Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 14:25
Static task
static1
Behavioral task
behavioral1
Sample
45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exe
Resource
win10v2004-20241007-en
General
-
Target
45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exe
-
Size
787KB
-
MD5
fb3db781effd136ae6997fa8ffde6fc0
-
SHA1
b18ce34aa1ed9f1cef2766291438fef63967e402
-
SHA256
45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c
-
SHA512
e6975f48a66e412e18b31ff8e66382288c0e3d005399cb9274ab3f072a985a98f53397402957fc1ad1ee101780f8e41b53aad17bb6534ba97f4860ea0a036ce0
-
SSDEEP
12288:7MrQy90tcBHlNbWshlXJWKlp/RN0Ud3Io156Plun2Wba89:XyHHrdXJrpN7d3I0qu2Wn9
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4688-19-0x0000000002550000-0x000000000256A000-memory.dmp healer behavioral1/memory/4688-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/4688-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-36-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-34-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-26-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4688-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro6952.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6952.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6952.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/916-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1320-2156-0x0000000000340000-0x0000000000370000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si138570.exe family_redline behavioral1/memory/6116-2166-0x00000000008E0000-0x000000000090E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7726.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation qu7726.exe -
Executes dropped EXE 5 IoCs
Processes:
un202815.exepro6952.exequ7726.exe1.exesi138570.exepid process 1960 un202815.exe 4688 pro6952.exe 916 qu7726.exe 1320 1.exe 6116 si138570.exe -
Processes:
pro6952.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6952.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6952.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exeun202815.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un202815.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4456 4688 WerFault.exe pro6952.exe 5704 916 WerFault.exe qu7726.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exeun202815.exepro6952.exequ7726.exe1.exesi138570.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un202815.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6952.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si138570.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6952.exepid process 4688 pro6952.exe 4688 pro6952.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6952.exequ7726.exedescription pid process Token: SeDebugPrivilege 4688 pro6952.exe Token: SeDebugPrivilege 916 qu7726.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exeun202815.exequ7726.exedescription pid process target process PID 5080 wrote to memory of 1960 5080 45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exe un202815.exe PID 5080 wrote to memory of 1960 5080 45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exe un202815.exe PID 5080 wrote to memory of 1960 5080 45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exe un202815.exe PID 1960 wrote to memory of 4688 1960 un202815.exe pro6952.exe PID 1960 wrote to memory of 4688 1960 un202815.exe pro6952.exe PID 1960 wrote to memory of 4688 1960 un202815.exe pro6952.exe PID 1960 wrote to memory of 916 1960 un202815.exe qu7726.exe PID 1960 wrote to memory of 916 1960 un202815.exe qu7726.exe PID 1960 wrote to memory of 916 1960 un202815.exe qu7726.exe PID 916 wrote to memory of 1320 916 qu7726.exe 1.exe PID 916 wrote to memory of 1320 916 qu7726.exe 1.exe PID 916 wrote to memory of 1320 916 qu7726.exe 1.exe PID 5080 wrote to memory of 6116 5080 45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exe si138570.exe PID 5080 wrote to memory of 6116 5080 45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exe si138570.exe PID 5080 wrote to memory of 6116 5080 45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exe si138570.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exe"C:\Users\Admin\AppData\Local\Temp\45e4afe4d08663fb79b20b6e0fd2dbb5958e1c5b4588e5a7def40dc5341ef58c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un202815.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un202815.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6952.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6952.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4688 -s 10044⤵
- Program crash
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7726.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7726.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 9924⤵
- Program crash
PID:5704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si138570.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si138570.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4688 -ip 46881⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 916 -ip 9161⤵PID:1796
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c9497a14754e97c629f8be084d320b7c
SHA13ff618a169a6870a689964b43bfc462848de4740
SHA256b3be33ebf78f86251690e12826505fd8178e81ca5d3aef9e4d1fee947a677295
SHA5128d8658317625d7135ede0d44a07b0215e016afa1f588a6404df886cc3507640d6212b52bf2227daf9340dac3f98e2bc4777b4891f03fe8d91979e759f32da6db
-
Filesize
633KB
MD594b236ecdd13939c3465e1093058fe7d
SHA1daba2fdbb777f714adda52dbd66ba27165dcef8f
SHA2567d9d5d74a0a1f399066f2820b0fdd2cc5ae8bfb10b70fdb3b7e36b6ed9b515ce
SHA512459942682b397bb9d2ef2e239d720b4b55ff1280e27c1f5d3b0f311eee847e3c8af69fc98ed595a4d68c5387f5f0b799d411fb4c51e5ddf335459d6cf6ad8758
-
Filesize
230KB
MD56a2538f9ccf06191994c55588e40c600
SHA1e032a78fda8a01fb2d707e61c1110bfc8e7eebf1
SHA25622605aa68894e14b0c0ec051a8dbe2abbe5496ca7fe323717deea49a678e6c7d
SHA512f444f10248d3e11822e74d151deed0c223ee0d3375652dd501b66a1abda2a6e811442206206db9148c9fecd2322c9886b3814c74194798924ccda56742a8382b
-
Filesize
414KB
MD5ef6b089466e36c161a58431813d36ed5
SHA1d0bc3501b6c602674249443a3d6f0d3a7c9d5d74
SHA25617e7858332e119bb94d042152a3545fe5d0db38e5af9ca443f41f6c8219972c0
SHA5123a67a50ca99512208254ecde540a302c423bde3d8f4787c9807d10474eb28ef60dde8ba0e9e4e6742f4ae7f8a995131f486acb00323e0e01ef5dfa97a5e8796e
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0