Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:28
Static task
static1
Behavioral task
behavioral1
Sample
90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554.exe
Resource
win10v2004-20241007-en
General
-
Target
90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554.exe
-
Size
811KB
-
MD5
4de5051dd0d81c7fcc20683a193b83b1
-
SHA1
b4900821cc258eed86c172303d852e9cff290a01
-
SHA256
90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554
-
SHA512
130cfc6bd14b6f93954a5f4079116a2fb9f4f97590d5014ca8a56add4767e528abf9d0420053c2dcef8acb1330eed479cb28b0887aaf6b7c7d9ac7c0c92d0740
-
SSDEEP
12288:uy90vbZx1AaagxkNamvKEDk6vGqg2BoNE6uvLzRsTdv5:uy8DmaaxNryEDZwNEpH6
Malware Config
Extracted
redline
gena
185.161.248.73:4164
-
auth_value
d05bf43eef533e262271449829751d07
Extracted
redline
dark
185.161.248.73:4164
-
auth_value
ae85b01f66afe8770afeed560513fc2d
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1804-19-0x0000000002440000-0x000000000245A000-memory.dmp healer behavioral1/memory/1804-21-0x0000000004DA0000-0x0000000004DB8000-memory.dmp healer behavioral1/memory/1804-43-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-49-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-47-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-45-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-41-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-39-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-37-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-35-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-34-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-31-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-30-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-27-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-25-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-23-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer behavioral1/memory/1804-22-0x0000000004DA0000-0x0000000004DB3000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 58155167.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 58155167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 58155167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 58155167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 58155167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 58155167.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/436-2209-0x0000000005760000-0x0000000005792000-memory.dmp family_redline behavioral1/files/0x000b000000023ca3-2214.dat family_redline behavioral1/memory/5936-2222-0x0000000000230000-0x000000000025E000-memory.dmp family_redline behavioral1/files/0x0007000000023c9f-2231.dat family_redline behavioral1/memory/4976-2233-0x0000000000530000-0x0000000000560000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation rk262741.exe -
Executes dropped EXE 5 IoCs
pid Process 3236 un099404.exe 1804 58155167.exe 436 rk262741.exe 5936 1.exe 4976 si354507.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 58155167.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 58155167.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un099404.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2996 1804 WerFault.exe 85 2216 436 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk262741.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si354507.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un099404.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58155167.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1804 58155167.exe 1804 58155167.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1804 58155167.exe Token: SeDebugPrivilege 436 rk262741.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4812 wrote to memory of 3236 4812 90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554.exe 83 PID 4812 wrote to memory of 3236 4812 90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554.exe 83 PID 4812 wrote to memory of 3236 4812 90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554.exe 83 PID 3236 wrote to memory of 1804 3236 un099404.exe 85 PID 3236 wrote to memory of 1804 3236 un099404.exe 85 PID 3236 wrote to memory of 1804 3236 un099404.exe 85 PID 3236 wrote to memory of 436 3236 un099404.exe 95 PID 3236 wrote to memory of 436 3236 un099404.exe 95 PID 3236 wrote to memory of 436 3236 un099404.exe 95 PID 436 wrote to memory of 5936 436 rk262741.exe 96 PID 436 wrote to memory of 5936 436 rk262741.exe 96 PID 436 wrote to memory of 5936 436 rk262741.exe 96 PID 4812 wrote to memory of 4976 4812 90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554.exe 99 PID 4812 wrote to memory of 4976 4812 90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554.exe 99 PID 4812 wrote to memory of 4976 4812 90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554.exe"C:\Users\Admin\AppData\Local\Temp\90828342ef5951e31bbe745a2ebd89dfeab4209d5bbadb7094cf399eda50a554.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un099404.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un099404.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\58155167.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\58155167.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 10804⤵
- Program crash
PID:2996
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk262741.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk262741.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 436 -s 15244⤵
- Program crash
PID:2216
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si354507.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si354507.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4976
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1804 -ip 18041⤵PID:2068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 436 -ip 4361⤵PID:6048
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
170KB
MD51d2800a4212dff3f0709b4422fb1c0cb
SHA1805f7a134dc498e23ad83c7d715acb7f8465edd6
SHA256e99e10b890daac654ea516879f1b054a90d2df8761582e0fc5d7faa7bed568fc
SHA512b74050450839c701125f381c923374b7a6c0762b778ec99ba7e1a5f0da4dc4e92ebba0c4cceae5381b8744e1f8db11f5c4c9e79b4d21aab15bfed2aa3ce73e14
-
Filesize
657KB
MD555a8c5337df5abfe5bbfd6c509a8e55a
SHA13ae4aa08aa7259e38fc4995b57eba0c14b10748f
SHA256eac162f38bf58336a83e3ad0b4e8e30571563532b89e22a7b8df4fc732a4b2f7
SHA512215d915a3a879dd4bf0627bcb6fac365aa1f922784d899cfef9827769432d8ce945ba94468428b439d493e7a00f47960aa424c646eadb7e95ed3d2de94768365
-
Filesize
391KB
MD5a2c5cc5c3ab061c6281e963b689ac7ac
SHA10e0f6590c30a409582fc381046f35b33bf8cf769
SHA25687201dc1b970e4168b403e9b675c53e466e2aff30b16d089a8a165307b413946
SHA512a45e56bcddc872aa593b6ae2bfd2af7807fe3552f816d8efd2d5eb1d62b3e38e05612689667a0de33715ae66391040bf2d440bded6bdcee5fc43432b640e8306
-
Filesize
574KB
MD5069221c64599736b801333f9ed3208ba
SHA1c45ffe85b9ecf484a29b18d3f10cce195d0e64da
SHA256708efc2eae88c13b8bf97047b46375e938ea567654e5a6d5e76b598e5d4cbbce
SHA512ee19f8f2656339729d4c7670c7f2b9ba67927392b666659a9c6de11c3a32515afd5b1755139a836abad81a7b9b3aeda96287e8182e54a437cdd3b46c3b4f3cff
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf