Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 12:39
Static task
static1
Behavioral task
behavioral1
Sample
911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exe
Resource
win10v2004-20241007-en
General
-
Target
911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exe
-
Size
789KB
-
MD5
21bd90bedc7a00010d46f6559d56896a
-
SHA1
f221299609e105b31096eb44a6c57fdc8d8b80da
-
SHA256
911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2
-
SHA512
2c69e399c15bed8ac66086f99452ff4e9826aa9291abdd40dd01871247946412188d6e84400aeb14867c6ff4c079f6bcf2b5afe5f08bf5c3497c490b7980268e
-
SSDEEP
12288:pMrHy90YfiYdLNHqj5jo8WaLsfhSaYE5GTTAf6iewBxPssQVGnfpsF82K:eyffiYdhHqjFo8xkUad4WP3vfeFDK
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4540-19-0x0000000002500000-0x000000000251A000-memory.dmp healer behavioral1/memory/4540-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/4540-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/4540-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro4241.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4241.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3092-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/6104-2156-0x0000000000FD0000-0x0000000001000000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si188997.exe family_redline behavioral1/memory/3836-2167-0x0000000000E70000-0x0000000000E9E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu9570.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation qu9570.exe -
Executes dropped EXE 5 IoCs
Processes:
un388060.exepro4241.exequ9570.exe1.exesi188997.exepid process 1820 un388060.exe 4540 pro4241.exe 3092 qu9570.exe 6104 1.exe 3836 si188997.exe -
Processes:
pro4241.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4241.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exeun388060.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un388060.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3908 4540 WerFault.exe pro4241.exe 4412 3092 WerFault.exe qu9570.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exeun388060.exepro4241.exequ9570.exe1.exesi188997.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un388060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4241.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9570.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si188997.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4241.exepid process 4540 pro4241.exe 4540 pro4241.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4241.exequ9570.exedescription pid process Token: SeDebugPrivilege 4540 pro4241.exe Token: SeDebugPrivilege 3092 qu9570.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exeun388060.exequ9570.exedescription pid process target process PID 2936 wrote to memory of 1820 2936 911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exe un388060.exe PID 2936 wrote to memory of 1820 2936 911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exe un388060.exe PID 2936 wrote to memory of 1820 2936 911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exe un388060.exe PID 1820 wrote to memory of 4540 1820 un388060.exe pro4241.exe PID 1820 wrote to memory of 4540 1820 un388060.exe pro4241.exe PID 1820 wrote to memory of 4540 1820 un388060.exe pro4241.exe PID 1820 wrote to memory of 3092 1820 un388060.exe qu9570.exe PID 1820 wrote to memory of 3092 1820 un388060.exe qu9570.exe PID 1820 wrote to memory of 3092 1820 un388060.exe qu9570.exe PID 3092 wrote to memory of 6104 3092 qu9570.exe 1.exe PID 3092 wrote to memory of 6104 3092 qu9570.exe 1.exe PID 3092 wrote to memory of 6104 3092 qu9570.exe 1.exe PID 2936 wrote to memory of 3836 2936 911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exe si188997.exe PID 2936 wrote to memory of 3836 2936 911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exe si188997.exe PID 2936 wrote to memory of 3836 2936 911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exe si188997.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exe"C:\Users\Admin\AppData\Local\Temp\911a8c212064f3df9ef82177822fc9d7b9e6b366c1cabd2fd65f0435e73409d2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un388060.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un388060.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4241.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4241.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 10884⤵
- Program crash
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9570.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9570.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6104 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3092 -s 11524⤵
- Program crash
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si188997.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si188997.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4540 -ip 45401⤵PID:612
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3092 -ip 30921⤵PID:2376
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5d52b6ddb72a45b11e734cda59b9f6b90
SHA111ec02d0633b5075ef0342f6d26eba10f5035e04
SHA256166f5e39d20070ece368d16c03ada8ce1bce466448b1d8259d0074c4318b932c
SHA5127b438f5948cd670ef3d936b3d2cf949382260cc44a9cd4e755f2fc088f9f60b584ccde7af1abf4dafd61c2f45ad3df565d2cf57346061be87517d8b17fc96cca
-
Filesize
635KB
MD5001c254da8def23f5251e0ae5042d785
SHA1bc69ef20e66c989652e800d03c10effc7d1df3e2
SHA256ec47340c0c0f5be407acb2c77dab19f47ebbc58475ecd3ceb09dc7bb35aae8ac
SHA5121939af189daa3c85b575929d308e72c3023125219c4c838b1617a5ec0ed0e54e5dd767f6c5d878e102de075f22301c56868951882ad4b97e6cd486e6f8baecd8
-
Filesize
233KB
MD527e2bdc63858c131b274b0e4ab3c76a6
SHA1010f117e7c3fa16e8891dae05c18a48cfc68002c
SHA256db143f2bf136081a4acce5ac31dafadca1c14747380c278b1c7fc1121f5286a2
SHA5120a7f69b97450f978528c9a125c72fa2935d05d4aa43d4a943a5988a0240bcb209ef0eb9268149033c9fdaa6edbf524e90e0d9192b923c1a9b792d78ac71a06be
-
Filesize
417KB
MD50d6cfb6220ef1338f9bda7302326c4c6
SHA1423cc93a0ee2fde7beff9e44cc882f58ae5bf18f
SHA2569b5597f3b02db78dd8ad1b947e2858ced3c5a15c704bd1807a9ba2f58bcf2ffe
SHA5128e6db81e8d3c9b24180d6907ad79901fbc659432e9d367785b73019f7d8eb7683fffaf17030c9672d15f388f257f17b8a02a0a5b8fde6bafe2501d1ab2a82d72
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0