Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 01:07
Static task
static1
Behavioral task
behavioral1
Sample
5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exe
Resource
win10v2004-20241007-en
General
-
Target
5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exe
-
Size
787KB
-
MD5
c8fb4f5fbb355ab4bca6ba03dcfe1cf9
-
SHA1
f3c8efccaf6af78447a3d7a51d0fa1bd4c14745e
-
SHA256
5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252
-
SHA512
1ce8d4021a2c784a50d16dab6a6f26be3637658f92a711efa65f80ecf6805e94b0b971380440f4cb2017a8839a125685a2aec4870e17f2afebe63e3cf05aac07
-
SSDEEP
12288:fMrQy90xsMHFN4URLR/kA2BTgwSQqP7h+0l/eiBUUoE7d1m/ZIl338ivlZnxS4:LyOmwt8CQqP7h+0l/eiBU2XmBOsyZE4
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/536-19-0x0000000004AF0000-0x0000000004B0A000-memory.dmp healer behavioral1/memory/536-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/536-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-46-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-38-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-36-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/536-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro2140.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro2140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro2140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro2140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro2140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro2140.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro2140.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2756-2143-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1112-2156-0x0000000000F80000-0x0000000000FB0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si351170.exe family_redline behavioral1/memory/5268-2167-0x00000000001D0000-0x00000000001FE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu0013.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation qu0013.exe -
Executes dropped EXE 5 IoCs
Processes:
un108708.exepro2140.exequ0013.exe1.exesi351170.exepid process 3480 un108708.exe 536 pro2140.exe 2756 qu0013.exe 1112 1.exe 5268 si351170.exe -
Processes:
pro2140.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro2140.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro2140.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exeun108708.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un108708.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1972 536 WerFault.exe pro2140.exe 3412 2756 WerFault.exe qu0013.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exeun108708.exepro2140.exequ0013.exe1.exesi351170.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un108708.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro2140.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si351170.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro2140.exepid process 536 pro2140.exe 536 pro2140.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro2140.exequ0013.exedescription pid process Token: SeDebugPrivilege 536 pro2140.exe Token: SeDebugPrivilege 2756 qu0013.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exeun108708.exequ0013.exedescription pid process target process PID 3700 wrote to memory of 3480 3700 5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exe un108708.exe PID 3700 wrote to memory of 3480 3700 5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exe un108708.exe PID 3700 wrote to memory of 3480 3700 5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exe un108708.exe PID 3480 wrote to memory of 536 3480 un108708.exe pro2140.exe PID 3480 wrote to memory of 536 3480 un108708.exe pro2140.exe PID 3480 wrote to memory of 536 3480 un108708.exe pro2140.exe PID 3480 wrote to memory of 2756 3480 un108708.exe qu0013.exe PID 3480 wrote to memory of 2756 3480 un108708.exe qu0013.exe PID 3480 wrote to memory of 2756 3480 un108708.exe qu0013.exe PID 2756 wrote to memory of 1112 2756 qu0013.exe 1.exe PID 2756 wrote to memory of 1112 2756 qu0013.exe 1.exe PID 2756 wrote to memory of 1112 2756 qu0013.exe 1.exe PID 3700 wrote to memory of 5268 3700 5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exe si351170.exe PID 3700 wrote to memory of 5268 3700 5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exe si351170.exe PID 3700 wrote to memory of 5268 3700 5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exe si351170.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exe"C:\Users\Admin\AppData\Local\Temp\5362e0c5c34d68038a32a075d9f40ed4dbc51bebf2b6a7dde1e500dc6bade252.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un108708.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un108708.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2140.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2140.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 10804⤵
- Program crash
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0013.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0013.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 14444⤵
- Program crash
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si351170.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si351170.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5268
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 536 -ip 5361⤵PID:1796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 2756 -ip 27561⤵PID:2144
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a0f6723612e931c0bf2aeb492195bba4
SHA147755ead3eb2a8e890edba6f114922ec424aaa1e
SHA2562f2443fe13ef224bf50895df6c6b0a2ce34385c2d31cda278b7e4dd85052758d
SHA512eecd5992987b0237df69ec8bf5a24eeca68438127e1792e86fa57a1e4f237dfa245bdfd6863549e4ab9f63464c600ec5f8602793c653a03283103c131250c5dd
-
Filesize
633KB
MD58688681041d61ef34b1cda784f6a885b
SHA1185548aa8d9fd6199234c7c3b1442237eca1d29d
SHA256affe02ea327f0a1169089afb8598aacae824851b83aca13369d595cd88bbbcee
SHA512dc3b2d7a5f42edf6a2d04e2f7d93b9299ba7ad5645befb87ee570fb9f5b4b5ed13f62507b5dbbba41d9880aab68fd559d5534b8d420bce0027a7a1991082286f
-
Filesize
231KB
MD5674e0f5f6e7a4116d66da1651853a2bf
SHA10d746748cad8e73c3470c3a668fe9e9004ae11e1
SHA2564ae52a939c1f82fc81887790ea70062ef064369388d88e6e14b46b1410ffd173
SHA51287f013f5085865d795a66e7863d4d99c9a7166dd28cb2c603d8906c908b191adf4b1ed32d3e32a1a07dfe4ce7fcfcf05fae70f477a4190880f91cbaf9fed21b3
-
Filesize
414KB
MD58abe7128c66baa29bde21d10cfd264ad
SHA1360540a61389afbf87b43c88e9debdfa3016b466
SHA2564d0e9b5a1cbde4f9e3eeecb8a7c3ff7edaaaa166dbc914f0b3af0f9ecc28705d
SHA512c92a81ccf94f54178c5566dba8fc7297f4134946455749cec9fa1a89141e6b904d78082b82d2b2ed5c85108421739d94f3d77033113b0b76c59d5389391bd155
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0