Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 15:52
Static task
static1
Behavioral task
behavioral1
Sample
172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exe
Resource
win10v2004-20241007-en
General
-
Target
172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exe
-
Size
790KB
-
MD5
be36d3eb51d13ea87fad86fab84702c0
-
SHA1
e40ddaae3f8bb37171d2803d7c15c7404d3ef7c7
-
SHA256
172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1
-
SHA512
6384c07845b97ede764f0e992d7702628d07b344e2d0aad1c658d016149e4086df834434a44e1dc551711c2fcb73708facc5993d4ad0008ccc8a23d6647a039b
-
SSDEEP
12288:wMr8y905HHLOcIwaD6QEX1sLuxaMxrcgTFAfEieWUVPsBAIDA/:cyKOcxabyiolx71POAIDA/
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/5040-19-0x0000000002110000-0x000000000212A000-memory.dmp healer behavioral1/memory/5040-21-0x0000000002570000-0x0000000002588000-memory.dmp healer behavioral1/memory/5040-49-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-47-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-45-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-43-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-41-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-39-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-37-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-35-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-33-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-31-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-29-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-27-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-25-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-23-0x0000000002570000-0x0000000002582000-memory.dmp healer behavioral1/memory/5040-22-0x0000000002570000-0x0000000002582000-memory.dmp healer -
Healer family
-
Processes:
pro2810.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2810.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2810.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1252-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5900-2156-0x0000000000870000-0x00000000008A0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si137231.exe family_redline behavioral1/memory/5516-2167-0x0000000000280000-0x00000000002AE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu3797.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation qu3797.exe -
Executes dropped EXE 5 IoCs
Processes:
un207624.exepro2810.exequ3797.exe1.exesi137231.exepid process 1160 un207624.exe 5040 pro2810.exe 1252 qu3797.exe 5900 1.exe 5516 si137231.exe -
Processes:
pro2810.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2810.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2810.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exeun207624.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un207624.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3716 5040 WerFault.exe pro2810.exe 5624 1252 WerFault.exe qu3797.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exeun207624.exepro2810.exequ3797.exe1.exesi137231.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un207624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2810.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu3797.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si137231.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro2810.exepid process 5040 pro2810.exe 5040 pro2810.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro2810.exequ3797.exedescription pid process Token: SeDebugPrivilege 5040 pro2810.exe Token: SeDebugPrivilege 1252 qu3797.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exeun207624.exequ3797.exedescription pid process target process PID 520 wrote to memory of 1160 520 172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exe un207624.exe PID 520 wrote to memory of 1160 520 172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exe un207624.exe PID 520 wrote to memory of 1160 520 172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exe un207624.exe PID 1160 wrote to memory of 5040 1160 un207624.exe pro2810.exe PID 1160 wrote to memory of 5040 1160 un207624.exe pro2810.exe PID 1160 wrote to memory of 5040 1160 un207624.exe pro2810.exe PID 1160 wrote to memory of 1252 1160 un207624.exe qu3797.exe PID 1160 wrote to memory of 1252 1160 un207624.exe qu3797.exe PID 1160 wrote to memory of 1252 1160 un207624.exe qu3797.exe PID 1252 wrote to memory of 5900 1252 qu3797.exe 1.exe PID 1252 wrote to memory of 5900 1252 qu3797.exe 1.exe PID 1252 wrote to memory of 5900 1252 qu3797.exe 1.exe PID 520 wrote to memory of 5516 520 172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exe si137231.exe PID 520 wrote to memory of 5516 520 172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exe si137231.exe PID 520 wrote to memory of 5516 520 172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exe si137231.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exe"C:\Users\Admin\AppData\Local\Temp\172b39493d9159bb8604524f98a04c643b4eaced4e9ca5036d49cfe9924f2eb1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207624.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un207624.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2810.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2810.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 10844⤵
- Program crash
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3797.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3797.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 13844⤵
- Program crash
PID:5624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si137231.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si137231.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5516
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5040 -ip 50401⤵PID:3352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1252 -ip 12521⤵PID:5776
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5c2be80fc9ded908a2c686811cf141fb2
SHA174eee2672bcc0ca20cb4927d0544e2856ed7b5f9
SHA256215efe6b5e84d6c9ec3532d6d84647864ac99c41deb5d21e84626b0c5e0e1c92
SHA512a23c23023eb113f5001c9a894b6cef1b76557f2eaccb3eac41c74703e7cb64d936773c1ec051f922315ec950a6f505c699183333eb9c0eb9322b6c16a3ccba30
-
Filesize
635KB
MD5e0b8ac93777bbdedb171e89aee222936
SHA1977f398d6b9f3e253144ccc40c9318ada526ce2b
SHA2568d61318da968323c081754a7f329793056ffd79a9aa4556c0cc1e3fd43337c80
SHA512e566d7ae28134172b37bda90d015d8e228298483d57bc01b429b0b2288621b4743d19febcd3e716c6dcc8b3ca20cae48212477ef66022ae624659b74dc385e39
-
Filesize
233KB
MD52d49b183c9fd36b9ca08fabf4683487c
SHA170d28e4ddd349c13fcee4bcc240125415a6bbf2e
SHA2562ee4b04eb993b9f4d2bec20b1d75368ef1ba7e632577aef9235da12d7a8fc46d
SHA51231d164834169af35229895e5b510515873e4b948bb0020e9ba3cb0b0c73580ce22c770560ae182ba8f042de957a053dca6939f1fede416803e190f8d4c5619da
-
Filesize
417KB
MD56a5a97176911b41ddadfc47cd2950706
SHA1de825760af319ffd6b6ba4eab64f39ccc1d8a1ab
SHA256723140c88d1a28cfdc186462fdf079f4efd5b0b5fefc130f3fba9bf6c2357806
SHA512a1f7743ccbff74ead5b738a9062bc08352cbf1f778378233bf50774ea756566348fef02c4fd731abcceeedc317b84a0e2f6efe29c6c20d55c313e161071df74c
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0