Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exe
Resource
win10v2004-20241007-en
General
-
Target
89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exe
-
Size
787KB
-
MD5
b751c0257a3bddf32055710ce9ba529c
-
SHA1
c9105eb339d798c40c33f888a0b787b58978f631
-
SHA256
89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87
-
SHA512
ebeeca2df4b997698d8cb366f0f47e1a84b9e95433478a3c4ecb2b6435cfeff600efc6a5be1ccca65d833a8e2ea8112c08d3f2807737b47ca689aab9bb6c78c9
-
SSDEEP
12288:lMrYy901C4GHKEvKLyyLTwIQqutN/rEv3JRiQ8UGu7L1mNZxlBJ8WulQcO:xyrjsQqutNzEv3JRiQ8QVmPZq/nO
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1012-19-0x00000000027B0000-0x00000000027CA000-memory.dmp healer behavioral1/memory/1012-21-0x0000000004B90000-0x0000000004BA8000-memory.dmp healer behavioral1/memory/1012-33-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-49-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-47-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-45-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-43-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-41-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-39-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-37-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-35-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-31-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-29-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-27-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-26-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-23-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer behavioral1/memory/1012-22-0x0000000004B90000-0x0000000004BA2000-memory.dmp healer -
Healer family
-
Processes:
pro6181.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6181.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6181.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3936-2142-0x0000000004BE0000-0x0000000004C12000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5224-2155-0x0000000000F00000-0x0000000000F30000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372371.exe family_redline behavioral1/memory/4144-2166-0x0000000000100000-0x000000000012E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu2287.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu2287.exe -
Executes dropped EXE 5 IoCs
Processes:
un358842.exepro6181.exequ2287.exe1.exesi372371.exepid process 3908 un358842.exe 1012 pro6181.exe 3936 qu2287.exe 5224 1.exe 4144 si372371.exe -
Processes:
pro6181.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6181.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6181.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un358842.exe89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un358842.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3116 1012 WerFault.exe pro6181.exe 5168 3936 WerFault.exe qu2287.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exeun358842.exepro6181.exequ2287.exe1.exesi372371.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un358842.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6181.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2287.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si372371.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6181.exepid process 1012 pro6181.exe 1012 pro6181.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6181.exequ2287.exedescription pid process Token: SeDebugPrivilege 1012 pro6181.exe Token: SeDebugPrivilege 3936 qu2287.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exeun358842.exequ2287.exedescription pid process target process PID 1240 wrote to memory of 3908 1240 89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exe un358842.exe PID 1240 wrote to memory of 3908 1240 89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exe un358842.exe PID 1240 wrote to memory of 3908 1240 89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exe un358842.exe PID 3908 wrote to memory of 1012 3908 un358842.exe pro6181.exe PID 3908 wrote to memory of 1012 3908 un358842.exe pro6181.exe PID 3908 wrote to memory of 1012 3908 un358842.exe pro6181.exe PID 3908 wrote to memory of 3936 3908 un358842.exe qu2287.exe PID 3908 wrote to memory of 3936 3908 un358842.exe qu2287.exe PID 3908 wrote to memory of 3936 3908 un358842.exe qu2287.exe PID 3936 wrote to memory of 5224 3936 qu2287.exe 1.exe PID 3936 wrote to memory of 5224 3936 qu2287.exe 1.exe PID 3936 wrote to memory of 5224 3936 qu2287.exe 1.exe PID 1240 wrote to memory of 4144 1240 89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exe si372371.exe PID 1240 wrote to memory of 4144 1240 89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exe si372371.exe PID 1240 wrote to memory of 4144 1240 89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exe si372371.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exe"C:\Users\Admin\AppData\Local\Temp\89ed265e5c2acb9a3fd3b5f98312a1f0b99b99083f4d8d2ff097668fa6c75e87.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358842.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un358842.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6181.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6181.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1012 -s 10804⤵
- Program crash
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2287.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2287.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3936 -s 13844⤵
- Program crash
PID:5168 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372371.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si372371.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1012 -ip 10121⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 3936 -ip 39361⤵PID:2604
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5599d3b24d9278f2ebd60da97187443a6
SHA1f757bb0f2d8e926b0602ab509e93572d25110502
SHA2561f0ea0b21e6f7d06ed8c4f70ee717d18e77544432f7292fc84983300f0e1c077
SHA51214d6a51852636fc5b74d443c9333f3d9c23d2f41f936163107fd0e2b31bcf404c1787774f29f99cfc9e42e997a11c6797dd9a760ca9e744bf62098d17cdfff8b
-
Filesize
633KB
MD5beac11bfd10dc40b00db89a5d21d3805
SHA153224cd3a7e738b774f4498ac651cbde3d1e6e80
SHA256987f8ca94d383e852beba3fa2b1c305744362e9e98b437e9a00e5e70ba503c8c
SHA512cd1ccc647e2495935fc268bf447936c0aa0812fe3180a8d5798bd128dbbd3e3283af7c1680c4d9811f833b35612f47648b602096541ee3f39937b9eeec750198
-
Filesize
231KB
MD59fd114a93fae7dc50d02617750959094
SHA136df380bf115a1206ede71f9d43b92286e5c69fe
SHA25630c32b7dd888ffb0338e5ac3cef5f607f48991a9eb890cc15772dab2a84af745
SHA512f84047137196c2863de53b7ac72325666464aaa5ef4d03f6af97fea09a2ccda8105af0e11d44e10bf320a0298c428b81acab4cf5f39f92a16f08d67c62394e5f
-
Filesize
414KB
MD50c6f4f497d4bf5f298cafedb28f44d66
SHA19907d91d77d5004ba24ed808805a702ae9fd481c
SHA256292e5e93addf26eaee9df59ef310a24754cf7dea51f96e4ecc5604494af01695
SHA5123012d77feefa9940a0c928ad4e25aecb0c4f99f999ae62997f28e2a99703f4113a7dd6f4fef99ced59fc1ecef56bf5b1eb829f5504391b2438711f51672d8d8f
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0