Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 01:19
Static task
static1
Behavioral task
behavioral1
Sample
b9ec275f6c38217d38c0f1c76aa71f9de77784d3af16da44357b3f7dab268816.exe
Resource
win10v2004-20241007-en
General
-
Target
b9ec275f6c38217d38c0f1c76aa71f9de77784d3af16da44357b3f7dab268816.exe
-
Size
1.0MB
-
MD5
0ef47ad6942220d8d0634bfa4edb6668
-
SHA1
8bc2a764293494c5913c3af68fe9abaad08ad482
-
SHA256
b9ec275f6c38217d38c0f1c76aa71f9de77784d3af16da44357b3f7dab268816
-
SHA512
45129e1e62602d132007dc430752f277770b1b007b4b369e6bf2ae60b855d5289eae13c5b7d205fc62e0588ba02c55369a490c5f3af85d1f36880e7a1f124336
-
SSDEEP
24576:cy7zoMS+GwFbOxbpkcPYcJlKJD9IZrq21fWnV1Io6Z/agET:LiLrNJGD25qxV1IRyg
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/920-25-0x0000000000800000-0x000000000081A000-memory.dmp healer behavioral1/memory/920-27-0x00000000023E0000-0x00000000023F8000-memory.dmp healer behavioral1/memory/920-55-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-53-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-51-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-49-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-47-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-45-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-43-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-41-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-39-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-37-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-35-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-33-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-31-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-29-0x00000000023E0000-0x00000000023F2000-memory.dmp healer behavioral1/memory/920-28-0x00000000023E0000-0x00000000023F2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr750765.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr750765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr750765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr750765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr750765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr750765.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/5028-2149-0x0000000005410000-0x0000000005442000-memory.dmp family_redline behavioral1/files/0x0011000000023b70-2154.dat family_redline behavioral1/memory/5804-2162-0x0000000000A90000-0x0000000000AC0000-memory.dmp family_redline behavioral1/files/0x0007000000023cc1-2172.dat family_redline behavioral1/memory/5104-2173-0x0000000000E50000-0x0000000000E7E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation qu277919.exe -
Executes dropped EXE 6 IoCs
pid Process 624 un898060.exe 3912 un511644.exe 920 pr750765.exe 5028 qu277919.exe 5804 1.exe 5104 rk298432.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr750765.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr750765.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b9ec275f6c38217d38c0f1c76aa71f9de77784d3af16da44357b3f7dab268816.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un898060.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un511644.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3996 920 WerFault.exe 87 3480 5028 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr750765.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu277919.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk298432.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9ec275f6c38217d38c0f1c76aa71f9de77784d3af16da44357b3f7dab268816.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un898060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un511644.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 920 pr750765.exe 920 pr750765.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 920 pr750765.exe Token: SeDebugPrivilege 5028 qu277919.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1232 wrote to memory of 624 1232 b9ec275f6c38217d38c0f1c76aa71f9de77784d3af16da44357b3f7dab268816.exe 84 PID 1232 wrote to memory of 624 1232 b9ec275f6c38217d38c0f1c76aa71f9de77784d3af16da44357b3f7dab268816.exe 84 PID 1232 wrote to memory of 624 1232 b9ec275f6c38217d38c0f1c76aa71f9de77784d3af16da44357b3f7dab268816.exe 84 PID 624 wrote to memory of 3912 624 un898060.exe 85 PID 624 wrote to memory of 3912 624 un898060.exe 85 PID 624 wrote to memory of 3912 624 un898060.exe 85 PID 3912 wrote to memory of 920 3912 un511644.exe 87 PID 3912 wrote to memory of 920 3912 un511644.exe 87 PID 3912 wrote to memory of 920 3912 un511644.exe 87 PID 3912 wrote to memory of 5028 3912 un511644.exe 100 PID 3912 wrote to memory of 5028 3912 un511644.exe 100 PID 3912 wrote to memory of 5028 3912 un511644.exe 100 PID 5028 wrote to memory of 5804 5028 qu277919.exe 101 PID 5028 wrote to memory of 5804 5028 qu277919.exe 101 PID 5028 wrote to memory of 5804 5028 qu277919.exe 101 PID 624 wrote to memory of 5104 624 un898060.exe 104 PID 624 wrote to memory of 5104 624 un898060.exe 104 PID 624 wrote to memory of 5104 624 un898060.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9ec275f6c38217d38c0f1c76aa71f9de77784d3af16da44357b3f7dab268816.exe"C:\Users\Admin\AppData\Local\Temp\b9ec275f6c38217d38c0f1c76aa71f9de77784d3af16da44357b3f7dab268816.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un898060.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un898060.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un511644.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un511644.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr750765.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr750765.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 10845⤵
- Program crash
PID:3996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu277919.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu277919.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 11885⤵
- Program crash
PID:3480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk298432.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk298432.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 920 -ip 9201⤵PID:652
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5028 -ip 50281⤵PID:5744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
801KB
MD50f1eee0004a02743c5b4ab58acf323a8
SHA1e1c80f7d9876431f56442efc85dbe4073fe885dd
SHA2563319285cbfd7027eb39337067b7651f453bf2cb71f9c6242359a67603aa71f01
SHA5123ba579e7d857b74f36153236e1003c32f9e1a3bb8a66e4f2cdba440ba982b68ce0676137c8cfd13223bba212df544ead8f1d3e2ce49e35d7f125fa902278f130
-
Filesize
168KB
MD5d0aa3a76e86a7fb3cb5e9acfacff18e0
SHA130ef9588e2db5a755e08bd241816bc84a5ebc857
SHA2563b55771a6c541594353fca8a240707c99617342d21ff600f60dbb2b977b789ce
SHA5121a8301a8f73a4ba641a507434e3ad939d639bc6914875628a2492f13bed8fadef20e13090595c29d92c606b415c5d71ca236c5308841b17b53550872cb4100b4
-
Filesize
647KB
MD5ccd7d822ac028f2979ac3ba48fa4ce89
SHA15b2fa20bb75f2e7035f46c4950721af7b4755b5a
SHA2560cfa059937cfba75c9f7604591d5071780fd5c81526b9b8ef31a129ab31f424b
SHA512a279b07a51040c310701f64cb83a49fcfe60c55882483ad8b5a904c9976374d5805d925b12a35c90516e807cd984f7641646e2a67f397a927fb91301e6ee1b77
-
Filesize
243KB
MD56c153f3e2067c95eb24f83c9905decc8
SHA1359e057af6f81f41b4719e61a6ce5855a9a23317
SHA256388bb536f080faf05859c76471e5e849b77556cda1b9c812217084cf73f084b6
SHA512e6b327711ad71e37b7ca91df9af4595f138d9f60c5f92e1c613cdd20a1413d343058d5866671dbddadbd421c6076daff447f3d9c26826a99eb85fb875dcfdea8
-
Filesize
426KB
MD59945b8552f70a0cf6201ea21cd4b7174
SHA1df2a13b44f1e1b19d5654372543f120420c01168
SHA25611e97d217737a8130264f37f3b90eb3d4e75a1766232094d0ce243dc5b60d2d8
SHA512e8c7cd87ffb3f117d0b81d728bb87dea7fcf269b56e983260d5770253a3a8fa130f5e6e8c6201b6d1b0ccf41344bfb5040909bcb90fab62ef69ba19ce05384b6
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0