Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 05:48
Static task
static1
Behavioral task
behavioral1
Sample
c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exe
Resource
win10v2004-20241007-en
General
-
Target
c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exe
-
Size
787KB
-
MD5
5bb06312e53843de5eb5cee3fe851263
-
SHA1
b7157ba67767ade80eb0d2823a71df12aa119ace
-
SHA256
c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39
-
SHA512
0ee16df2fda02500014693824a4b4ba7e9832a3b583e158823eef202a7ee3954fc4cea35e74caf97719e671700b8b57199ac00cf344191c2d7ecc109b96579de
-
SSDEEP
12288:2Mroy901dx3K3zs1BJIZyr+F7JwQMu97MH479gxiSYL3XI1V4Iluin9TIcGmn:iyYdlgzs1B2FF7JX9D9miRL3XUVuEn
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2348-19-0x0000000002620000-0x000000000263A000-memory.dmp healer behavioral1/memory/2348-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/2348-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/2348-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro1515.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1515.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4984-2143-0x0000000002780000-0x00000000027B2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5208-2156-0x00000000007A0000-0x00000000007D0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si759621.exe family_redline behavioral1/memory/3712-2167-0x0000000000B10000-0x0000000000B3E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu0998.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation qu0998.exe -
Executes dropped EXE 5 IoCs
Processes:
un244564.exepro1515.exequ0998.exe1.exesi759621.exepid process 4788 un244564.exe 2348 pro1515.exe 4984 qu0998.exe 5208 1.exe 3712 si759621.exe -
Processes:
pro1515.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1515.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exeun244564.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un244564.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4656 2348 WerFault.exe pro1515.exe 3960 4984 WerFault.exe qu0998.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exeun244564.exepro1515.exequ0998.exe1.exesi759621.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un244564.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1515.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0998.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si759621.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1515.exepid process 2348 pro1515.exe 2348 pro1515.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1515.exequ0998.exedescription pid process Token: SeDebugPrivilege 2348 pro1515.exe Token: SeDebugPrivilege 4984 qu0998.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exeun244564.exequ0998.exedescription pid process target process PID 1848 wrote to memory of 4788 1848 c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exe un244564.exe PID 1848 wrote to memory of 4788 1848 c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exe un244564.exe PID 1848 wrote to memory of 4788 1848 c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exe un244564.exe PID 4788 wrote to memory of 2348 4788 un244564.exe pro1515.exe PID 4788 wrote to memory of 2348 4788 un244564.exe pro1515.exe PID 4788 wrote to memory of 2348 4788 un244564.exe pro1515.exe PID 4788 wrote to memory of 4984 4788 un244564.exe qu0998.exe PID 4788 wrote to memory of 4984 4788 un244564.exe qu0998.exe PID 4788 wrote to memory of 4984 4788 un244564.exe qu0998.exe PID 4984 wrote to memory of 5208 4984 qu0998.exe 1.exe PID 4984 wrote to memory of 5208 4984 qu0998.exe 1.exe PID 4984 wrote to memory of 5208 4984 qu0998.exe 1.exe PID 1848 wrote to memory of 3712 1848 c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exe si759621.exe PID 1848 wrote to memory of 3712 1848 c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exe si759621.exe PID 1848 wrote to memory of 3712 1848 c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exe si759621.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exe"C:\Users\Admin\AppData\Local\Temp\c292dc02ac847d295eae64a5292e8784fed9fd3397d0e15d212ab5bae1a55f39.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un244564.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un244564.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1515.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1515.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 10804⤵
- Program crash
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0998.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0998.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 13884⤵
- Program crash
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si759621.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si759621.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2348 -ip 23481⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4984 -ip 49841⤵PID:4420
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5eceef8bb969cb825e7e4223d770ddedb
SHA1a0be484418d1ecc3199369bfcac45715caee1d70
SHA256474cf49683e58973508627cc428cc4bedadb710c1a7cd11c641edfd6e08661c6
SHA512f825bec831b9c3a4b16e6465f79abdb321b07e89171707b413d5c15bf4ffb530bd716beac9354ede6ca7455169a6028f092d0c183838e3a22045c11ccfa265d4
-
Filesize
633KB
MD57980aa6dfa06b86cabc902309a1c3819
SHA1f669cb386085e0448e02508b5c590e43309357bc
SHA25682fc21ca76e2d550fe246ff0408fea1321d09f47dc1eb25b238d3cdce04200b0
SHA512edc7a5be00f5ba08a67f1ac3e05c09b1a33c98c6ad25ff45fc40b5f3add6f61aebcb34fa388783c424e47bc5225a9f2272fd290316b5260c2dbcac9bdf2dd7a2
-
Filesize
230KB
MD558b9992412123672c2795235c323c129
SHA132d926d99dc02da9a1c20b32bd048430568175bd
SHA256ef1bb9785720403a64d2ad6a0d384f739f713b17f6b0295c920b889f632d5d7b
SHA51257059f25b2242d1b5090ebdfc3672e56eb4569d75a707d272b3e940158b7f326d4e07a3a43ecdcb3c990a457e7b36e4c5544c8e96c119c90d361cb8781c49fe8
-
Filesize
414KB
MD558196f77881cb4aa27ea0b748926853f
SHA12070f6038ff8a9243d5c221945661b9a5159bb3a
SHA256dfca58b656bb21ebc0465f36c32bc2e978ee3c577e0f84b9e1609c57f6f8af75
SHA512b189565ae62378d63e5911e9ea0a0f71bd1988fb755d10de21fbf9596ad69491b6d7cd3e45b144fff398fa90f09ebe352a6a444286250adcfb92188da54456a3
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0