Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 16:21
Static task
static1
Behavioral task
behavioral1
Sample
8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exe
Resource
win10v2004-20241007-en
General
-
Target
8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exe
-
Size
814KB
-
MD5
d2d7feeb8d72d3429ab9f32224a17fff
-
SHA1
ee880e761fcdebf554061ddd0b795d23b0330539
-
SHA256
8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed
-
SHA512
f9348a2b91672c09e7b2246c5c8f4e406b5b396da205a92a9eca85ba43385fe3adb34824ee81b3e1291278e5da2f58d2c7f70c14869930f86eae30a253b12cf6
-
SSDEEP
12288:tMrFy90TSQHks/N+IXpKhhTAjd+aLrh5Ocz5rLI4GwxyjDQz7QxlsV6Hj2X/2a:8yYRRUTGd+aLfUMSDyuoij2ea
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4172-19-0x00000000025A0000-0x00000000025BA000-memory.dmp healer behavioral1/memory/4172-21-0x0000000002600000-0x0000000002618000-memory.dmp healer behavioral1/memory/4172-49-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-47-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-45-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-43-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-41-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-39-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-37-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-35-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-33-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-31-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-29-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-27-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-25-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-23-0x0000000002600000-0x0000000002612000-memory.dmp healer behavioral1/memory/4172-22-0x0000000002600000-0x0000000002612000-memory.dmp healer -
Healer family
-
Processes:
pro1061.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1061.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1061.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2288-2142-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5208-2155-0x0000000000B50000-0x0000000000B80000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si434410.exe family_redline behavioral1/memory/1560-2166-0x0000000000C00000-0x0000000000C2E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu6457.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qu6457.exe -
Executes dropped EXE 5 IoCs
Processes:
un910820.exepro1061.exequ6457.exe1.exesi434410.exepid process 3496 un910820.exe 4172 pro1061.exe 2288 qu6457.exe 5208 1.exe 1560 si434410.exe -
Processes:
pro1061.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1061.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1061.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un910820.exe8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un910820.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2392 4172 WerFault.exe pro1061.exe 2256 2288 WerFault.exe qu6457.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exesi434410.exe8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exeun910820.exepro1061.exequ6457.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si434410.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un910820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1061.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6457.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1061.exepid process 4172 pro1061.exe 4172 pro1061.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1061.exequ6457.exedescription pid process Token: SeDebugPrivilege 4172 pro1061.exe Token: SeDebugPrivilege 2288 qu6457.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exeun910820.exequ6457.exedescription pid process target process PID 452 wrote to memory of 3496 452 8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exe un910820.exe PID 452 wrote to memory of 3496 452 8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exe un910820.exe PID 452 wrote to memory of 3496 452 8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exe un910820.exe PID 3496 wrote to memory of 4172 3496 un910820.exe pro1061.exe PID 3496 wrote to memory of 4172 3496 un910820.exe pro1061.exe PID 3496 wrote to memory of 4172 3496 un910820.exe pro1061.exe PID 3496 wrote to memory of 2288 3496 un910820.exe qu6457.exe PID 3496 wrote to memory of 2288 3496 un910820.exe qu6457.exe PID 3496 wrote to memory of 2288 3496 un910820.exe qu6457.exe PID 2288 wrote to memory of 5208 2288 qu6457.exe 1.exe PID 2288 wrote to memory of 5208 2288 qu6457.exe 1.exe PID 2288 wrote to memory of 5208 2288 qu6457.exe 1.exe PID 452 wrote to memory of 1560 452 8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exe si434410.exe PID 452 wrote to memory of 1560 452 8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exe si434410.exe PID 452 wrote to memory of 1560 452 8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exe si434410.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exe"C:\Users\Admin\AppData\Local\Temp\8adf1b9ac6d68fadf5548bbc6d02007383db8565b1a90eaf27bd8c023cafafed.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un910820.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un910820.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1061.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1061.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 10844⤵
- Program crash
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6457.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6457.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 13924⤵
- Program crash
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si434410.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si434410.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1560
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4172 -ip 41721⤵PID:2160
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2288 -ip 22881⤵PID:5336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5532950a8ee1e406cb216c6817a1eb01d
SHA1a0f78afd9929d2368d66ef83b5206f0baf8ae1f7
SHA256c5c698704dd73f22247b1e9500ae96a2bb70210f53c362fbcde782f0ccb5bcab
SHA512803a003ea31ef23ee87ab6230154c8b09743b8e7172aaa2843c872afbecad6f9ce1b1b87c5047eab5de27eec2a0f416de8d86c20110e9df72cb7caa9d49ae9c9
-
Filesize
660KB
MD5a262236888c2bfbd37fa6e7727382b59
SHA118058dcabde0d69309e000b06565eda336797d99
SHA256fe1a352e753ce8f9a17abcc5816636965efb816d7a4f222a18caf30b6624f774
SHA5127a4d6d3957b7f60d0c491d4fccbcc50859bf5da3415d4e2c662c8280f5c49cc420dde1a3bd27bb028ff8a08f83c6be5794a5b74713cbf61871392b9b97fdc70e
-
Filesize
312KB
MD52bb784015e23646d14a495c2ce1da3d6
SHA1217623e88d73e6cb8a09f82f8d058f88e5a18ce9
SHA25654f7c7dd458c22e47455740c269300d21abca1532b3df8ca3c3438cf5f2d918d
SHA51228066ae3cce19f6f2c15cb8afdf1fabf20f0558305ebce507512fa12ac0c3bbf4fc8211753fd78c1f822bfabde976f7983d6a9876b4e4ed21165258d58de84f8
-
Filesize
495KB
MD598ac1baba684acf55949e2bf75201bca
SHA12259063d54e65cca833c27a68057adb841d369ec
SHA25697405c0d186e6a7a1d1175b9c0109b7885ef80208723fc07bb833ed315a77ea3
SHA51244b27c31866ad6830907718b4d83949432f8cbb3c65221ed837b70a364b405b2de091e4d7b745684b9b25c4c002acfee29143b9a3e7a1c3b11a95d239bf276e3
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0