Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 02:14
Static task
static1
Behavioral task
behavioral1
Sample
e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74.exe
Resource
win10v2004-20240226-en
General
-
Target
e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74.exe
-
Size
658KB
-
MD5
ed79ba4dae9cb40c1bca1a39d620ebea
-
SHA1
bd4cf643c78b7c15ed434952d452fca2ba860423
-
SHA256
e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74
-
SHA512
3a6a375657f6192c8d13ba7ef489c4a0cedcbcccad630c0a7e014ce47408cf1fb2729950d28c7cec14fbf2965c7099d264a50c76cc2b281f5908741b8b620386
-
SSDEEP
12288:CMrMy90zKgDs4A2ZC9QgUD/49FFaVaL/jeG8Xkt9KO1Fnv82DhPd9mv9CNFna:WyJ43Kai/lDjVA2d1k9T
Malware Config
Extracted
redline
rosto
hueref.eu:4162
-
auth_value
07d81eba8cad42bbd0ae60042d48eac6
Signatures
-
Detects Healer an antivirus disabler dropper 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2588-18-0x00000000008B0000-0x00000000008CA000-memory.dmp healer behavioral1/memory/2588-20-0x0000000000890000-0x00000000008A0000-memory.dmp healer behavioral1/memory/2588-22-0x00000000022E0000-0x00000000022F8000-memory.dmp healer behavioral1/memory/2588-23-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-24-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-26-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-28-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-32-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-34-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-30-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-38-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-36-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-40-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-42-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-44-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-46-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-48-0x00000000022E0000-0x00000000022F2000-memory.dmp healer behavioral1/memory/2588-50-0x00000000022E0000-0x00000000022F2000-memory.dmp healer -
Processes:
urBJ01ko67.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" urBJ01ko67.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection urBJ01ko67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" urBJ01ko67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" urBJ01ko67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" urBJ01ko67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" urBJ01ko67.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/1944-64-0x0000000005140000-0x0000000005184000-memory.dmp family_redline behavioral1/memory/1944-60-0x0000000004AD0000-0x0000000004B16000-memory.dmp family_redline behavioral1/memory/1944-69-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-66-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-71-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-73-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-75-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-77-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-79-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-81-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-83-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-85-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-87-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-89-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-91-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-93-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-95-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-97-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-99-0x0000000005140000-0x000000000517E000-memory.dmp family_redline behavioral1/memory/1944-101-0x0000000005140000-0x000000000517E000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 18 IoCs
Processes:
resource yara_rule behavioral1/memory/2588-18-0x00000000008B0000-0x00000000008CA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-20-0x0000000000890000-0x00000000008A0000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-22-0x00000000022E0000-0x00000000022F8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-23-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-24-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-26-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-28-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-32-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-34-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-30-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-38-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-36-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-40-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-42-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-44-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-46-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-48-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/2588-50-0x00000000022E0000-0x00000000022F2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Executes dropped EXE 3 IoCs
Processes:
ycvS93xA90.exeurBJ01ko67.exewrzh96bG51.exepid process 412 ycvS93xA90.exe 2588 urBJ01ko67.exe 1944 wrzh96bG51.exe -
Processes:
urBJ01ko67.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features urBJ01ko67.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" urBJ01ko67.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74.exeycvS93xA90.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ycvS93xA90.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4260 2588 WerFault.exe urBJ01ko67.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
urBJ01ko67.exepid process 2588 urBJ01ko67.exe 2588 urBJ01ko67.exe 2588 urBJ01ko67.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
urBJ01ko67.exewrzh96bG51.exedescription pid process Token: SeDebugPrivilege 2588 urBJ01ko67.exe Token: SeDebugPrivilege 1944 wrzh96bG51.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74.exeycvS93xA90.exedescription pid process target process PID 216 wrote to memory of 412 216 e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74.exe ycvS93xA90.exe PID 216 wrote to memory of 412 216 e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74.exe ycvS93xA90.exe PID 216 wrote to memory of 412 216 e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74.exe ycvS93xA90.exe PID 412 wrote to memory of 2588 412 ycvS93xA90.exe urBJ01ko67.exe PID 412 wrote to memory of 2588 412 ycvS93xA90.exe urBJ01ko67.exe PID 412 wrote to memory of 2588 412 ycvS93xA90.exe urBJ01ko67.exe PID 412 wrote to memory of 1944 412 ycvS93xA90.exe wrzh96bG51.exe PID 412 wrote to memory of 1944 412 ycvS93xA90.exe wrzh96bG51.exe PID 412 wrote to memory of 1944 412 ycvS93xA90.exe wrzh96bG51.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74.exe"C:\Users\Admin\AppData\Local\Temp\e99a161ff6706406b7e124d74ae465aada2c3264bb52c310a245815b5a1e1e74.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycvS93xA90.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ycvS93xA90.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urBJ01ko67.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\urBJ01ko67.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 10844⤵
- Program crash
PID:4260
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrzh96bG51.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\wrzh96bG51.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2588 -ip 25881⤵PID:2692
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=2588,i,14229658658073991926,6938034815163866135,262144 --variations-seed-version /prefetch:81⤵PID:1720
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
514KB
MD50ec485aa3ad4357584fd393882e1f018
SHA19708200908d8e85790a15551143804d8752dbbb9
SHA256c60993ea779c5938270da01c3ca36d639c2219056312040aa04b5db4029b107d
SHA512884ad03401fb3b469cb3e679497b47cda6fdb2c70a92e34b691738fd7107650beb8aae7b066d099e5c8b700772a32fc1847916a9c59e2626b58c9183b5b7ebd5
-
Filesize
232KB
MD52e26dba8fb0f0a5e89760ad7ed6912fe
SHA1b66d29da92a60aefa3fc5e84e11f6b1af5c4c5a4
SHA25663cf4d05b6d3365cc059f683e6a5b50ed6e5c1c47e9cdf68f99e0fd481853a5f
SHA512527e97acdf0ee505b30a23f7a721324e643aaf2d2c5dbcf1b4918de8eeafa84d1225c048f0fd6bfbdaa568789e81559ca92ab4e9b21c4929ef25b8e6e8a1115b
-
Filesize
290KB
MD50dcb6db316be04c378daade20a9aa75c
SHA1a283f1bdbd0ba99857ad42799b6cf07d9520aac3
SHA256ae562efa5f83ca3cb53ca51d5748ee68a89f17a14457f73bed7f0d379ebdf3b6
SHA512c292ad785c6765630f957b17f75ce0398647c84ca98148a2228f12271971b4bf08ae4d25da08e6b8bc55bea6d976bf4835756af03e760cef98c05c3c1019bce6