Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 07:44
Static task
static1
Behavioral task
behavioral1
Sample
6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exe
Resource
win10v2004-20241007-en
General
-
Target
6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exe
-
Size
794KB
-
MD5
fb26fdd13c93d3fdabd20e01af2ee9ed
-
SHA1
ca5fb2f0366db3fa7db33e2bb820cdc110030a0b
-
SHA256
6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea
-
SHA512
d4888933c48de8f383a539e5d35d500da69c152f3403f84df48e447e3657ba5353976bbef80a89d53de715abc78c6942078c6051c526a87f2daafe4150856765
-
SSDEEP
24576:hyW70a1Z6Sg6d50GcPLzo9zTJG0wd36drkOQw3kX:UO0PSP50NPLzCord4Qw0
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1700-19-0x00000000020B0000-0x00000000020CA000-memory.dmp healer behavioral1/memory/1700-21-0x00000000024C0000-0x00000000024D8000-memory.dmp healer behavioral1/memory/1700-27-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-47-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-49-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-45-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-43-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-42-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-39-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-37-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-35-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-33-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-32-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-29-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-25-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-22-0x00000000024C0000-0x00000000024D2000-memory.dmp healer behavioral1/memory/1700-23-0x00000000024C0000-0x00000000024D2000-memory.dmp healer -
Healer family
-
Processes:
pro1652.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1652.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1652.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1652.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1652.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1652.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1652.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2296-2142-0x0000000005440000-0x0000000005472000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/6040-2155-0x00000000001A0000-0x00000000001D0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si686000.exe family_redline behavioral1/memory/4256-2166-0x0000000000B00000-0x0000000000B2E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7401.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation qu7401.exe -
Executes dropped EXE 5 IoCs
Processes:
un295197.exepro1652.exequ7401.exe1.exesi686000.exepid process 1704 un295197.exe 1700 pro1652.exe 2296 qu7401.exe 6040 1.exe 4256 si686000.exe -
Processes:
pro1652.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1652.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1652.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exeun295197.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un295197.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1868 1700 WerFault.exe pro1652.exe 6136 2296 WerFault.exe qu7401.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu7401.exe1.exesi686000.exe6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exeun295197.exepro1652.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si686000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un295197.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1652.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1652.exepid process 1700 pro1652.exe 1700 pro1652.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1652.exequ7401.exedescription pid process Token: SeDebugPrivilege 1700 pro1652.exe Token: SeDebugPrivilege 2296 qu7401.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exeun295197.exequ7401.exedescription pid process target process PID 1120 wrote to memory of 1704 1120 6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exe un295197.exe PID 1120 wrote to memory of 1704 1120 6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exe un295197.exe PID 1120 wrote to memory of 1704 1120 6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exe un295197.exe PID 1704 wrote to memory of 1700 1704 un295197.exe pro1652.exe PID 1704 wrote to memory of 1700 1704 un295197.exe pro1652.exe PID 1704 wrote to memory of 1700 1704 un295197.exe pro1652.exe PID 1704 wrote to memory of 2296 1704 un295197.exe qu7401.exe PID 1704 wrote to memory of 2296 1704 un295197.exe qu7401.exe PID 1704 wrote to memory of 2296 1704 un295197.exe qu7401.exe PID 2296 wrote to memory of 6040 2296 qu7401.exe 1.exe PID 2296 wrote to memory of 6040 2296 qu7401.exe 1.exe PID 2296 wrote to memory of 6040 2296 qu7401.exe 1.exe PID 1120 wrote to memory of 4256 1120 6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exe si686000.exe PID 1120 wrote to memory of 4256 1120 6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exe si686000.exe PID 1120 wrote to memory of 4256 1120 6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exe si686000.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exe"C:\Users\Admin\AppData\Local\Temp\6aa8a2505de0a9a9c284f7d77170b2d2240ea6376d4838293e5b47477e15abea.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un295197.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un295197.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1652.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1652.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 10284⤵
- Program crash
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7401.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7401.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 13844⤵
- Program crash
PID:6136 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si686000.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si686000.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1700 -ip 17001⤵PID:5036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2296 -ip 22961⤵PID:6076
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD52739434866b3ddc766ab5b38fcdde850
SHA1249e69f0a1aef9482e168cbfd2f4811fe1182817
SHA256dbee95f2f72ca43e3a01b5fb12ec3603a6b7f928842f24596d3d634fdce74a33
SHA512462791037808e8beaf83cb7aa1f453a79201dffb7aaac81b58f1886cd0674b8460ff3a9d33ac58a447e1c0d847446dc18d18a6702d3b1d4ff6c69c5f7951fa8e
-
Filesize
641KB
MD5ac528de29cb8e18620c3232b1434daab
SHA1c978fecbd69eff54f1d6aa77eae07f6210e1466d
SHA256cea142a3ff50968e0482f431d5bef13ebd330e881fef89443955d45a97963627
SHA51242d8218b991323076cc3c4714314c8747c5f657a6b57c4900e25d4138004e840063c8c1a2aabd033d505a5fa18d653d9e7b1eaded6839e20b3e9078d14ff7281
-
Filesize
241KB
MD5fb55048a3849c05db7fa2222bf45e8bf
SHA1c6233de239cc4fcf9a957e18325f0fee74ec473f
SHA256cd2ed1075aa1966a7c2f75d9b5e2522aad16a1e96bcb7e33ff5b51ca1ecaf234
SHA51241628115ded5b2b4255ebcd2b59d9d07f7d79a7c406376cd9580e7318d14900a723fa2ae52f176c964397f575af41ce5eff79f2866416af2e51260e7d41df8e5
-
Filesize
424KB
MD55751d6bd0aa5ae61d1f4c11168f86202
SHA11621afb668afb36656cca111808ce843cb725df8
SHA256ee8af28fb27e1dae50b1b6d87dacd33a886decfbe785b4d3fcb1ec6857681ffb
SHA512046a42e4acc98039fe190f7625be43a5f0dd81cb2e9a0b282bd93c14787a4d4b2ff620e4d6bcdc5aec5f8df66e18768d962d6f79c80d7c69f14fec30f83acdfa
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0