Analysis
-
max time kernel
105s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 04:12
Static task
static1
Behavioral task
behavioral1
Sample
7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe
Resource
win10v2004-20241007-en
General
-
Target
7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe
-
Size
916KB
-
MD5
c9597a24387974618db4668c36b23f09
-
SHA1
076d01def9c3e356d9e48a326a87950f43922648
-
SHA256
7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557
-
SHA512
7c7f8820d88ff05eba14733a3e9e8c10377e8896e4bef9f0901446c15d972faab910063c3b5c4f31ea42cee3136a7496cf9531681f2cfb22930673e151b3cb49
-
SSDEEP
12288:pMrJy90ZYFcv+IOdO4EZ+W7YfOoF6xYZbugh8Vk6jgNnTiWDcier9OPsrvV8L3lq:gy8NOdGZ5cxqM6itKQ3PCU3Ihai
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
linos
77.91.124.145:4125
-
auth_value
85221849d0efabfea4d7563bb7454724
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tz6679.exe healer behavioral1/memory/2116-22-0x0000000000160000-0x000000000016A000-memory.dmp healer behavioral1/memory/2804-29-0x0000000002460000-0x000000000247A000-memory.dmp healer behavioral1/memory/2804-31-0x0000000002500000-0x0000000002518000-memory.dmp healer behavioral1/memory/2804-57-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-55-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-53-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-51-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-49-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-47-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-59-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-45-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-43-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-41-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-39-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-37-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-35-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-33-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/2804-32-0x0000000002500000-0x0000000002512000-memory.dmp healer -
Healer family
-
Processes:
v6086Zm.exetz6679.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v6086Zm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz6679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz6679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz6679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v6086Zm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v6086Zm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v6086Zm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz6679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz6679.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz6679.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v6086Zm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v6086Zm.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1408-2149-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4296-2162-0x00000000009A0000-0x00000000009D0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xvDAW58.exe family_redline behavioral1/memory/5880-2173-0x0000000000970000-0x00000000009A0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
w49qN55.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation w49qN55.exe -
Executes dropped EXE 7 IoCs
Processes:
zap4612.exezap3451.exetz6679.exev6086Zm.exew49qN55.exe1.exexvDAW58.exepid process 3116 zap4612.exe 4496 zap3451.exe 2116 tz6679.exe 2804 v6086Zm.exe 1408 w49qN55.exe 4296 1.exe 5880 xvDAW58.exe -
Processes:
tz6679.exev6086Zm.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz6679.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v6086Zm.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v6086Zm.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exezap4612.exezap3451.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap4612.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap3451.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2240 2804 WerFault.exe v6086Zm.exe 5776 1408 WerFault.exe w49qN55.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
w49qN55.exe1.exexvDAW58.exe7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exezap4612.exezap3451.exev6086Zm.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w49qN55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xvDAW58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap4612.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap3451.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6086Zm.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
