Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 05:44
Static task
static1
Behavioral task
behavioral1
Sample
b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223.exe
Resource
win10v2004-20241007-en
General
-
Target
b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223.exe
-
Size
1.0MB
-
MD5
cb1ac9ae48dffa2ef1dc579553c0e72a
-
SHA1
4d99907fe01c713c2b9a50f88e84507a3a334e7b
-
SHA256
b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223
-
SHA512
25627afc018a9ce683b7cefd452e8b5a8f113b8378f2508b898cb8101ff854f84353e3178d4e4fac966a434bf82dec079c2fe8a861a5476bc7fa29b8c4fc5bbe
-
SSDEEP
24576:gylsBfCtSpmZIStXdi6zSldnDDIupRG6k3BFjADo:nlkfgvZi2SDD0uRG5hA
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2160-25-0x00000000023B0000-0x00000000023CA000-memory.dmp healer behavioral1/memory/2160-27-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/2160-51-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-55-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-53-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-48-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-41-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-28-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2160-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr679774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr679774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr679774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr679774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr679774.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr679774.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4264-2149-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x0012000000023b56-2154.dat family_redline behavioral1/memory/6020-2161-0x0000000000B50000-0x0000000000B80000-memory.dmp family_redline behavioral1/files/0x0007000000023ca3-2172.dat family_redline behavioral1/memory/1640-2173-0x0000000000D00000-0x0000000000D2E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation qu739344.exe -
Executes dropped EXE 6 IoCs
pid Process 4356 un790030.exe 2408 un159047.exe 2160 pr679774.exe 4264 qu739344.exe 6020 1.exe 1640 rk791157.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr679774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr679774.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un790030.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un159047.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4112 2160 WerFault.exe 89 560 4264 WerFault.exe 102 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un790030.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un159047.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr679774.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu739344.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk791157.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2160 pr679774.exe 2160 pr679774.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2160 pr679774.exe Token: SeDebugPrivilege 4264 qu739344.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4384 wrote to memory of 4356 4384 b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223.exe 85 PID 4384 wrote to memory of 4356 4384 b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223.exe 85 PID 4384 wrote to memory of 4356 4384 b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223.exe 85 PID 4356 wrote to memory of 2408 4356 un790030.exe 86 PID 4356 wrote to memory of 2408 4356 un790030.exe 86 PID 4356 wrote to memory of 2408 4356 un790030.exe 86 PID 2408 wrote to memory of 2160 2408 un159047.exe 89 PID 2408 wrote to memory of 2160 2408 un159047.exe 89 PID 2408 wrote to memory of 2160 2408 un159047.exe 89 PID 2408 wrote to memory of 4264 2408 un159047.exe 102 PID 2408 wrote to memory of 4264 2408 un159047.exe 102 PID 2408 wrote to memory of 4264 2408 un159047.exe 102 PID 4264 wrote to memory of 6020 4264 qu739344.exe 103 PID 4264 wrote to memory of 6020 4264 qu739344.exe 103 PID 4264 wrote to memory of 6020 4264 qu739344.exe 103 PID 4356 wrote to memory of 1640 4356 un790030.exe 106 PID 4356 wrote to memory of 1640 4356 un790030.exe 106 PID 4356 wrote to memory of 1640 4356 un790030.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223.exe"C:\Users\Admin\AppData\Local\Temp\b39d242e00e8fd718e77ec147a3ef9160a8b2f064b2f04a521590c5ffe216223.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790030.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790030.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un159047.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un159047.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr679774.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr679774.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 10285⤵
- Program crash
PID:4112
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu739344.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu739344.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 13805⤵
- Program crash
PID:560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk791157.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk791157.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2160 -ip 21601⤵PID:1040
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4264 -ip 42641⤵PID:3704
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
801KB
MD5333c03548d886cbe6e673f206816728a
SHA1425e5c2f0436426badeeacb894194c264b379866
SHA2569299a06bcbb6c4a7eb48e85605c8ceeeebd8fe2594cbb071b81a435fc10dc1d1
SHA512c122cc2dc2173e1872683f9cbda16ab99c6473c551640741c51ace9d3d4d69cfb33d568e70d61d404ae7c9a098ebca076e1899911030d20bec534b8430cc7b5a
-
Filesize
168KB
MD57b0c11d8c8dc6b5f6f402f68d57c8908
SHA1266eab2844ad8249d63b200873f0141f090b0511
SHA25673954715acff80396881ef5755a3ae4494f28a5977b1e4d720b8500408ce0e96
SHA5129ba44353979cfc68992d3543dbc2f5a30d34c3fbf4045df467c15933be3e89e8d88fb47dc340653a05fe094784e726448ac8d4653fe75e7b8d5d6d6f15238b2c
-
Filesize
647KB
MD5f8090a5cb50e5e05bfdf4d5d7e8d8384
SHA124126e2407ff0ba1fee8feba25fa9112d054acdd
SHA2561889035d5a3d58dbf90d2628743c1ad02e33150f88bc480220c3d821cfea034e
SHA51212a50d6f95d7e91a24a6a04e1c7131d22a228db4bd2cd04018ebc976df40f08bb263ad1258ba00565156b334b1aa1125d77f122eaa78645da12069d2c016adb2
-
Filesize
243KB
MD51204349112e18aadbcdb088ad4a056b6
SHA16a0ee0145c9661a40169350db00c59969d6fe5df
SHA2563bbc57179a1a27dbd94819ee3854a635253d3de75199f0e1a34439ce0ea05f75
SHA512f393f01ecd755de9bfce1a3b2aba9a376f36c5900e4c0998089a63a5d487da3c63150c3304905e6d51a8636e0919788b3d9bd40a0740989ef3ff85eef8a2e76e
-
Filesize
426KB
MD58c8371a2e2052b8cd84cd49d6a0e9c38
SHA11039d0eaaddfdec88056caa11ae3b5ee371dbf80
SHA2560d2cb330efe73ce6fb99232b70482e2462f7275922a663f93bfb3885325716b3
SHA5127750ef072175a92b982684b7845760102a483c6d2d8b1da45b5b685f1c21ab8d655529acce89d74299b97e15ba19189f74ab043a968fcf24f9d90d3279a05cb1
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0