Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
5f9bd7332b8d31c2290eec949c43f82c761c13f9cb6bee08d9956c9fcf7df749.exe
Resource
win10v2004-20241007-en
General
-
Target
5f9bd7332b8d31c2290eec949c43f82c761c13f9cb6bee08d9956c9fcf7df749.exe
-
Size
934KB
-
MD5
0312d2f8c5f5cebec1ade9135b6671f8
-
SHA1
3e763c91f06272891eb4a92e24cad9ef555a9e29
-
SHA256
5f9bd7332b8d31c2290eec949c43f82c761c13f9cb6bee08d9956c9fcf7df749
-
SHA512
8ab4d27e230e4103b4594a0c1cabdef829ec3b2637f2218dc6a37930505828b4428329ffd4a80b7717d514d2fc85fbc3c769e6ba36e1b58c29dff70217741aed
-
SSDEEP
12288:CMr6y90RtYZfzQsDlukFTDc8Woh4mFrJVgjR2uN7cu2FKZ8H55V99oAN/GWAWNJi:syCYfbTQc2mF/gjRfN7HZ8H/1NOo6Lz
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
lenox
77.91.124.145:4125
-
auth_value
a5c9c17a250a084c5fd706c1df7c2d4e
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
resource yara_rule behavioral1/files/0x000b000000023b78-19.dat healer behavioral1/memory/1424-22-0x00000000004C0000-0x00000000004CA000-memory.dmp healer behavioral1/memory/2648-29-0x00000000020E0000-0x00000000020FA000-memory.dmp healer behavioral1/memory/2648-31-0x00000000025B0000-0x00000000025C8000-memory.dmp healer behavioral1/memory/2648-32-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-59-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-57-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-55-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-53-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-52-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-50-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-47-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-45-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-43-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-41-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-39-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-37-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-35-0x00000000025B0000-0x00000000025C2000-memory.dmp healer behavioral1/memory/2648-33-0x00000000025B0000-0x00000000025C2000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v2267Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz5785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz5785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v2267Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz5785.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v2267Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v2267Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v2267Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v2267Ye.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz5785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz5785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz5785.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2904-2149-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x000f000000023b70-2154.dat family_redline behavioral1/memory/5128-2162-0x0000000000DF0000-0x0000000000E20000-memory.dmp family_redline behavioral1/files/0x000a000000023b73-2168.dat family_redline behavioral1/memory/5320-2171-0x0000000000120000-0x0000000000150000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation w36ZL63.exe -
Executes dropped EXE 7 IoCs
pid Process 1296 zap7114.exe 3616 zap9735.exe 1424 tz5785.exe 2648 v2267Ye.exe 2904 w36ZL63.exe 5128 1.exe 5320 xZHiz29.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz5785.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v2267Ye.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v2267Ye.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5f9bd7332b8d31c2290eec949c43f82c761c13f9cb6bee08d9956c9fcf7df749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap7114.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap9735.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4668 2648 WerFault.exe 96 5244 2904 WerFault.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f9bd7332b8d31c2290eec949c43f82c761c13f9cb6bee08d9956c9fcf7df749.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap7114.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap9735.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2267Ye.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w36ZL63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xZHiz29.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1424 tz5785.exe 1424 tz5785.exe 2648 v2267Ye.exe 2648 v2267Ye.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1424 tz5785.exe Token: SeDebugPrivilege 2648 v2267Ye.exe Token: SeDebugPrivilege 2904 w36ZL63.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3424 wrote to memory of 1296 3424 5f9bd7332b8d31c2290eec949c43f82c761c13f9cb6bee08d9956c9fcf7df749.exe 83 PID 3424 wrote to memory of 1296 3424 5f9bd7332b8d31c2290eec949c43f82c761c13f9cb6bee08d9956c9fcf7df749.exe 83 PID 3424 wrote to memory of 1296 3424 5f9bd7332b8d31c2290eec949c43f82c761c13f9cb6bee08d9956c9fcf7df749.exe 83 PID 1296 wrote to memory of 3616 1296 zap7114.exe 84 PID 1296 wrote to memory of 3616 1296 zap7114.exe 84 PID 1296 wrote to memory of 3616 1296 zap7114.exe 84 PID 3616 wrote to memory of 1424 3616 zap9735.exe 86 PID 3616 wrote to memory of 1424 3616 zap9735.exe 86 PID 3616 wrote to memory of 2648 3616 zap9735.exe 96 PID 3616 wrote to memory of 2648 3616 zap9735.exe 96 PID 3616 wrote to memory of 2648 3616 zap9735.exe 96 PID 1296 wrote to memory of 2904 1296 zap7114.exe 101 PID 1296 wrote to memory of 2904 1296 zap7114.exe 101 PID 1296 wrote to memory of 2904 1296 zap7114.exe 101 PID 2904 wrote to memory of 5128 2904 w36ZL63.exe 102 PID 2904 wrote to memory of 5128 2904 w36ZL63.exe 102 PID 2904 wrote to memory of 5128 2904 w36ZL63.exe 102 PID 3424 wrote to memory of 5320 3424 5f9bd7332b8d31c2290eec949c43f82c761c13f9cb6bee08d9956c9fcf7df749.exe 105 PID 3424 wrote to memory of 5320 3424 5f9bd7332b8d31c2290eec949c43f82c761c13f9cb6bee08d9956c9fcf7df749.exe 105 PID 3424 wrote to memory of 5320 3424 5f9bd7332b8d31c2290eec949c43f82c761c13f9cb6bee08d9956c9fcf7df749.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f9bd7332b8d31c2290eec949c43f82c761c13f9cb6bee08d9956c9fcf7df749.exe"C:\Users\Admin\AppData\Local\Temp\5f9bd7332b8d31c2290eec949c43f82c761c13f9cb6bee08d9956c9fcf7df749.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap7114.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap7114.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9735.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap9735.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tz5785.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tz5785.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2267Ye.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2267Ye.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 10845⤵
- Program crash
PID:4668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w36ZL63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w36ZL63.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 15324⤵
- Program crash
PID:5244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xZHiz29.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xZHiz29.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2648 -ip 26481⤵PID:3632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 2904 -ip 29041⤵PID:5168
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5b86009831e8d5622adb3766a04489563
SHA15d3c61e02f18c0502d583580aa0e045f27bab631
SHA256c28219dacb5e54eef5877eec7e62a6d88dd5408eb2ae12157fa7fc9143c8bc0f
SHA512532fb8767aa2d6d4fe8b29ce076c4e9a39658f5539bae888f007d9d7a35680a5265d9a44b69bf052321e46808347b152f533062976c374088d844f8cae70070b
-
Filesize
780KB
MD5c628070ceec03fa9e611e6e0c87d8b00
SHA10b0e9a3dd64ca8bff6394f039ea02d75f60f4af8
SHA256c423bfbce903b3114868a87ac0249b74c43c7f3bcb240ef57a2729bbb27d03ab
SHA512cf60a7a99e63d84fa4e0ed826313a10436c001414708e7e702c1217b1e899aa5a35c93d77f858baeba68d0683171a72d8de1f5385049648bb3a66561509ec3ef
-
Filesize
427KB
MD5f9d9b105f1a71139f6859ccfba75fd60
SHA16d49430398e761f3a0058578058362a83873f61d
SHA256fd3d3c784d635ef1be7efc0d3656e340274f7b7233214830db98189b854d0d99
SHA512232ca95d0deb918c19d9ddd6afb665e6187060a29dd6c4266a91a438cdf6d2d5d53b760915c41cf27ea3f281e256bea3e5aa6922fd5cb0258176f4ac85c69974
-
Filesize
324KB
MD52327c725fee8ed67545b392007906600
SHA14d6e526465ec6485f47e2eeb6c01705896eac7a6
SHA256508768d94aba9c126b10cb3e2a6db09d71a7122c4d33ba8e1e27af26348d1115
SHA5126ede949950a8be2fce0e2ea8645353564ac495ab1e4b1404c50cb6636b7eedf495922c8b5a5b8ce3ce3660abf86b30b945cf327dd6fad9da77ba7bb8de3c14f2
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
243KB
MD56653419f2b2a59763fc2d1511f939a14
SHA125043f669d27eac68d27f747cd8b97c47b276b08
SHA256a559049f87f818c3f0d8eada28deb76a0e084794d4ca37eb502a609889730028
SHA51260a6bd107a88dd14e9c8e0963be10cd27cd51a5e55337494d2e779ffb630d6b103eb7d042d0eb637ee10b7a207452e5ab441f4cb54a03967222d8372fad22d93
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0