45611470a744dda5ac19fd5312924e264ce56f28825e00fcfa00
-
SSDEEP
24576:KyOnIWMCzfFdOAqyHc/zEi3nD6N0+EkKExJ/SDR6A13+6XHMkXec:RyxMCziDzlneN0Hy4Dd1/lX
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4004-22-0x00000000026F0000-0x000000000270A000-memory.dmp healer behavioral1/memory/4004-24-0x00000000029E0000-0x00000000029F8000-memory.dmp healer behavioral1/memory/4004-52-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-50-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-48-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-46-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-44-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-42-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-41-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-38-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-36-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-35-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-32-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-30-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-29-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-26-0x00000000029E0000-0x00000000029F2000-memory.dmp healer behavioral1/memory/4004-25-0x00000000029E0000-0x00000000029F2000-memory.dmp healer -
Healer family
-
Processes:
pr208245.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr208245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr208245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr208245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr208245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr208245.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr208245.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/232-2204-0x0000000005760000-0x0000000005792000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5284-2217-0x00000000004D0000-0x00000000004FE000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk282366.exe family_redline behavioral1/memory/2248-2228-0x0000000000FA0000-0x0000000000FD0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu775682.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation qu775682.exe -
Executes dropped EXE 6 IoCs
Processes:
un904702.exeun526145.exepr208245.exequ775682.exe1.exerk282366.exepid process 2640 un904702.exe 3608 un526145.exe 4004 pr208245.exe 232 qu775682.exe 5284 1.exe 2248 rk282366.exe -
Processes:
pr208245.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr208245.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr208245.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
un526145.exeab4857e1748bb7cf0f2b26d33ec7bbba379696a332c895f6fe33b1f6111bc811.exeun904702.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un526145.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ab4857e1748bb7cf0f2b26d33ec7bbba379696a332c895f6fe33b1f6111bc811.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un904702.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3984 4004 WerFault.exe pr208245.exe 3388 232 WerFault.exe qu775682.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rk282366.exeab4857e1748bb7cf0f2b26d33ec7bbba379696a332c895f6fe33b1f6111bc811.exeun904702.exeun526145.exepr208245.exequ775682.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk282366.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab4857e1748bb7cf0f2b26d33ec7bbba379696a332c895f6fe33b1f6111bc811.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un904702.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un526145.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr208245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu775682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr208245.exepid process 4004 pr208245.exe 4004 pr208245.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr208245.exequ775682.exedescription pid process Token: SeDebugPrivilege 4004 pr208245.exe Token: SeDebugPrivilege 232 qu775682.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
ab4857e1748bb7cf0f2b26d33ec7bbba379696a332c895f6fe33b1f6111bc811.exeun904702.exeun526145.exequ775682.exedescription pid process target process PID 884 wrote to memory of 2640 884 ab4857e1748bb7cf0f2b26d33ec7bbba379696a332c895f6fe33b1f6111bc811.exe un904702.exe PID 884 wrote to memory of 2640 884 ab4857e1748bb7cf0f2b26d33ec7bbba379696a332c895f6fe33b1f6111bc811.exe un904702.exe PID 884 wrote to memory of 2640 884 ab4857e1748bb7cf0f2b26d33ec7bbba379696a332c895f6fe33b1f6111bc811.exe un904702.exe PID 2640 wrote to memory of 3608 2640 un904702.exe un526145.exe PID 2640 wrote to memory of 3608 2640 un904702.exe un526145.exe PID 2640 wrote to memory of 3608 2640 un904702.exe un526145.exe PID 3608 wrote to memory of 4004 3608 un526145.exe pr208245.exe PID 3608 wrote to memory of 4004 3608 un526145.exe pr208245.exe PID 3608 wrote to memory of 4004 3608 un526145.exe pr208245.exe PID 3608 wrote to memory of 232 3608 un526145.exe qu775682.exe PID 3608 wrote to memory of 232 3608 un526145.exe qu775682.exe PID 3608 wrote to memory of 232 3608 un526145.exe qu775682.exe PID 232 wrote to memory of 5284 232 qu775682.exe 1.exe PID 232 wrote to memory of 5284 232 qu775682.exe 1.exe PID 232 wrote to memory of 5284 232 qu775682.exe 1.exe PID 2640 wrote to memory of 2248 2640 un904702.exe rk282366.exe PID 2640 wrote to memory of 2248 2640 un904702.exe rk282366.exe PID 2640 wrote to memory of 2248 2640 un904702.exe rk282366.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab4857e1748bb7cf0f2b26d33ec7bbba379696a332c895f6fe33b1f6111bc811.exe"C:\Users\Admin\AppData\Local\Temp\ab4857e1748bb7cf0f2b26d33ec7bbba379696a332c895f6fe33b1f6111bc811.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904702.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904702.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un526145.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un526145.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr208245.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr208245.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4004 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 10845⤵
- Program crash
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu775682.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu775682.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 15445⤵
- Program crash
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk282366.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk282366.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2248
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4004 -ip 40041⤵PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 232 -ip 2321⤵PID:5144
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
851KB
MD5e2a0d92791da6361d6bc70ebec44f517
SHA1fb79b34d0cebe37d9b5523b0463239177e8a2ee8
SHA2569da6ae8aefdd43e2e44204b5a54146ffa2939dc611d195ab1d3ca5da2dfa1a10
SHA51277f475dc7172b29bdd23177e0db2750e41ae0f6c9dca46dd48b172963b901fe798b5ace90c559ca94991171cd993d29dd63721c0bf6d23550d4d05ef041e93a4
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
698KB
MD52f5c3d04385983702c10836c4dcd25c4
SHA162c63d4e5cf42e7cabbcbc33771e3cd4b5dade3f
SHA256f09543aebb2c449c0bee4fabe99e2d28f6973273550e614beefb6fe0838941f4
SHA51244ba610c96c93b4ca9390002105cd01c10551d960ebc70cf1264f9574c76b2a243f7be8326eb5ef457132cee4dc4b55c11beece3a79d6cac800e9e340d35e1b8
-
Filesize
403KB
MD52d2eb05893f67887fbf94e546c472e35
SHA1b35a9d3836dfac434f8fd847866b0e77d31dfdb6
SHA25676366ee0f00623b1ba95d07ccbf97b188fc389eed4f6f863a4c462e562142622
SHA512c501eadd3cf6f7f2a3e6bd7bcc3a98e756b494b0d2d4d6f4f53a092da8286034489d5bb9e08966ac831b5bef1670e0cb771e68610da32282de32d7e5d10d5f73
-
Filesize
588KB
MD53f3c81689239890a3e400529199ffd27
SHA10d8080561b51ba29a8d62bc40df5c6d513e36ba9
SHA25648c9a7311fe021188a69cf662ba30cc71b1d0fb7299352aab0fadfa5e8e8dbe2
SHA5127ad166606e5f01f4d022650255ba73c272a1787dfb5e62135c6fa7630aa6d105bb62214e5a38ef44261dce3b05e30df6b312bb632fe8fe691018600385c3ddeb
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1