Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
302957e47812a0e1a24ab7e3d6c176d66c028c89550f7abe5c769e889b58754e.exe
Resource
win10v2004-20241007-en
General
-
Target
302957e47812a0e1a24ab7e3d6c176d66c028c89550f7abe5c769e889b58754e.exe
-
Size
787KB
-
MD5
671795e23c5f941472f5ecc35c88f109
-
SHA1
88b3bd5b822c57e35f3040aa3c63d074e41f82bc
-
SHA256
302957e47812a0e1a24ab7e3d6c176d66c028c89550f7abe5c769e889b58754e
-
SHA512
3c16aacacdbb903a970c0e201a950a60b5295fd3b732f1aa71aa7b08a20170a25c6b68f191318d87b22cc7378c2623aaad887e8ac0b5ed51e1d5311b29b5a037
-
SSDEEP
24576:ayjOlAj/eg3aJ0J3kcEtrmL5Nf3e8fF1jqYRT:hSl8/egKu0ceMJlF1j
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2100-19-0x0000000002260000-0x000000000227A000-memory.dmp healer behavioral1/memory/2100-21-0x00000000024F0000-0x0000000002508000-memory.dmp healer behavioral1/memory/2100-22-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-49-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-47-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-43-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-41-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-39-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-37-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-35-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-33-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-31-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-29-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-27-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-25-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-23-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2100-45-0x00000000024F0000-0x0000000002502000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4994.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4994.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1908-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x0011000000023b4b-2148.dat family_redline behavioral1/memory/5672-2156-0x0000000000250000-0x0000000000280000-memory.dmp family_redline behavioral1/files/0x0007000000023c86-2166.dat family_redline behavioral1/memory/5808-2167-0x0000000000B30000-0x0000000000B5E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qu4726.exe -
Executes dropped EXE 5 IoCs
pid Process 2752 un131692.exe 2100 pro4994.exe 1908 qu4726.exe 5672 1.exe 5808 si951040.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4994.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4994.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 302957e47812a0e1a24ab7e3d6c176d66c028c89550f7abe5c769e889b58754e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un131692.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3012 2100 WerFault.exe 85 5748 1908 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 302957e47812a0e1a24ab7e3d6c176d66c028c89550f7abe5c769e889b58754e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un131692.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4994.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4726.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si951040.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2100 pro4994.exe 2100 pro4994.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2100 pro4994.exe Token: SeDebugPrivilege 1908 qu4726.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1524 wrote to memory of 2752 1524 302957e47812a0e1a24ab7e3d6c176d66c028c89550f7abe5c769e889b58754e.exe 83 PID 1524 wrote to memory of 2752 1524 302957e47812a0e1a24ab7e3d6c176d66c028c89550f7abe5c769e889b58754e.exe 83 PID 1524 wrote to memory of 2752 1524 302957e47812a0e1a24ab7e3d6c176d66c028c89550f7abe5c769e889b58754e.exe 83 PID 2752 wrote to memory of 2100 2752 un131692.exe 85 PID 2752 wrote to memory of 2100 2752 un131692.exe 85 PID 2752 wrote to memory of 2100 2752 un131692.exe 85 PID 2752 wrote to memory of 1908 2752 un131692.exe 100 PID 2752 wrote to memory of 1908 2752 un131692.exe 100 PID 2752 wrote to memory of 1908 2752 un131692.exe 100 PID 1908 wrote to memory of 5672 1908 qu4726.exe 101 PID 1908 wrote to memory of 5672 1908 qu4726.exe 101 PID 1908 wrote to memory of 5672 1908 qu4726.exe 101 PID 1524 wrote to memory of 5808 1524 302957e47812a0e1a24ab7e3d6c176d66c028c89550f7abe5c769e889b58754e.exe 104 PID 1524 wrote to memory of 5808 1524 302957e47812a0e1a24ab7e3d6c176d66c028c89550f7abe5c769e889b58754e.exe 104 PID 1524 wrote to memory of 5808 1524 302957e47812a0e1a24ab7e3d6c176d66c028c89550f7abe5c769e889b58754e.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\302957e47812a0e1a24ab7e3d6c176d66c028c89550f7abe5c769e889b58754e.exe"C:\Users\Admin\AppData\Local\Temp\302957e47812a0e1a24ab7e3d6c176d66c028c89550f7abe5c769e889b58754e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un131692.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un131692.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4994.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4994.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 11044⤵
- Program crash
PID:3012
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4726.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4726.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 13844⤵
- Program crash
PID:5748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si951040.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si951040.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2100 -ip 21001⤵PID:3300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1908 -ip 19081⤵PID:5696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD57632cc33d0f2462c9b323a31f1c28c25
SHA1834ea233dfa1e9c5d68f06b6d621e3931c1f8a5b
SHA25626034e4eddf460e9499798a0d2554702ba99554af08a1d9c9cbe289e2893f9d6
SHA5121bc1c6a63681508eca2cc0527277ff719c35f47c37e9e794e51ec659ee0bdb5728ffd8c4b04e8173c6bf1ffccd50eee83c2195776df6991058bfc2d2bb21c561
-
Filesize
633KB
MD5742454ee982fafd4a9dec7b896b31608
SHA147cb5e15aa66ef355d190c063fb8f8e2dbc229bc
SHA25651f05cf321edaae1b46cc0cee376b1566ad590187f8437a0f2c6753c6454e0ba
SHA512a8203b13f72c20224ed9c657c44b4c1355c37a96662caa2d56f07f5c4ccad1261b13f185e27ebbbc80d5c699549ca8bc6dc2a7a7ab3500743380e8a7bc1e06b7
-
Filesize
230KB
MD5861f296f30e031bfe62adccd0b15ccb8
SHA16c7698a5b985730bb05956a63e5a3b695f4526c7
SHA2568c2754f466f6033ceab1e078d0b7b862c624c0cb1b98d5ee7738d0ec986de6a8
SHA51284848ee62d971a53a0ce2ca5a51a4b36f4399ab17e8b0ac6c1f3c2022f32df0869fdec06f8036187121f94598748846acc0d7defccc4b1f782bfab6b9438f44f
-
Filesize
414KB
MD5a503a2340ab2d05a0f529214954271ab
SHA1118c33a2b876011f3f7c869c07ca19230e8d7440
SHA2566a4e4613732d13247d7d107ae6c37f15751134d05100be0089823a396eacd506
SHA51227513a92ca5c1c6687cbc24ae913ee218cb92a32fbe53e70c459cc9988bad1a18384e70f96c4e801bdb251b44be9f974624482a699ef1a594f4c8f759daab41b
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0