tz6679.exev6086Zm.exepid process 2116 tz6679.exe 2116 tz6679.exe 2804 v6086Zm.exe 2804 v6086Zm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tz6679.exev6086Zm.exew49qN55.exedescription pid process Token: SeDebugPrivilege 2116 tz6679.exe Token: SeDebugPrivilege 2804 v6086Zm.exe Token: SeDebugPrivilege 1408 w49qN55.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exezap4612.exezap3451.exew49qN55.exedescription pid process target process PID 4236 wrote to memory of 3116 4236 7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe zap4612.exe PID 4236 wrote to memory of 3116 4236 7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe zap4612.exe PID 4236 wrote to memory of 3116 4236 7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe zap4612.exe PID 3116 wrote to memory of 4496 3116 zap4612.exe zap3451.exe PID 3116 wrote to memory of 4496 3116 zap4612.exe zap3451.exe PID 3116 wrote to memory of 4496 3116 zap4612.exe zap3451.exe PID 4496 wrote to memory of 2116 4496 zap3451.exe tz6679.exe PID 4496 wrote to memory of 2116 4496 zap3451.exe tz6679.exe PID 4496 wrote to memory of 2804 4496 zap3451.exe v6086Zm.exe PID 4496 wrote to memory of 2804 4496 zap3451.exe v6086Zm.exe PID 4496 wrote to memory of 2804 4496 zap3451.exe v6086Zm.exe PID 3116 wrote to memory of 1408 3116 zap4612.exe w49qN55.exe PID 3116 wrote to memory of 1408 3116 zap4612.exe w49qN55.exe PID 3116 wrote to memory of 1408 3116 zap4612.exe w49qN55.exe PID 1408 wrote to memory of 4296 1408 w49qN55.exe 1.exe PID 1408 wrote to memory of 4296 1408 w49qN55.exe 1.exe PID 1408 wrote to memory of 4296 1408 w49qN55.exe 1.exe PID 4236 wrote to memory of 5880 4236 7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe xvDAW58.exe PID 4236 wrote to memory of 5880 4236 7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe xvDAW58.exe PID 4236 wrote to memory of 5880 4236 7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe xvDAW58.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe"C:\Users\Admin\AppData\Local\Temp\7bda36f550427233cf43565fcc9ddbe3d5dc04c9fdaa7eac5b82053dc686e557.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4612.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap4612.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3451.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap3451.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tz6679.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\tz6679.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2116
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6086Zm.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v6086Zm.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 10805⤵
- Program crash
PID:2240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w49qN55.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\w49qN55.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1408 -s 14964⤵
- Program crash
PID:5776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xvDAW58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\xvDAW58.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2804 -ip 28041⤵PID:532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1408 -ip 14081⤵PID:988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD538cf56b3e2f40903f80bfbd9f19ab986
SHA149ffb92753778b12b108a43665c238957b2917fd
SHA25692cbb2470b46ab989e2fcb32e6c3a89b9c2f823907ecdf4d2922cf31126007ca
SHA512f69cd6ef7087146320505146dd6032a6ae8f50ac496d20eaa10732b7fde0b8a43756830e683ec418cb6ad3a44a57bb81f57a27a048325115411eaad9b41d2a4f
-
Filesize
763KB
MD5342dbbd8aee4ab8a2eadce57f0dfbe48
SHA11246f8a8ef6ed06ee9b34653164f07be1a501c08
SHA2562b5a413b35954913ccd89d0d19e7e545a250b953141c86984bb05bd96c291cc4
SHA512b4e7c7a642c86004509821b3634e8b5a492321bbee9729b358bbe1b1458734faedb9c7d7a461733ffa5e4634642b6b4b19171af1f527a9cf9676cb08b28d136c
-
Filesize
417KB
MD510d5a600a23096da6bce20bf3bffe6f2
SHA18137d63516625524bc48a8f565635b71ebe5e4d1
SHA256d77c5a8b7baefc48d16efffd8b200f3cb76b5ff7525e12045ef421dfc51ce277
SHA512a46862eb29aab1eedc3153baaab8eed83fff619c65ed0d90604bdc09ec1019dec0ee5b3e305da63d52340c2cc8872941868183c6b5bc07c6e2dc00aee81a28d5
-
Filesize
315KB
MD5088cad1797400a44c35ef69a37c481b4
SHA130b1f4bbe9f832286e383c8fb71e11b1dc06de8e
SHA256c8065172343319866e2a07befe06ab4153902423ac3a88a23654d9dc8821b9fc
SHA512950c586dfbb75e4b21f1174ad365178dc0eace9a1843505269c9645ce5cef76abf807b3e4f74e1d809ae4db6b0918c10c3cdf355c11b6106d4f7a22d5de14438
-
Filesize
12KB
MD5835fadd2e0593f34a427b465a15e74a4
SHA1f250505f5381ddfe1d4620b6d2721f6db9d60f40
SHA25649539ff01b688c7ebb4a28b20b60796123a759b41cc67c404781dfbc89e11c29
SHA51293b06dec22e362b385b301f75ea31c26a0e42a34949a43242d82502276a7aa8a7acf72c3a4fbd4b93f2887f57ca1d96b799b38794baf7509b6ad1dd47351f520
-
Filesize
233KB
MD54c6138d8c460f44a9d802e5e41236d38
SHA1f5ae4d89277c1c9979b8c425d5d581aee8b8a485
SHA256b25b517fff55cd2a3b55f15146145f392f37fd9d0f7ea3947f7eaa2c6eb9a7ae
SHA5127c5c9dda5802560753286051b7dea0368421d92460d9fdb679232f05ad28b09e361f2c5d8a3128e4b264cf2a173331b1e8f2fbdd3ff1cc6d5c13c307e7027ff1
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0