Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 11:16
Static task
static1
Behavioral task
behavioral1
Sample
f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exe
Resource
win10v2004-20241007-en
General
-
Target
f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exe
-
Size
795KB
-
MD5
fc69e9e3a17f2bec9d151a0e837a3622
-
SHA1
228d650c10160e0e76a02160e83480fc22cf122b
-
SHA256
f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219
-
SHA512
92d4c047a96ac1c48a2e6ae86ac9f318fa2a8c4aebea76f5cb23ad520578f3b2c5c6f91cc5b0193a40ef3eb73dd84f17a30445d9c6f76e58431bcc20d453df5b
-
SSDEEP
24576:Cyz2eIof2a90/mFJn/VL6AdZFVvPqOTrrs:p67L+Qm1r5qO3
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4808-19-0x00000000020E0000-0x00000000020FA000-memory.dmp healer behavioral1/memory/4808-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/4808-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-32-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4808-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro4318.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4318.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4318.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1800-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/64-2156-0x0000000000880000-0x00000000008B0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si892967.exe family_redline behavioral1/memory/2680-2166-0x0000000000290000-0x00000000002BE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu6098.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation qu6098.exe -
Executes dropped EXE 5 IoCs
Processes:
un111013.exepro4318.exequ6098.exe1.exesi892967.exepid process 5100 un111013.exe 4808 pro4318.exe 1800 qu6098.exe 64 1.exe 2680 si892967.exe -
Processes:
pro4318.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4318.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exeun111013.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un111013.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2980 4808 WerFault.exe pro4318.exe 4608 1800 WerFault.exe qu6098.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu6098.exe1.exesi892967.exef76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exeun111013.exepro4318.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6098.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si892967.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un111013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4318.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4318.exepid process 4808 pro4318.exe 4808 pro4318.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4318.exequ6098.exedescription pid process Token: SeDebugPrivilege 4808 pro4318.exe Token: SeDebugPrivilege 1800 qu6098.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exeun111013.exequ6098.exedescription pid process target process PID 2200 wrote to memory of 5100 2200 f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exe un111013.exe PID 2200 wrote to memory of 5100 2200 f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exe un111013.exe PID 2200 wrote to memory of 5100 2200 f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exe un111013.exe PID 5100 wrote to memory of 4808 5100 un111013.exe pro4318.exe PID 5100 wrote to memory of 4808 5100 un111013.exe pro4318.exe PID 5100 wrote to memory of 4808 5100 un111013.exe pro4318.exe PID 5100 wrote to memory of 1800 5100 un111013.exe qu6098.exe PID 5100 wrote to memory of 1800 5100 un111013.exe qu6098.exe PID 5100 wrote to memory of 1800 5100 un111013.exe qu6098.exe PID 1800 wrote to memory of 64 1800 qu6098.exe 1.exe PID 1800 wrote to memory of 64 1800 qu6098.exe 1.exe PID 1800 wrote to memory of 64 1800 qu6098.exe 1.exe PID 2200 wrote to memory of 2680 2200 f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exe si892967.exe PID 2200 wrote to memory of 2680 2200 f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exe si892967.exe PID 2200 wrote to memory of 2680 2200 f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exe si892967.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exe"C:\Users\Admin\AppData\Local\Temp\f76e18c216e85cc2746a840027ce8e95bf5eb68b02f853cf2bbf01f5553d6219.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un111013.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un111013.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4318.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4318.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 10164⤵
- Program crash
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6098.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6098.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:64 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 13884⤵
- Program crash
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si892967.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si892967.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4808 -ip 48081⤵PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1800 -ip 18001⤵PID:4548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD50a580d96f57cedaefd9dfd21ade4ba42
SHA1651c7660bcecd2a94687af0f0b9c308459ff20db
SHA25603e31a9e3f0440f1bef342b038f1f069c5859eb2aa6ef963c693d54210388179
SHA51204096a1391481905161f8a5e054b4545176fc29a9cfeebc62c8357d653024cedbc8074c672b05799f278b9aac010d802ba555662b23de7d3120d5f3cca984b87
-
Filesize
641KB
MD5c48d6169117480e396e0644dc98530d6
SHA1f5f81a90010c0eebd7a27fb60bf01061afc483ec
SHA256bbaef4be1d0bd89a007621867d5d92b5369eb9917213600c3e9e8bc1fad7f7ae
SHA512d08d549ee269d08fefa2407ffcbf950870e564a4b85a4033bdf1b11b65570ce6dde99ac1d5d5040aa632a59bb59879cc06cf0d6c48f03af200996578511c339c
-
Filesize
241KB
MD5cd052afece554d39f7bdb4917517a810
SHA15d3522703579555c135312e1bb7cde3766089d58
SHA256fea0b3368d8bbdd61c20d72e6ce19f7ed574c8b643ac8847ed99604482f76df9
SHA5124790126820929046f0b1571fb996e5cecd320e4cd33cf1f8832a769cc32437e034e4327aa5c48d3dc8b55819bb9234858f058929946d2e10c9f2438bcc0869c4
-
Filesize
424KB
MD5c24f4fb0c97df638a1ddd2fd348e9dcc
SHA130ff3462f7c41a62db8dd04c094af647b93a2ce9
SHA256d6f917356657308cc03cc290ee526db7a59395716bf2a890669579c8f0f955cb
SHA5120604410317670f165c6c3982fe2d791e030cb6b417fa1d0e5e33afa4588411b9cd3a558e077ce2e9c232b8f9146299ef4e984cc5cdd32ee4b3940908420f6ade
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0