Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
84ac944213f329ee37cc5d4a0db02f90db41b692d37397f9fa78c42de420b187.exe
Resource
win10v2004-20241007-en
General
-
Target
84ac944213f329ee37cc5d4a0db02f90db41b692d37397f9fa78c42de420b187.exe
-
Size
1.0MB
-
MD5
552b465cbec053168ea1681e6d351e1e
-
SHA1
6ea0c481f33a4d77c2086de00a38c8285e4f3e15
-
SHA256
84ac944213f329ee37cc5d4a0db02f90db41b692d37397f9fa78c42de420b187
-
SHA512
0fba1f993289f96c47d3babd01d63c02da9a4bf376252ea4402ea331684db0408242e60e1719a4805462964ad5a3996c14bb0f949ba662d59cf9f2981dc528d6
-
SSDEEP
24576:myTR+D2r1dPzX/WkuzY9DKISxesgTEmajIk5:1TwD2r1BX+ku6D1oNfmsIk
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1876-25-0x00000000023F0000-0x000000000240A000-memory.dmp healer behavioral1/memory/1876-27-0x00000000024A0000-0x00000000024B8000-memory.dmp healer behavioral1/memory/1876-37-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-55-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-53-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-52-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-49-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-47-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-45-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-43-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-41-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-39-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-35-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-33-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-31-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-29-0x00000000024A0000-0x00000000024B2000-memory.dmp healer behavioral1/memory/1876-28-0x00000000024A0000-0x00000000024B2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr637474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr637474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr637474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr637474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr637474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr637474.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2620-2148-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x000b000000023c9b-2153.dat family_redline behavioral1/memory/5004-2161-0x0000000000340000-0x0000000000370000-memory.dmp family_redline behavioral1/files/0x0007000000023c97-2170.dat family_redline behavioral1/memory/5456-2172-0x0000000000A10000-0x0000000000A3E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation qu362600.exe -
Executes dropped EXE 6 IoCs
pid Process 3012 un687834.exe 2592 un798231.exe 1876 pr637474.exe 2620 qu362600.exe 5004 1.exe 5456 rk362973.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr637474.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr637474.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 84ac944213f329ee37cc5d4a0db02f90db41b692d37397f9fa78c42de420b187.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un687834.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un798231.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4828 1876 WerFault.exe 85 5548 2620 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu362600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk362973.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84ac944213f329ee37cc5d4a0db02f90db41b692d37397f9fa78c42de420b187.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un687834.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un798231.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr637474.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1876 pr637474.exe 1876 pr637474.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1876 pr637474.exe Token: SeDebugPrivilege 2620 qu362600.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 812 wrote to memory of 3012 812 84ac944213f329ee37cc5d4a0db02f90db41b692d37397f9fa78c42de420b187.exe 82 PID 812 wrote to memory of 3012 812 84ac944213f329ee37cc5d4a0db02f90db41b692d37397f9fa78c42de420b187.exe 82 PID 812 wrote to memory of 3012 812 84ac944213f329ee37cc5d4a0db02f90db41b692d37397f9fa78c42de420b187.exe 82 PID 3012 wrote to memory of 2592 3012 un687834.exe 83 PID 3012 wrote to memory of 2592 3012 un687834.exe 83 PID 3012 wrote to memory of 2592 3012 un687834.exe 83 PID 2592 wrote to memory of 1876 2592 un798231.exe 85 PID 2592 wrote to memory of 1876 2592 un798231.exe 85 PID 2592 wrote to memory of 1876 2592 un798231.exe 85 PID 2592 wrote to memory of 2620 2592 un798231.exe 100 PID 2592 wrote to memory of 2620 2592 un798231.exe 100 PID 2592 wrote to memory of 2620 2592 un798231.exe 100 PID 2620 wrote to memory of 5004 2620 qu362600.exe 101 PID 2620 wrote to memory of 5004 2620 qu362600.exe 101 PID 2620 wrote to memory of 5004 2620 qu362600.exe 101 PID 3012 wrote to memory of 5456 3012 un687834.exe 104 PID 3012 wrote to memory of 5456 3012 un687834.exe 104 PID 3012 wrote to memory of 5456 3012 un687834.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\84ac944213f329ee37cc5d4a0db02f90db41b692d37397f9fa78c42de420b187.exe"C:\Users\Admin\AppData\Local\Temp\84ac944213f329ee37cc5d4a0db02f90db41b692d37397f9fa78c42de420b187.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un687834.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un687834.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un798231.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un798231.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr637474.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr637474.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1876 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 10965⤵
- Program crash
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu362600.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu362600.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 15165⤵
- Program crash
PID:5548
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk362973.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk362973.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1876 -ip 18761⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2620 -ip 26201⤵PID:5948
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
799KB
MD5bd53dd7f3678aaf2ba5dd579f2eaccbd
SHA180f577ac316ea1f4a893deb0753471f83601813a
SHA256b6949bcb6a6e5b5ad88ac5615ef9489cdbff5c67451ce9049bd656aa872bf3c7
SHA512e3b5511e0190ac44c10f6e28c86912878d3591b1bce4e6b090ebe0d621dac1c0d81d8540ef3409e35a5240c7fc0f10ae458c3404cbfdb67c601fe26bcfa49594
-
Filesize
168KB
MD527e8248f8314e5bb50b38b8213371b8c
SHA16221712ab968b619f8e38bd079893e155e5435f6
SHA256297bd5442fe3ff7a3c8180350e0d7e2ec45a5c5380d0ae926e6f312a30678f44
SHA512a4e2f3042dbbcbb79890b1506c44a3abc34dae915881536949b0e0e1aef361a6ac515e608bcabe9b8618387ddbad3fca9210bb038ceb67b2c87329ee64c79365
-
Filesize
645KB
MD5902d1abeb17f256e70439889aec5cb51
SHA1a43cdde7108b4f83a61274ceb717919506f6004f
SHA2568dcd64d0c6d94ca6702cffca6f676eb07af0855b202d8b89cdd2fdc5d0a9dd4f
SHA512edb2b805746e762b9183f60e2876888587bcc95eab3dcc63c351dd2662c4c6fc57b5a8bb9ab1eafa77c951dd7644eed2b059f883d77d742f023a4fafff41c09c
-
Filesize
243KB
MD5b14b88ee1c1c5e3ab58f1c2a8cceb774
SHA128f2cbb7ef4556e04d4c1138e59b85b07b7ad6d9
SHA2562dab0ea4100d90170266f36f29f6a0389305905738f3b7ac326dc3f2cfe1abb3
SHA51216f440de722850ee019a1052ff91064c0520e6cfb142ed28a2b74606f291a253885018d0decd9d32b48f2e386c0d5e3e3d480e5beb11d0c6c72a3e022f6327e7
-
Filesize
426KB
MD5e9598d3e011db1ef9bb0a844e5ea2f52
SHA139cfad09a101da52f93ad5208cd104ffc34f0889
SHA256649f5f5aa44e11f46d7166fdb9323ca26a1c0aeb5a9c8b7250f0622e807b6a2a
SHA512b728789a5445af10592a500d1417281820f1af67daf14bc043896b1827fe771133a23309d7c1a12f351b5b046f9c5351349e4fe41a9f00fbe2fa4fc418d9f1ee
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0