Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 00:41
Static task
static1
Behavioral task
behavioral1
Sample
d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exe
Resource
win10v2004-20241007-en
General
-
Target
d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exe
-
Size
787KB
-
MD5
59f25b8822f1055d9bcdc1c7f4047df1
-
SHA1
746729e648d483d97994006280ade0e4042f16d4
-
SHA256
d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e
-
SHA512
1139187d903a14008bda4b5b34c72a52a9b1ddd4c3b041073e6d0e86241044ad5069bcccf47f70608fa5a03a055e7a1c4aa5b219c53edde4748904a8cdbab8de
-
SSDEEP
12288:WMrAy90OnbU9kKqcyh4K2Gql2Tss1f3j3ppgGVqZ18vHo5QeVaoNVFB:qy3+0q3CsslIG8AIKePN
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4128-19-0x0000000002340000-0x000000000235A000-memory.dmp healer behavioral1/memory/4128-21-0x0000000005000000-0x0000000005018000-memory.dmp healer behavioral1/memory/4128-35-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-49-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-47-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-46-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-44-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-41-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-39-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-37-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-33-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-31-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-29-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-27-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-25-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-23-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4128-22-0x0000000005000000-0x0000000005012000-memory.dmp healer -
Healer family
-
Processes:
pro8802.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8802.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3648-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5660-2155-0x00000000004E0000-0x0000000000510000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si600145.exe family_redline behavioral1/memory/5676-2165-0x00000000005A0000-0x00000000005CE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu2072.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation qu2072.exe -
Executes dropped EXE 5 IoCs
Processes:
un107573.exepro8802.exequ2072.exe1.exesi600145.exepid process 2912 un107573.exe 4128 pro8802.exe 3648 qu2072.exe 5660 1.exe 5676 si600145.exe -
Processes:
pro8802.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8802.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8802.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exeun107573.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un107573.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3656 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2332 4128 WerFault.exe pro8802.exe 1348 3648 WerFault.exe qu2072.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exeun107573.exepro8802.exequ2072.exe1.exesi600145.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un107573.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2072.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si600145.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8802.exepid process 4128 pro8802.exe 4128 pro8802.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8802.exequ2072.exedescription pid process Token: SeDebugPrivilege 4128 pro8802.exe Token: SeDebugPrivilege 3648 qu2072.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exeun107573.exequ2072.exedescription pid process target process PID 1128 wrote to memory of 2912 1128 d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exe un107573.exe PID 1128 wrote to memory of 2912 1128 d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exe un107573.exe PID 1128 wrote to memory of 2912 1128 d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exe un107573.exe PID 2912 wrote to memory of 4128 2912 un107573.exe pro8802.exe PID 2912 wrote to memory of 4128 2912 un107573.exe pro8802.exe PID 2912 wrote to memory of 4128 2912 un107573.exe pro8802.exe PID 2912 wrote to memory of 3648 2912 un107573.exe qu2072.exe PID 2912 wrote to memory of 3648 2912 un107573.exe qu2072.exe PID 2912 wrote to memory of 3648 2912 un107573.exe qu2072.exe PID 3648 wrote to memory of 5660 3648 qu2072.exe 1.exe PID 3648 wrote to memory of 5660 3648 qu2072.exe 1.exe PID 3648 wrote to memory of 5660 3648 qu2072.exe 1.exe PID 1128 wrote to memory of 5676 1128 d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exe si600145.exe PID 1128 wrote to memory of 5676 1128 d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exe si600145.exe PID 1128 wrote to memory of 5676 1128 d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exe si600145.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exe"C:\Users\Admin\AppData\Local\Temp\d8f4c1890fbeb107d41228fe873ab61e60c1de8dcb531e4f255ec76c962ab56e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un107573.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un107573.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8802.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8802.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 10844⤵
- Program crash
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2072.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2072.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 13844⤵
- Program crash
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si600145.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si600145.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5676
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4128 -ip 41281⤵PID:4308
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3648 -ip 36481⤵PID:1652
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3656
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD57c3966e79ea4fea9f45f91c164931c8c
SHA1ed1884edca4c5cb95d0b09926a6d2c414fdd22f7
SHA256fc73bcec9400f762bb8bb4dc8407b0741c9f8262d832b330f5de3a67aba2de44
SHA512f9c61bcfd24e34b9a4b358562196793166523eb7bfc47e7005efe950d473b52847547c77b8c45045aca3cfbccfae2fda6407b58401f47190671478dcab1135d3
-
Filesize
634KB
MD5b358969cad64f4dc9ea1ba209cd6d367
SHA1f1437d0644824a9e01800a652646e140ae86701b
SHA2567d997c4833984b8050d8eafc5abc9fbe3d0aef5431dd83aa37efd9da3ef974d8
SHA51286a3921f245bd11a14de06250b6e9d672995c08c693a0386aa53ce365aef21c240c82298a846a7bcb9555054a737505e69c5112255b77c6c01a8627b8119e7b1
-
Filesize
231KB
MD5ed06a2ec24bf090e19c398dffffa95f0
SHA15bdc3baa672036b8ed9de21d0b0a0a97384145f6
SHA256e5bbd6e807e4c28cb3712101d3b2b4636326d9f23373daf119f0576918b76dde
SHA512ec0b008b9e2ebb7920b731ee51f1583bdc18b441b46bc26c15c05c12cc3046d41f680122970e7b7cb4a04373153de11bbfce77fe4a9bb0b5f108cd9d6d43852a
-
Filesize
415KB
MD50d0a0548559aa6db6d0401b245e8d2ae
SHA100bb060cde7e6ad92f7e87f07c1345d1b38e0e36
SHA2565ca054c4254687ad13fdf0b3e2dc7a7349f7bde50d748d0d2ede367c162dbd9a
SHA512a01cbc1f53036834d6ff49229204f67271b79090dd6f8991e53d6c6379636ad3fb877fcdc9349a60c3dd16b3a8c0d94332469f7e74ece2a7fbd8f04685e619a2
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0