Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exe
Resource
win10v2004-20241007-en
General
-
Target
571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exe
-
Size
810KB
-
MD5
a7e1c85f26d29873662fb34290253def
-
SHA1
ff40bebd990162a5b1b679527a8f2755415b70d4
-
SHA256
571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be
-
SHA512
30cfbb9d57a6076f89ddab44bb3f6169a43418b16612571773c532aae090c59bbff6684acb64e15ee393f4f38b07c7464d109bcf0ae59c085a3bd6d8c133e8dc
-
SSDEEP
12288:MMroy90W2MhF573fibSWEVpF/ZMBxk2EULe11d8ejhtYjAdqcEaJpkgt9s:8yj2MhF5MDnkSerdzjkSXJygt9s
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4320-19-0x0000000002180000-0x000000000219A000-memory.dmp healer behavioral1/memory/4320-21-0x0000000002480000-0x0000000002498000-memory.dmp healer behavioral1/memory/4320-31-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-49-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-47-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-45-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-43-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-41-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-39-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-37-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-35-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-33-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-29-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-27-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-23-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-22-0x0000000002480000-0x0000000002492000-memory.dmp healer behavioral1/memory/4320-25-0x0000000002480000-0x0000000002492000-memory.dmp healer -
Healer family
-
Processes:
pr755573.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr755573.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr755573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr755573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr755573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr755573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr755573.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4336-2205-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4912-2218-0x0000000000F90000-0x0000000000FBE000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si188418.exe family_redline behavioral1/memory/2072-2229-0x0000000000250000-0x0000000000280000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu930356.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation qu930356.exe -
Executes dropped EXE 5 IoCs
Processes:
un696135.exepr755573.exequ930356.exe1.exesi188418.exepid process 4956 un696135.exe 4320 pr755573.exe 4336 qu930356.exe 4912 1.exe 2072 si188418.exe -
Processes:
pr755573.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr755573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr755573.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un696135.exe571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un696135.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5404 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1720 4320 WerFault.exe pr755573.exe 548 4336 WerFault.exe qu930356.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
pr755573.exequ930356.exe1.exesi188418.exe571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exeun696135.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr755573.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu930356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si188418.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un696135.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pr755573.exepid process 4320 pr755573.exe 4320 pr755573.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pr755573.exequ930356.exedescription pid process Token: SeDebugPrivilege 4320 pr755573.exe Token: SeDebugPrivilege 4336 qu930356.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exeun696135.exequ930356.exedescription pid process target process PID 3020 wrote to memory of 4956 3020 571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exe un696135.exe PID 3020 wrote to memory of 4956 3020 571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exe un696135.exe PID 3020 wrote to memory of 4956 3020 571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exe un696135.exe PID 4956 wrote to memory of 4320 4956 un696135.exe pr755573.exe PID 4956 wrote to memory of 4320 4956 un696135.exe pr755573.exe PID 4956 wrote to memory of 4320 4956 un696135.exe pr755573.exe PID 4956 wrote to memory of 4336 4956 un696135.exe qu930356.exe PID 4956 wrote to memory of 4336 4956 un696135.exe qu930356.exe PID 4956 wrote to memory of 4336 4956 un696135.exe qu930356.exe PID 4336 wrote to memory of 4912 4336 qu930356.exe 1.exe PID 4336 wrote to memory of 4912 4336 qu930356.exe 1.exe PID 4336 wrote to memory of 4912 4336 qu930356.exe 1.exe PID 3020 wrote to memory of 2072 3020 571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exe si188418.exe PID 3020 wrote to memory of 2072 3020 571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exe si188418.exe PID 3020 wrote to memory of 2072 3020 571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exe si188418.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exe"C:\Users\Admin\AppData\Local\Temp\571b6915f6c5b86e5da8fad89825b948eb247383d0929af1ba1c888c856ac6be.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un696135.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un696135.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr755573.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pr755573.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 10804⤵
- Program crash
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu930356.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu930356.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4336 -s 13804⤵
- Program crash
PID:548 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si188418.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si188418.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2072
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4320 -ip 43201⤵PID:1460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4336 -ip 43361⤵PID:4088
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
656KB
MD579e52de0131d456c71534c8482d8418f
SHA1f897121730f4a37e7f94e61feff37ecd39cb0145
SHA256de8168ec135f3bdbd5fd2fe76ac83156bae080779e2a80f775e9e80e90952a3d
SHA512523eaa5ac9664c3a4f81a9d087be838b19f5faf3554878dd1e686255be1e7473e4ada98e6d9d26ba1279cf875740890a6f66319c20ac0313b5de076e38bd1958
-
Filesize
254KB
MD521171561ee03fdf9c611d95171830cbe
SHA19aa171c7b9df9d7f43064fde3a999518e41c182d
SHA256a513989becb7727becd4f18d80e7ab80a55d88565b946f0c20046c89e143379f
SHA512d61865ee3b602824b2a422381a272209abe7068eddca6774278074eee235ea4733f551d2fd9b402c44dd9b3af1435d028fa6916ce7e55ccf6d1c95ed911b262a
-
Filesize
438KB
MD5c3d98767708333e622e3700674b6a43e
SHA1d145dd3fe631094be5b3fafef86bd3331ebe7236
SHA256004ef9ddee8d7f6a3e7529c2c49d446ff8e09169dacd324e775cff8bc306c3b0
SHA51205fb56e6f88bae98294cd534b15bcaa100f1e87a9c371339c6318c0282bdea778520d4f4c7b1f9e60765288e871346eb62499f9a7108b73d9b7e443cbcd1ae70
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1