Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 05:04
Static task
static1
Behavioral task
behavioral1
Sample
1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exe
Resource
win10v2004-20241007-en
General
-
Target
1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exe
-
Size
787KB
-
MD5
17bcd1f61eaf897006ff7f8c0a18a486
-
SHA1
4bed0694a3ea82ef65acb21d288a602b932f8a83
-
SHA256
1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17
-
SHA512
a9bdbab4d22318020d4c64ddac0bde041e8226510d5585cdf10b6ff3c2dc939c38d2c23976edfbec63f2a11882fa64f9bd27ea053345dd969fcb729ba20e85e4
-
SSDEEP
12288:2MrMy90mJAMjwtt0MU5aZuJIbZqsh43RH53Wy1udnnhpDx89:Oy30tmHMZuJAZd43R53WmkhpDxu
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3200-19-0x0000000000860000-0x000000000087A000-memory.dmp healer behavioral1/memory/3200-21-0x0000000002560000-0x0000000002578000-memory.dmp healer behavioral1/memory/3200-22-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-49-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-47-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-45-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-43-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-41-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-39-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-37-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-35-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-33-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-31-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-29-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-27-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-25-0x0000000002560000-0x0000000002572000-memory.dmp healer behavioral1/memory/3200-23-0x0000000002560000-0x0000000002572000-memory.dmp healer -
Healer family
-
Processes:
pro6024.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6024.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6024.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6024.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6024.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6024.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6024.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4832-2142-0x0000000004C40000-0x0000000004C72000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2384-2155-0x0000000000780000-0x00000000007B0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si998413.exe family_redline behavioral1/memory/5028-2165-0x0000000000360000-0x000000000038E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu0663.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu0663.exe -
Executes dropped EXE 5 IoCs
Processes:
un386522.exepro6024.exequ0663.exe1.exesi998413.exepid process 3068 un386522.exe 3200 pro6024.exe 4832 qu0663.exe 2384 1.exe 5028 si998413.exe -
Processes:
pro6024.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6024.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6024.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exeun386522.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un386522.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1580 3200 WerFault.exe pro6024.exe 1196 4832 WerFault.exe qu0663.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
si998413.exe1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exeun386522.exepro6024.exequ0663.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si998413.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un386522.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0663.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6024.exepid process 3200 pro6024.exe 3200 pro6024.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6024.exequ0663.exedescription pid process Token: SeDebugPrivilege 3200 pro6024.exe Token: SeDebugPrivilege 4832 qu0663.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exeun386522.exequ0663.exedescription pid process target process PID 5116 wrote to memory of 3068 5116 1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exe un386522.exe PID 5116 wrote to memory of 3068 5116 1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exe un386522.exe PID 5116 wrote to memory of 3068 5116 1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exe un386522.exe PID 3068 wrote to memory of 3200 3068 un386522.exe pro6024.exe PID 3068 wrote to memory of 3200 3068 un386522.exe pro6024.exe PID 3068 wrote to memory of 3200 3068 un386522.exe pro6024.exe PID 3068 wrote to memory of 4832 3068 un386522.exe qu0663.exe PID 3068 wrote to memory of 4832 3068 un386522.exe qu0663.exe PID 3068 wrote to memory of 4832 3068 un386522.exe qu0663.exe PID 4832 wrote to memory of 2384 4832 qu0663.exe 1.exe PID 4832 wrote to memory of 2384 4832 qu0663.exe 1.exe PID 4832 wrote to memory of 2384 4832 qu0663.exe 1.exe PID 5116 wrote to memory of 5028 5116 1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exe si998413.exe PID 5116 wrote to memory of 5028 5116 1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exe si998413.exe PID 5116 wrote to memory of 5028 5116 1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exe si998413.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exe"C:\Users\Admin\AppData\Local\Temp\1b56bdc101f07521a68c075dd33fbf06b81a7123afbbd15a4c848942bc96bd17.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un386522.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un386522.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6024.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6024.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 10044⤵
- Program crash
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0663.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0663.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 14964⤵
- Program crash
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si998413.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si998413.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3200 -ip 32001⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4832 -ip 48321⤵PID:4768
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5998ea40ccd44a131c9974897e76d7bc1
SHA10712c54b799ca45c10bbf6b08c5d581853f2a11c
SHA25632666be6237ab48e9a66e080564991a5e2e0198baaf66fed8589d21ae2625f50
SHA512f8b14a284e627f6c2b5f2fe4c8de02fee9676c389c446a6401f0d67f161b5b6bc80b048402f68340c9ef47f9d2671f4ba2715cb193d17e65a54115f258a8f989
-
Filesize
633KB
MD55c8d46bbddf9ec051e788310106a17e1
SHA1ead55ea0734b824ccf62181411e5198488bdfbcf
SHA25634a9dddbb8c1686b94d36d9d85b1157ca362bf5c8f697808975d26caec1e3192
SHA512c6c8eec130bdcc0c684a74bcdadde5fdd391ae44ac837860968cab91da7ebeed6a00f1b99f6cce6dff2db14d1abf985774a428c83906b705ce1af44edd813589
-
Filesize
230KB
MD555fa4338be833ed9ba153fe2a499f166
SHA1456d7bf7b213c96c5734d77d35e376410f6c4fcb
SHA2563dd1851a846e86a66c966adffc9c17fce14456706169692b842218b904de8c1a
SHA512a438a09a6a9b43311128c4354d2ebdb6dda838a73de11ddddbd3a6d3db9438d06361711dec67b430004c25fe59835c7ed6d6503adfd08e90135c0457222dc917
-
Filesize
414KB
MD50799703bed5748e2b228f28c0a724d13
SHA1bacacd7391e7c4618818336cd310ccb9ddd80b04
SHA256c0d758d04c0171b9b3d7f7c19fb464c3eeb2d852f7735545f3e30afcb973095a
SHA51251d64057fe2f21e5a350c7ee2930b26729edccf8191106c51b15413ebad6cdfc13afb597f15652d816d53a2a7cbb90b783e43f9bbad7614b6b150bd1a4cd994d
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0