Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 15:50
Static task
static1
Behavioral task
behavioral1
Sample
c5a5e030bb0984d90101da82b6135451eabbcccd1d8cc813c5adf1578622d0ce.exe
Resource
win10v2004-20241007-en
General
-
Target
c5a5e030bb0984d90101da82b6135451eabbcccd1d8cc813c5adf1578622d0ce.exe
-
Size
1.1MB
-
MD5
5d7a72ae99c4319417e72c3f8c7bc4af
-
SHA1
93cd5c45abab5a5fd3b9ea1aeea075deae131e95
-
SHA256
c5a5e030bb0984d90101da82b6135451eabbcccd1d8cc813c5adf1578622d0ce
-
SHA512
e2b0dc638dbcc0bee044feb2190ebf9686050a884a32a39d0be11e27312c19c41306616a8ca6a7753211324f346634148eeb52813be7add04e9ea291f96eb7c4
-
SSDEEP
12288:0Mr5y9046F2q/l98K6jY9XPcpMO0s8qPu2A9ShjAzWcM0YNKdfkOzc1ILqmczbGV:tyqThR9XOp9+0ONYNKdc+vLqhzb5V4
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2800-25-0x0000000002210000-0x000000000222A000-memory.dmp healer behavioral1/memory/2800-27-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/2800-51-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-55-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-53-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-42-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-34-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2800-28-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pr846554.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr846554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr846554.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr846554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr846554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr846554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr846554.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4756-2210-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4360-2223-0x0000000000C90000-0x0000000000CBE000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk263937.exe family_redline behavioral1/memory/220-2234-0x0000000000E50000-0x0000000000E80000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu900427.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation qu900427.exe -
Executes dropped EXE 6 IoCs
Processes:
un519916.exeun244606.exepr846554.exequ900427.exe1.exerk263937.exepid process 1680 un519916.exe 456 un244606.exe 2800 pr846554.exe 4756 qu900427.exe 4360 1.exe 220 rk263937.exe -
Processes:
pr846554.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr846554.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr846554.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
c5a5e030bb0984d90101da82b6135451eabbcccd1d8cc813c5adf1578622d0ce.exeun519916.exeun244606.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c5a5e030bb0984d90101da82b6135451eabbcccd1d8cc813c5adf1578622d0ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un519916.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un244606.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4416 2800 WerFault.exe pr846554.exe 5176 4756 WerFault.exe qu900427.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exerk263937.exec5a5e030bb0984d90101da82b6135451eabbcccd1d8cc813c5adf1578622d0ce.exeun519916.exeun244606.exepr846554.exequ900427.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk263937.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5a5e030bb0984d90101da82b6135451eabbcccd1d8cc813c5adf1578622d0ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un519916.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un244606.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr846554.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu900427.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr846554.exepid process 2800 pr846554.exe 2800 pr846554.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr846554.exequ900427.exedescription pid process Token: SeDebugPrivilege 2800 pr846554.exe Token: SeDebugPrivilege 4756 qu900427.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
c5a5e030bb0984d90101da82b6135451eabbcccd1d8cc813c5adf1578622d0ce.exeun519916.exeun244606.exequ900427.exedescription pid process target process PID 4676 wrote to memory of 1680 4676 c5a5e030bb0984d90101da82b6135451eabbcccd1d8cc813c5adf1578622d0ce.exe un519916.exe PID 4676 wrote to memory of 1680 4676 c5a5e030bb0984d90101da82b6135451eabbcccd1d8cc813c5adf1578622d0ce.exe un519916.exe PID 4676 wrote to memory of 1680 4676 c5a5e030bb0984d90101da82b6135451eabbcccd1d8cc813c5adf1578622d0ce.exe un519916.exe PID 1680 wrote to memory of 456 1680 un519916.exe un244606.exe PID 1680 wrote to memory of 456 1680 un519916.exe un244606.exe PID 1680 wrote to memory of 456 1680 un519916.exe un244606.exe PID 456 wrote to memory of 2800 456 un244606.exe pr846554.exe PID 456 wrote to memory of 2800 456 un244606.exe pr846554.exe PID 456 wrote to memory of 2800 456 un244606.exe pr846554.exe PID 456 wrote to memory of 4756 456 un244606.exe qu900427.exe PID 456 wrote to memory of 4756 456 un244606.exe qu900427.exe PID 456 wrote to memory of 4756 456 un244606.exe qu900427.exe PID 4756 wrote to memory of 4360 4756 qu900427.exe 1.exe PID 4756 wrote to memory of 4360 4756 qu900427.exe 1.exe PID 4756 wrote to memory of 4360 4756 qu900427.exe 1.exe PID 1680 wrote to memory of 220 1680 un519916.exe rk263937.exe PID 1680 wrote to memory of 220 1680 un519916.exe rk263937.exe PID 1680 wrote to memory of 220 1680 un519916.exe rk263937.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5a5e030bb0984d90101da82b6135451eabbcccd1d8cc813c5adf1578622d0ce.exe"C:\Users\Admin\AppData\Local\Temp\c5a5e030bb0984d90101da82b6135451eabbcccd1d8cc813c5adf1578622d0ce.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un519916.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un519916.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un244606.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un244606.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr846554.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr846554.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 11005⤵
- Program crash
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu900427.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu900427.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 13845⤵
- Program crash
PID:5176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk263937.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk263937.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2800 -ip 28001⤵PID:1784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4756 -ip 47561⤵PID:3988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
810KB
MD577041211ac7426f709b9c3ab4517a995
SHA1b237a9c11f2a3d855177c735d43f02067f1ecedd
SHA2569e9a2659bcd2bdb078e91bd3f3105a3a025254d6ba966d8506adc316831ea758
SHA5123c082cbb1c65e5887428a8c7a85f5872f87f56f33395c951048ef20730558f8bdf387594af421480d8d1a8258d8d2cd79cc4c0f853d713c39fafb61afc09a630
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
656KB
MD5a401243d4b1006c87842450ffce70724
SHA16bc8190395b05f2050a14d4bb5f4d1e236dc8975
SHA256de7769405b9f824713a0ba65766c2ccf3860b70018305aa2eb228bdcdfaac529
SHA512b61e572d96402ecad6bbde9cef940466ba72c698141ffcacf39bcb2902365da8ce1c7100ec086af7beb4bbc6e91dd5200bd2f3d438470658ac8d23f2b464a375
-
Filesize
254KB
MD5ee8203a2070e1a85005d0d8f28cbd2b0
SHA1cd95ca104b4c7a4865957ce9664c2df9a280bb42
SHA256f33859b99bc143176a1756f17af93dd7ba1ee82bf0656c7a5be53342920344fd
SHA512432504b6ef7eb71243f78bd5c721810fa32c4fbf267c6dc9258457e8861d7b71b32588bbca2eb8c34d69fa5031a47ddfdc7f1984892abbb5fac832f4aefabcc1
-
Filesize
438KB
MD54f8f2a6194399c93290d0216b5f3d1ec
SHA1478c3bf99154b010360d28f1d3dda28f1a33924f
SHA256cccc02779af85995d706a51b3ae984317464764d7bc1a0471c400bcd2b1b6e5e
SHA5129f60cb7255c7a14610edaed75b75950f0e09ffcd571101ef80443dfdb6362cc3d95049b99a039689352fb6d1c43d13efffe813889978da09b813ad57e3e63bdb
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1