Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0.exe
Resource
win10v2004-20241007-en
General
-
Target
35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0.exe
-
Size
1.0MB
-
MD5
359f32990fc31a909ae68f406e7b919b
-
SHA1
916ac95df563144cd27469899da5cb733836ce84
-
SHA256
35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0
-
SHA512
ad28cbd0e36bb76863487825ffa06b93584ef04efb870a8edcca76a160783ad9e652356b5352fa1edbf7aa4cd528f8d64724b6894911790e3440e53772aeea10
-
SSDEEP
24576:Ky1mKkgzosqQ6W5mJUslVBDEIHE2Ga1vhArnTAcMe6q:R1mpgcsq9WEWsNDPkWS0m6
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/5100-25-0x0000000002110000-0x000000000212A000-memory.dmp healer behavioral1/memory/5100-27-0x0000000002740000-0x0000000002758000-memory.dmp healer behavioral1/memory/5100-55-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-53-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-51-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-49-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-48-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-45-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-43-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-41-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-39-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-37-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-35-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-33-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-31-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-28-0x0000000002740000-0x0000000002752000-memory.dmp healer behavioral1/memory/5100-29-0x0000000002740000-0x0000000002752000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr801135.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr801135.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr801135.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr801135.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr801135.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr801135.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3752-2149-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x0010000000023ae1-2154.dat family_redline behavioral1/memory/5160-2162-0x0000000000C50000-0x0000000000C80000-memory.dmp family_redline behavioral1/files/0x0008000000023ace-2171.dat family_redline behavioral1/memory/4912-2173-0x0000000000AB0000-0x0000000000ADE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation qu274953.exe -
Executes dropped EXE 6 IoCs
pid Process 412 un923956.exe 4788 un850374.exe 5100 pr801135.exe 3752 qu274953.exe 5160 1.exe 4912 rk742740.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr801135.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr801135.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un923956.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un850374.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3832 5100 WerFault.exe 87 1960 3752 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk742740.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un923956.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un850374.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr801135.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu274953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5100 pr801135.exe 5100 pr801135.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5100 pr801135.exe Token: SeDebugPrivilege 3752 qu274953.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3848 wrote to memory of 412 3848 35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0.exe 84 PID 3848 wrote to memory of 412 3848 35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0.exe 84 PID 3848 wrote to memory of 412 3848 35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0.exe 84 PID 412 wrote to memory of 4788 412 un923956.exe 86 PID 412 wrote to memory of 4788 412 un923956.exe 86 PID 412 wrote to memory of 4788 412 un923956.exe 86 PID 4788 wrote to memory of 5100 4788 un850374.exe 87 PID 4788 wrote to memory of 5100 4788 un850374.exe 87 PID 4788 wrote to memory of 5100 4788 un850374.exe 87 PID 4788 wrote to memory of 3752 4788 un850374.exe 100 PID 4788 wrote to memory of 3752 4788 un850374.exe 100 PID 4788 wrote to memory of 3752 4788 un850374.exe 100 PID 3752 wrote to memory of 5160 3752 qu274953.exe 101 PID 3752 wrote to memory of 5160 3752 qu274953.exe 101 PID 3752 wrote to memory of 5160 3752 qu274953.exe 101 PID 412 wrote to memory of 4912 412 un923956.exe 104 PID 412 wrote to memory of 4912 412 un923956.exe 104 PID 412 wrote to memory of 4912 412 un923956.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0.exe"C:\Users\Admin\AppData\Local\Temp\35964b5846b162c231a667beeaad116856f7e6164006260405c8f72c00e019e0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923956.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923956.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un850374.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un850374.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr801135.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr801135.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 10845⤵
- Program crash
PID:3832
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu274953.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu274953.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3752 -s 13845⤵
- Program crash
PID:1960
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742740.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk742740.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5100 -ip 51001⤵PID:1984
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3752 -ip 37521⤵PID:1108
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
801KB
MD5053ab560f568210f0ffc5eaa3cd7c4fa
SHA1e1386024dd075aa5f019f9718bdfe76ef03c5052
SHA256f9585ba1612c2691e6dce6007b3c14365778f0be7ab73be918dbd0137db5e556
SHA51295df64dfa73d642648c3d32df1098d40b93afbb7616b32b987ac082ff31cdb085c57695e76a96053000c507f6e50515e12d4618a8dccf901c8130add93d96fb4
-
Filesize
168KB
MD575aba1ff190d55d60624135316197ce5
SHA150a7a4d416e390d1127f62c0e2b79d909482b96d
SHA2561d4a62c20efc4e666a11d7b41ab7980024216dcbdfec8082164e773af807a0f2
SHA512d7bb0215c85928240c003b32a0cb890891a219a939710d213086015a4e55ca246fdf22e43dc801e9480fda0b89361db907590001ba39037d356946cebf80433d
-
Filesize
647KB
MD572e0b077bcf442c7c346f0b2402e0c79
SHA1b861b9fa7ddd33e164e03419bb9e5c39edbf0f22
SHA25606f45967033226a0892e4dc669d86d4d677e12e6db9f5a67aef767e3c29d3f12
SHA5120358a41217d54585e40bcb4360d182b85e0a15124251688e21dfa321d384399380a080b22d7b26d6751bdbf5f769c84855e8a64d0f6529e8ee0e9c60ee96107b
-
Filesize
243KB
MD5fa4396d53707f25a828009a75c48d810
SHA155b6facc055672c01b975df2251d28ab8d9c2e1e
SHA256864367ba95b989b3a66168462ca488c7c7f0dce32c84aac8d34e09f68a948c5e
SHA512791d8ee18534a6b3446d5bade4e109a71b49352ae8bcc301c29e575473ae399c09b3ea15acc4835a90dcd54dc4d20652d4a207dbdfdcaad78c988d0299665ad8
-
Filesize
426KB
MD5e72d7abab9dbed62273562d8089bcd75
SHA160b456a8faa0b1aabb106caff471cd45715285a6
SHA256bf1745b3d973b1b3426bc41e5aa9e2178fbf68addae3c1bd483c289e3da71faa
SHA512eb7c61bd09757930151e45e18b9c3c60f7f8510f4bc61924b256986b70bd31bb283667065d0586f213abf6307f0e629e7f314ba4933fd8440e7bfa212c72fa71
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0