Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 13:48
Static task
static1
Behavioral task
behavioral1
Sample
dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exe
Resource
win10v2004-20241007-en
General
-
Target
dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exe
-
Size
789KB
-
MD5
e0b866a1c1f2ada58d5c0ac2ba233d96
-
SHA1
100847bb2df5912ca1cd33d66d6f1f22155e4320
-
SHA256
dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625
-
SHA512
9964264bed8f8d691f53d77eff03133c84e13c22e23eaecd6c74be615bcedc0369a475f0990599db5c2004a244b70961bf3bff41acb3fe9416ed9b36f7109217
-
SSDEEP
12288:3Mrfy90APzfDS4cPKmJfAhrdY7tYLuXuc0TTVc3jieWtVPs4DVOA3a8Uvk/eE:QyTPzRcPJoh62KXB0fhPNfqnvkD
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4760-19-0x0000000002460000-0x000000000247A000-memory.dmp healer behavioral1/memory/4760-21-0x0000000005000000-0x0000000005018000-memory.dmp healer behavioral1/memory/4760-27-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-45-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-47-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-43-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-41-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-39-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-37-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-49-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-35-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-33-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-31-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-29-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-25-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-23-0x0000000005000000-0x0000000005012000-memory.dmp healer behavioral1/memory/4760-22-0x0000000005000000-0x0000000005012000-memory.dmp healer -
Healer family
-
Processes:
pro8638.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8638.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8638.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2168-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4208-2155-0x0000000000480000-0x00000000004B0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si648762.exe family_redline behavioral1/memory/2972-2166-0x0000000000090000-0x00000000000BE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7451.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation qu7451.exe -
Executes dropped EXE 5 IoCs
Processes:
un451901.exepro8638.exequ7451.exe1.exesi648762.exepid process 4876 un451901.exe 4760 pro8638.exe 2168 qu7451.exe 4208 1.exe 2972 si648762.exe -
Processes:
pro8638.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8638.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un451901.exedbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un451901.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 972 4760 WerFault.exe pro8638.exe 3988 2168 WerFault.exe qu7451.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exeun451901.exepro8638.exequ7451.exe1.exesi648762.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un451901.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8638.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7451.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si648762.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8638.exepid process 4760 pro8638.exe 4760 pro8638.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8638.exequ7451.exedescription pid process Token: SeDebugPrivilege 4760 pro8638.exe Token: SeDebugPrivilege 2168 qu7451.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exeun451901.exequ7451.exedescription pid process target process PID 1520 wrote to memory of 4876 1520 dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exe un451901.exe PID 1520 wrote to memory of 4876 1520 dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exe un451901.exe PID 1520 wrote to memory of 4876 1520 dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exe un451901.exe PID 4876 wrote to memory of 4760 4876 un451901.exe pro8638.exe PID 4876 wrote to memory of 4760 4876 un451901.exe pro8638.exe PID 4876 wrote to memory of 4760 4876 un451901.exe pro8638.exe PID 4876 wrote to memory of 2168 4876 un451901.exe qu7451.exe PID 4876 wrote to memory of 2168 4876 un451901.exe qu7451.exe PID 4876 wrote to memory of 2168 4876 un451901.exe qu7451.exe PID 2168 wrote to memory of 4208 2168 qu7451.exe 1.exe PID 2168 wrote to memory of 4208 2168 qu7451.exe 1.exe PID 2168 wrote to memory of 4208 2168 qu7451.exe 1.exe PID 1520 wrote to memory of 2972 1520 dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exe si648762.exe PID 1520 wrote to memory of 2972 1520 dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exe si648762.exe PID 1520 wrote to memory of 2972 1520 dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exe si648762.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exe"C:\Users\Admin\AppData\Local\Temp\dbaf91b5a523c9e816180ed51790f1e5d3d23809ba7e83390f2d356d946f2625.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un451901.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un451901.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8638.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8638.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 10524⤵
- Program crash
PID:972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7451.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7451.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 2364⤵
- Program crash
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si648762.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si648762.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2972
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4760 -ip 47601⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2168 -ip 21681⤵PID:1512
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD50f258d9728d409611bd5a1d4e088ea15
SHA187f444f39d154c199807085bf6d7bd97140a4d1f
SHA256c04551c1e611f4290ce45f9742e5a1a371c7ba3eca9bc496fb0b363610adb7a9
SHA5129dc7317844749405c38f3232c41ac9b322a01882f539b38701c097c0a5e9ff3c72fa555d4055a8877707ceecabd41ec3620e4c188fe012d7ba2b049aed77d931
-
Filesize
635KB
MD51d4ea643f23209c771575ae7e37b66be
SHA13b66283ce22d791b4cfa943cd3c09635d0c472fd
SHA256c406da1f504ffeb8cf6d48bc5d959d19c73580d4a717158627970869ecf213d7
SHA51229524da9da0b122b6beb9e303977d519469702328f2bf5954a68fc51e746be947f9ac302851fde3fa2dcb419245b34a8dde6ad8444bd6d3c63922746db42bc8f
-
Filesize
233KB
MD54098c79335045e3626cebd0c2940fa67
SHA1a9eafe957059497cfc1cd543d9f8e1b7c4859666
SHA2562c3b8f951b6b0bcf8c535352334cbab48d5cbcf2ce00c5338800a790103c752a
SHA51280d2625df19de67130370b0944cc810c581613ff682e7a5172dd296549dffbc3147d44a40f807690655d684fd10a4173de907e1961e05ac4a1e77f8d25ee33b4
-
Filesize
417KB
MD566b36fe28f55950ba24be54c4ceccd2d
SHA13ecba391f90d260e1d4bf457ad263266eba4d85e
SHA25618e8a27d52509b83fcbbfd609601715ed295a44338bb8edf1241823551509213
SHA512689f8c11e234508f3ec07eae3a66e6abe9661814ae4751e3b4a1df8c9f0e1212a7a9b98bc6f33705abe673c3908679af1c739ba30c11efc79a06aca81663aa70
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0