Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 04:20
Static task
static1
Behavioral task
behavioral1
Sample
96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exe
Resource
win10v2004-20241007-en
General
-
Target
96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exe
-
Size
787KB
-
MD5
3426c2582eeba563388fc19443838486
-
SHA1
772dbb0e5e72a0e325d977a4ca013cf5bd5c4443
-
SHA256
96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e
-
SHA512
66fc5b9cf6a1ccc7f9d69590ece611cfa1ccbc9a55a8b199d01c61de777016469381966c44541694835e349d71fefc65cb2d42dba8021849b41626ced9b97fae
-
SSDEEP
12288:pMrky90HvE/kjPdGRuaw4hYVJ3y/NhjbNqmWCV351EdZNkcAmL:ZyHsjPdAXYVJujwmPV3PykO
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4000-19-0x0000000002180000-0x000000000219A000-memory.dmp healer behavioral1/memory/4000-21-0x00000000025A0000-0x00000000025B8000-memory.dmp healer behavioral1/memory/4000-49-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-47-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-45-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-43-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-42-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-39-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-37-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-35-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-33-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-31-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-29-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-27-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-25-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-23-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/4000-22-0x00000000025A0000-0x00000000025B2000-memory.dmp healer -
Healer family
-
Processes:
pro6762.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6762.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4044-2143-0x00000000053F0000-0x0000000005422000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1224-2156-0x00000000009B0000-0x00000000009E0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si987185.exe family_redline behavioral1/memory/3716-2166-0x0000000000190000-0x00000000001BE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu0891.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation qu0891.exe -
Executes dropped EXE 5 IoCs
Processes:
un175150.exepro6762.exequ0891.exe1.exesi987185.exepid process 4892 un175150.exe 4000 pro6762.exe 4044 qu0891.exe 1224 1.exe 3716 si987185.exe -
Processes:
pro6762.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6762.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exeun175150.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un175150.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4532 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3680 4000 WerFault.exe pro6762.exe 4816 4044 WerFault.exe qu0891.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
un175150.exepro6762.exequ0891.exe1.exesi987185.exe96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un175150.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6762.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0891.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si987185.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6762.exepid process 4000 pro6762.exe 4000 pro6762.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6762.exequ0891.exedescription pid process Token: SeDebugPrivilege 4000 pro6762.exe Token: SeDebugPrivilege 4044 qu0891.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exeun175150.exequ0891.exedescription pid process target process PID 548 wrote to memory of 4892 548 96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exe un175150.exe PID 548 wrote to memory of 4892 548 96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exe un175150.exe PID 548 wrote to memory of 4892 548 96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exe un175150.exe PID 4892 wrote to memory of 4000 4892 un175150.exe pro6762.exe PID 4892 wrote to memory of 4000 4892 un175150.exe pro6762.exe PID 4892 wrote to memory of 4000 4892 un175150.exe pro6762.exe PID 4892 wrote to memory of 4044 4892 un175150.exe qu0891.exe PID 4892 wrote to memory of 4044 4892 un175150.exe qu0891.exe PID 4892 wrote to memory of 4044 4892 un175150.exe qu0891.exe PID 4044 wrote to memory of 1224 4044 qu0891.exe 1.exe PID 4044 wrote to memory of 1224 4044 qu0891.exe 1.exe PID 4044 wrote to memory of 1224 4044 qu0891.exe 1.exe PID 548 wrote to memory of 3716 548 96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exe si987185.exe PID 548 wrote to memory of 3716 548 96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exe si987185.exe PID 548 wrote to memory of 3716 548 96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exe si987185.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exe"C:\Users\Admin\AppData\Local\Temp\96f1cbf4a3b474961c998667b795afb701bcfc6c74fd12c42c5d6f5dfcc5a88e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un175150.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un175150.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6762.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6762.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 10804⤵
- Program crash
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0891.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0891.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 13804⤵
- Program crash
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si987185.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si987185.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4000 -ip 40001⤵PID:4156
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4044 -ip 40441⤵PID:4420
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4532
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5cf5a682b2233652196550861169f7d10
SHA1a9ad2733ed17807fce41ea68ba51d73213c1fefa
SHA2562d39aa4eb6cfa4bea7c7c710d7f5a740167da6e9ca995f79c591d6d06bc56a8c
SHA512b2939d0965105635f4f18658eab62161d7c042df1a3e44cf41bf5b13cd516291aa6836dd2962140c9bf5eeb22a19ee16cd93764ff37246d91ebdca75fae03e34
-
Filesize
633KB
MD5c44fcd067e2cc3be1dabf999309d630b
SHA1259cff39f11eb94a7f7c7bb7a2a8cd1f4e5ab620
SHA2560ed94c51974d1ee5378fe4c377072f0e60381a1ffe6f9425855d6ec6adb3f020
SHA512054ddc38626180942a73bfa2f30d8040dcf3c2bf12c18d6fcbcd5ebe5765da57e766c0ecfdddd0fcc6272d8a69794c90e0cb64ef82804553fa6d50cbb4efd58c
-
Filesize
230KB
MD5f7e87e73892c9773dcf2ca7a8723179b
SHA16a6f706065af96523d155355961bc47768487220
SHA2564e4248346bbc357a9d3c9eb8f545658342bebf59a9e2fe06d408bea8cdd0f5d4
SHA51237f3228f143b4b794dba88a82a790d219c2c65c5ad42574127b803b88e1b75c77b972664226a81c195f3e2b643b8e34540201e8160a638cb3f40bf922e7ff98c
-
Filesize
414KB
MD5dcc5915d5b194a5360cd1a3ce2f407ef
SHA185593d94fefe7c22854a98334cf3c61bf8964d9c
SHA2561f5d75eb47a252bfc8fd2f3367e45a83a061a6fc8617e8c7edd84c4ddb274327
SHA5123ee30279fc248140620497bbba3ae5b4e825887ce00d2e7f7e75ee919d49d1f8cd8ec110a0f0bd35b6bd882c1d9f84b12291b457ce7102bab150d38918c7dd3d
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0