Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 00:24
Static task
static1
Behavioral task
behavioral1
Sample
acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exe
Resource
win10v2004-20241007-en
General
-
Target
acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exe
-
Size
800KB
-
MD5
408e293ab8b4fa521bc90f80d2837e2b
-
SHA1
0d50296a733aeafebe6202846826acbc4bf3233b
-
SHA256
acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639
-
SHA512
93164c02e5a65e10aad097a5dca974010bb168fa86bfea5d14743b9ecd103073af6b302dfc2e4a5a9e1a4430ae246bcd8bd537130e2fa224ed7ed675b4ab9c33
-
SSDEEP
12288:AMrEy90T0ykVfeCN0K4I66uOCwi1ZTjBfPAytUYz72RdSTcy7KJSH/+oM:0yBpV2O0KjPi1ZTjBVDf2RdEBHHK
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4580-19-0x0000000002330000-0x000000000234A000-memory.dmp healer behavioral1/memory/4580-21-0x00000000024C0000-0x00000000024D8000-memory.dmp healer behavioral1/memory/4580-39-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-49-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-47-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-45-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-43-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-41-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-37-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-36-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-33-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-31-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-29-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-27-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-25-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-23-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/4580-22-0x00000000024C0000-0x00000000024D2000-memory.dmp healer -
Healer family
-
Processes:
pro6599.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6599.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6599.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6599.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6599.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6599.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6599.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4904-2143-0x0000000002710000-0x0000000002742000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/408-2156-0x00000000007C0000-0x00000000007F0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si676834.exe family_redline behavioral1/memory/2428-2167-0x0000000000F40000-0x0000000000F6E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu2784.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation qu2784.exe -
Executes dropped EXE 5 IoCs
Processes:
un041057.exepro6599.exequ2784.exe1.exesi676834.exepid process 4344 un041057.exe 4580 pro6599.exe 4904 qu2784.exe 408 1.exe 2428 si676834.exe -
Processes:
pro6599.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6599.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6599.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un041057.exeacb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un041057.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 940 4580 WerFault.exe pro6599.exe 1556 4904 WerFault.exe qu2784.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro6599.exequ2784.exe1.exesi676834.exeacb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exeun041057.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6599.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2784.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si676834.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un041057.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6599.exepid process 4580 pro6599.exe 4580 pro6599.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6599.exequ2784.exedescription pid process Token: SeDebugPrivilege 4580 pro6599.exe Token: SeDebugPrivilege 4904 qu2784.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exeun041057.exequ2784.exedescription pid process target process PID 1952 wrote to memory of 4344 1952 acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exe un041057.exe PID 1952 wrote to memory of 4344 1952 acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exe un041057.exe PID 1952 wrote to memory of 4344 1952 acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exe un041057.exe PID 4344 wrote to memory of 4580 4344 un041057.exe pro6599.exe PID 4344 wrote to memory of 4580 4344 un041057.exe pro6599.exe PID 4344 wrote to memory of 4580 4344 un041057.exe pro6599.exe PID 4344 wrote to memory of 4904 4344 un041057.exe qu2784.exe PID 4344 wrote to memory of 4904 4344 un041057.exe qu2784.exe PID 4344 wrote to memory of 4904 4344 un041057.exe qu2784.exe PID 4904 wrote to memory of 408 4904 qu2784.exe 1.exe PID 4904 wrote to memory of 408 4904 qu2784.exe 1.exe PID 4904 wrote to memory of 408 4904 qu2784.exe 1.exe PID 1952 wrote to memory of 2428 1952 acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exe si676834.exe PID 1952 wrote to memory of 2428 1952 acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exe si676834.exe PID 1952 wrote to memory of 2428 1952 acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exe si676834.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exe"C:\Users\Admin\AppData\Local\Temp\acb851efcc817d9d1815204123742d5e2a1afb7dd4c373e52a4b45995356d639.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un041057.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un041057.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6599.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6599.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4580 -s 11084⤵
- Program crash
PID:940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2784.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2784.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 13844⤵
- Program crash
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si676834.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si676834.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4580 -ip 45801⤵PID:4204
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4904 -ip 49041⤵PID:2208
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5f023a4a4cdbfc8252fc8c2d51ba68115
SHA1932547089a5fca0f75ad6de68919cbaea13aa9e9
SHA256cc95fbcd1b5446e8f38602881aec0b25086644cd003930f7f2048077fda02f6d
SHA512110045661c1085b6d697312fd9e0dea451827657bfa6b86f24d2213166204c2f3374ab33747442af1db9cd113b1dced84c5a869b4ba025cc1e6af9593f0e0455
-
Filesize
647KB
MD5742cd7f9f3e4aed93b589e5af36f162e
SHA15a5eb6482cc715e5a8d8e783a3db046872b86a79
SHA256c413be74689bd39bc2e232f7d25c52c9d96187442d8d9a33c70a3beb5d1ec459
SHA512610fcf067f9d38bb274849b0d44e3ccca678f14c54f91b6248bf179acbb65f3a410da0d3ffb6c7efc95e6317b772f31fee9ca590e2350b5f53e6aff47ca6c250
-
Filesize
252KB
MD5cf56203a15d73085050a10483cdaae6a
SHA195bb2e5ff7092e9b4304939bf76fd500752f9dc7
SHA25640c39fb65fc860c29ae982ff2f570445f269e458d93d3d380c571d0340dfc7d6
SHA512c2b01ce9d9cfcded0e6887f78c45d40d3472afee35c6f3963386b51a97fd7874f9c14027f81aa00ffc0864e674a57a569cbdc5f4f1d2b7090612dd0ae2ec4748
-
Filesize
435KB
MD55eaca0ed77d59fb2a1858ab068539016
SHA131c164f3187c854eef31fd6d2f03dd6d8fa9c4cd
SHA256071a136536febdf42753e83b6a4eb5f17e931d65040372fdee2af0b389b39f8a
SHA512e27aaec1e1739a9006119e3d539136c24a7becf0f0f7257ef06446f44f9d59dee4644891100fffb66ed7dcb038f69614776e81a22b08ac65c6356f1bead43f30
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0