Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 06:03
Static task
static1
Behavioral task
behavioral1
Sample
05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exe
Resource
win10v2004-20241007-en
General
-
Target
05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exe
-
Size
850KB
-
MD5
98bf2f243d4bef320f8018abbb9cef29
-
SHA1
446a61cc01311c3d927970111e33735eb88023d1
-
SHA256
05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55
-
SHA512
9525db11549fefc2368dd39d82ebde6bf4f7142f21fcf4af75caa73a92c49829a40168e1699026ca43996a105580223dc49791812702bb197b5c32964b99781e
-
SSDEEP
24576:YyGGSXdeOdWLK9+HyBTW3i7RL0dO55mlP3n4xfQ:ffSXdddkKosTCip0UPm5n4x
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4284-19-0x0000000000AB0000-0x0000000000ACA000-memory.dmp healer behavioral1/memory/4284-21-0x0000000002680000-0x0000000002698000-memory.dmp healer behavioral1/memory/4284-22-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-39-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-49-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-47-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-45-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-43-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-41-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-37-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-35-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-33-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-31-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-29-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-27-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-25-0x0000000002680000-0x0000000002692000-memory.dmp healer behavioral1/memory/4284-23-0x0000000002680000-0x0000000002692000-memory.dmp healer -
Healer family
-
Processes:
pr031559.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr031559.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr031559.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr031559.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr031559.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr031559.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr031559.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4044-2205-0x0000000005760000-0x0000000005792000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3468-2218-0x00000000006F0000-0x000000000071E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si749448.exe family_redline behavioral1/memory/5432-2229-0x00000000008B0000-0x00000000008E0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu268239.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qu268239.exe -
Executes dropped EXE 5 IoCs
Processes:
un198614.exepr031559.exequ268239.exe1.exesi749448.exepid process 4792 un198614.exe 4284 pr031559.exe 4044 qu268239.exe 3468 1.exe 5432 si749448.exe -
Processes:
pr031559.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr031559.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr031559.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exeun198614.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un198614.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3480 4284 WerFault.exe pr031559.exe 3280 4044 WerFault.exe qu268239.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pr031559.exequ268239.exe1.exesi749448.exe05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exeun198614.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr031559.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu268239.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si749448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un198614.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr031559.exepid process 4284 pr031559.exe 4284 pr031559.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr031559.exequ268239.exedescription pid process Token: SeDebugPrivilege 4284 pr031559.exe Token: SeDebugPrivilege 4044 qu268239.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exeun198614.exequ268239.exedescription pid process target process PID 5108 wrote to memory of 4792 5108 05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exe un198614.exe PID 5108 wrote to memory of 4792 5108 05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exe un198614.exe PID 5108 wrote to memory of 4792 5108 05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exe un198614.exe PID 4792 wrote to memory of 4284 4792 un198614.exe pr031559.exe PID 4792 wrote to memory of 4284 4792 un198614.exe pr031559.exe PID 4792 wrote to memory of 4284 4792 un198614.exe pr031559.exe PID 4792 wrote to memory of 4044 4792 un198614.exe qu268239.exe PID 4792 wrote to memory of 4044 4792 un198614.exe qu268239.exe PID 4792 wrote to memory of 4044 4792 un198614.exe qu268239.exe PID 4044 wrote to memory of 3468 4044 qu268239.exe 1.exe PID 4044 wrote to memory of 3468 4044 qu268239.exe 1.exe PID 4044 wrote to memory of 3468 4044 qu268239.exe 1.exe PID 5108 wrote to memory of 5432 5108 05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exe si749448.exe PID 5108 wrote to memory of 5432 5108 05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exe si749448.exe PID 5108 wrote to memory of 5432 5108 05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exe si749448.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exe"C:\Users\Admin\AppData\Local\Temp\05cf5b73b823e3966fae171bdd5df41fbc7f653e058fa81c8f6f864e3f8c7b55.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un198614.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un198614.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr031559.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr031559.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 10884⤵
- Program crash
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu268239.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu268239.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3468 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4044 -s 13764⤵
- Program crash
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si749448.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si749448.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5432
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4284 -ip 42841⤵PID:2932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4044 -ip 40441⤵PID:2544
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
696KB
MD5b9175e9800100539ea745e8992709288
SHA151a9dc8f5c0682e30b01da84a816d98f5331f7dc
SHA25668f65980d1b9c646df0c0e33e181094c3e3ff0feed871ed7f3892cc981c7c728
SHA5127748ab4d7c25ca2cf6ca93091b0ef07737768fe501e158b3ccdba27b14b506291b20f440355bde20491adf371009bd60e9784bd028ac4d1c14397fc6ac201755
-
Filesize
403KB
MD5b939b950cffc161ccdeea04a0079dd34
SHA167b3da1758ffdb56193cd78cad0892886c7b0aa6
SHA256991f2e38c39a52b5e7f1357fda3545f7d39c8a34112d9a2fc444197ae110a5b8
SHA51243180182dc9c112313b2dc5356c863f8a752388e8b87891edbb224c9d2e5637ba83d5f94465e0273a0341ded4cf98649bcf6b23b27cf76128872ea8d87c0bb8c
-
Filesize
586KB
MD5bb72dc08c52a7b7e325079c5a9dce2c3
SHA1f1aed21937623dbbd8acdec054ce1920fd7386de
SHA2565f6d84dc1a1e616f20fbc03088b76d644c6fe8c0089c4300b9a2712b03aaea87
SHA512ba6d3799821cb6d4f9300c9c287546d913a4474c8068d258a1e3419acc68b1ade0ad01dee5d1499f08f3b42cec7b86eb3d25638d7c3cb21dc98878b06ff7466c
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1