Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 09:39
Static task
static1
Behavioral task
behavioral1
Sample
92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exe
Resource
win10v2004-20241007-en
General
-
Target
92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exe
-
Size
788KB
-
MD5
e9cbfbfb092c5675b0a1a9a46f0bf63b
-
SHA1
bf5472d2db2116a518a0bc1be3f1ecb2bd78e2fa
-
SHA256
92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45
-
SHA512
f7240dbc5e85eb76792b1e21ca2ecda33d544c29d2e89a394b601dfa5bd6de6618d24914a0c511c113dac282ae87da229cda3554df8a16bf3c38dcbcd433f8e7
-
SSDEEP
12288:MMr2y90o3OQ6e0tD9BshYP2KBNSFKj6L73kpgGVqJU8vFQT9Qy22flKt:Syb3ODeWD9Bs4dCFKCtGAtFQTd9E
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4160-19-0x00000000024C0000-0x00000000024DA000-memory.dmp healer behavioral1/memory/4160-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/4160-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-44-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-41-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-32-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/4160-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pro0400.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0400.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0400.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4492-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5236-2156-0x0000000000510000-0x0000000000540000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si138672.exe family_redline behavioral1/memory/5452-2165-0x0000000000AC0000-0x0000000000AEE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7585.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qu7585.exe -
Executes dropped EXE 5 IoCs
Processes:
un273923.exepro0400.exequ7585.exe1.exesi138672.exepid process 4216 un273923.exe 4160 pro0400.exe 4492 qu7585.exe 5236 1.exe 5452 si138672.exe -
Processes:
pro0400.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0400.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0400.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exeun273923.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un273923.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4768 4160 WerFault.exe pro0400.exe 5356 4492 WerFault.exe qu7585.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro0400.exequ7585.exe1.exesi138672.exe92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exeun273923.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0400.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7585.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si138672.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un273923.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0400.exepid process 4160 pro0400.exe 4160 pro0400.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0400.exequ7585.exedescription pid process Token: SeDebugPrivilege 4160 pro0400.exe Token: SeDebugPrivilege 4492 qu7585.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exeun273923.exequ7585.exedescription pid process target process PID 2884 wrote to memory of 4216 2884 92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exe un273923.exe PID 2884 wrote to memory of 4216 2884 92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exe un273923.exe PID 2884 wrote to memory of 4216 2884 92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exe un273923.exe PID 4216 wrote to memory of 4160 4216 un273923.exe pro0400.exe PID 4216 wrote to memory of 4160 4216 un273923.exe pro0400.exe PID 4216 wrote to memory of 4160 4216 un273923.exe pro0400.exe PID 4216 wrote to memory of 4492 4216 un273923.exe qu7585.exe PID 4216 wrote to memory of 4492 4216 un273923.exe qu7585.exe PID 4216 wrote to memory of 4492 4216 un273923.exe qu7585.exe PID 4492 wrote to memory of 5236 4492 qu7585.exe 1.exe PID 4492 wrote to memory of 5236 4492 qu7585.exe 1.exe PID 4492 wrote to memory of 5236 4492 qu7585.exe 1.exe PID 2884 wrote to memory of 5452 2884 92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exe si138672.exe PID 2884 wrote to memory of 5452 2884 92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exe si138672.exe PID 2884 wrote to memory of 5452 2884 92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exe si138672.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exe"C:\Users\Admin\AppData\Local\Temp\92c6be5556d86404b2b1acc85e36c4231d21748ca7b18b8b59f6c52be6af1e45.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un273923.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un273923.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0400.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0400.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 10804⤵
- Program crash
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7585.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7585.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5236 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4492 -s 13844⤵
- Program crash
PID:5356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si138672.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si138672.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5452
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4160 -ip 41601⤵PID:404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4492 -ip 44921⤵PID:5280
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5e90340488be75c4429e2e27aec333ef4
SHA103ab06c72491a4a4bd5ee720ae6ac81b27cfa899
SHA2565f07406a8fc01897771de3c8f4cd418b0faf968d18f455a699b4ae631d1f4743
SHA5124ad6ed59fa75514d03a862135946bb543bf1be2b4b67a778321f2fa561d13d4cd7167ec2488dc217404e30650ed0972397b55c82b6b3130e05bc55f5dc283eb2
-
Filesize
634KB
MD5f86169f6a16c4ee773a490c14e0c4d47
SHA1e45b29bc499be15e9a3e8993c7e7738433783cc9
SHA256b4b6ece3f6a58146ffaa0cda4473c1e36d3cbe8d60a06071a7fc443b702541f7
SHA5124e3ea04b3cab3aab4b3e218ed8677feff272be681bd22a4b00c4c671770ee56c84ca3af2da8a6032f6f0d4692842453a83e02cdd74953d90824f7e6ddea7f66e
-
Filesize
231KB
MD5731ca4ace1d210ede770df8c459e5c9b
SHA11caaf3c9c47b0dc91c629c3d1fc3cbb18d98d2d1
SHA256b628a49da2642834ac05cf5d681970037a00e2a1aa36ead431dae8f9193d220e
SHA512d064fc6ba6c8585984666fc10b7e0749e2d17da1836af9d5b5f41cf4799886ffb9a4ef7c4dd5aaea995e27c7922de6116d50d29b0444b53cf7d24a2a7f6f7f2a
-
Filesize
415KB
MD5ad63cda2f664693a75ac8b1f8227da7f
SHA125ce332660ce9bf8c0b0891a14e07a6855c7ac76
SHA256747f9cee077c0aaa1b8f30179229667945af83631efde605dda92effa3759b98
SHA51249df816076853aa675b17b741e8cd25131795a4022482fc4b51f1f363878d7b9ec31e3d6fff5f26a52b88a9bcc1b488b7496c3a3b3e85d8071cd3c92d3d96a01
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0