Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 09:55
Static task
static1
Behavioral task
behavioral1
Sample
4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exe
Resource
win10v2004-20241007-en
General
-
Target
4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exe
-
Size
787KB
-
MD5
3465365354bd197530c1ba2dc27e77e5
-
SHA1
743769afbbe00e4493d83d0daedc958a4171ea47
-
SHA256
4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76
-
SHA512
642ce6a274c1dbfbe3ca37eb04dd3a72772223026b46ad9aa24a19bef5dd126bf20ff7bb8e46df5b4710dabaeac9f6310121e0029d4bcc797c76317767cad63c
-
SSDEEP
12288:HMrCy90MfOT27bP223U8AQwnQq05NvSnX53IiasUHs7K1mYZhlSb88JWzf:FyHnP2u6Qq05NKX53Iiast4mEKgIWzf
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2016-19-0x00000000024F0000-0x000000000250A000-memory.dmp healer behavioral1/memory/2016-21-0x00000000026A0000-0x00000000026B8000-memory.dmp healer behavioral1/memory/2016-31-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-22-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-49-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-47-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-45-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-44-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-41-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-39-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-37-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-36-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-34-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-29-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-27-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-25-0x00000000026A0000-0x00000000026B2000-memory.dmp healer behavioral1/memory/2016-23-0x00000000026A0000-0x00000000026B2000-memory.dmp healer -
Healer family
-
Processes:
pro6535.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro6535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro6535.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro6535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro6535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro6535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro6535.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2896-2143-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5116-2156-0x0000000000050000-0x0000000000080000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si573959.exe family_redline behavioral1/memory/1256-2167-0x0000000000A10000-0x0000000000A3E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu4388.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation qu4388.exe -
Executes dropped EXE 5 IoCs
Processes:
un542192.exepro6535.exequ4388.exe1.exesi573959.exepid process 3096 un542192.exe 2016 pro6535.exe 2896 qu4388.exe 5116 1.exe 1256 si573959.exe -
Processes:
pro6535.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro6535.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro6535.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exeun542192.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un542192.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3860 2016 WerFault.exe pro6535.exe 1284 2896 WerFault.exe qu4388.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pro6535.exequ4388.exe1.exesi573959.exe4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exeun542192.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro6535.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4388.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si573959.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un542192.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro6535.exepid process 2016 pro6535.exe 2016 pro6535.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro6535.exequ4388.exedescription pid process Token: SeDebugPrivilege 2016 pro6535.exe Token: SeDebugPrivilege 2896 qu4388.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exeun542192.exequ4388.exedescription pid process target process PID 4836 wrote to memory of 3096 4836 4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exe un542192.exe PID 4836 wrote to memory of 3096 4836 4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exe un542192.exe PID 4836 wrote to memory of 3096 4836 4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exe un542192.exe PID 3096 wrote to memory of 2016 3096 un542192.exe pro6535.exe PID 3096 wrote to memory of 2016 3096 un542192.exe pro6535.exe PID 3096 wrote to memory of 2016 3096 un542192.exe pro6535.exe PID 3096 wrote to memory of 2896 3096 un542192.exe qu4388.exe PID 3096 wrote to memory of 2896 3096 un542192.exe qu4388.exe PID 3096 wrote to memory of 2896 3096 un542192.exe qu4388.exe PID 2896 wrote to memory of 5116 2896 qu4388.exe 1.exe PID 2896 wrote to memory of 5116 2896 qu4388.exe 1.exe PID 2896 wrote to memory of 5116 2896 qu4388.exe 1.exe PID 4836 wrote to memory of 1256 4836 4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exe si573959.exe PID 4836 wrote to memory of 1256 4836 4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exe si573959.exe PID 4836 wrote to memory of 1256 4836 4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exe si573959.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exe"C:\Users\Admin\AppData\Local\Temp\4451021bdb6835e7c741b9eed69bc471edafdd8c575078d7094d26179219bc76.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un542192.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un542192.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6535.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6535.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 10844⤵
- Program crash
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4388.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4388.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 15044⤵
- Program crash
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si573959.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si573959.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1256
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2016 -ip 20161⤵PID:232
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2896 -ip 28961⤵PID:1436
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5d8b66ebe5f1a6ae4de5473df29bfd88b
SHA11d3869c878a7149d7e51718c3cda48e4eb654c76
SHA256d7900266e0ee0e346db7207426674b11011ffe57b53bd9f36d52277211039d8c
SHA512e4935eaae0bd761e8578dc897001875dcdc0d1893bebf3757ba156b6f50ca122240eae2498b758b26725961ed0062241c5cb1922143d007643d1b7cf43cd55da
-
Filesize
633KB
MD58f88d2f8d8741992072080dc833ce671
SHA1018896027523603cbe4b0a3a16b1ae76022fdfcd
SHA2567c6512a3ad344afb5bc11faed491c3be50ca93bab4e45aef408616242bf24a36
SHA5124d9a9f1a3b25fd6c8fa6818ebfe44b6b683ad123755b4394ff21ced862aa306312459ae3a2d5665c061e3b0aa1867d6b54d3a9432f80bfe9d1d418acc0d5a1b7
-
Filesize
231KB
MD5c2369f466b0f5b38955aa7e13e0e36d0
SHA13af44fe93a45463fa751b55373a007f504a824a0
SHA25605a1307fd34da99c90cce74b8ee25613a86c69abc950376491d8e2c2d3631f9e
SHA512c71b94cc60d076d5efc01af89b4bb56e1a21c574d928a4f9002583775948bbfec1ba2c6c02dcc143cf9c93af816e5b1b27d536c5de2579cdeafe0439c1691b85
-
Filesize
414KB
MD56cb2e9ec08018b58941f37312a81ac12
SHA14892f6988e7813df09b209f55597a71290f911f8
SHA256d21fb3f7ac8e0db73922ad0e7360df0f2ac88aa1d2f13413a99cc0893de9dd84
SHA512c287a7a9f0d5751b8f3ddb988a4f003c2a37a2d048291ee09d2db1b8d3549e4eb7e3a876c80c8bce23d1f6b69f00a28e200ff03cc6dd03edfcd61ca29bff7d5e
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0