Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:55
Static task
static1
Behavioral task
behavioral1
Sample
e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exe
Resource
win10v2004-20241007-en
General
-
Target
e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exe
-
Size
794KB
-
MD5
0b2e806bbd1000d043fbdbc9a1d7269c
-
SHA1
54909f834b4868fd37283b3e0d88227b7c589e56
-
SHA256
e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a
-
SHA512
c8c7d206c12a6c4da408181149b399854408bfc471eda7ce35e437bddaca0fd44335c90d44861ba4f46ddf2908903b2b6bf19b83e33f8802a881101f70bfd7c9
-
SSDEEP
24576:HyPiGRrnWX48/NwdO6Y5MdQ2WuACRA5t:SP7mp6dJQ2WvCE
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/656-19-0x0000000002040000-0x000000000205A000-memory.dmp healer behavioral1/memory/656-21-0x00000000025E0000-0x00000000025F8000-memory.dmp healer behavioral1/memory/656-47-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-49-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-45-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-43-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-41-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-39-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-37-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-35-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-33-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-31-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-27-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-25-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-23-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-22-0x00000000025E0000-0x00000000025F2000-memory.dmp healer behavioral1/memory/656-29-0x00000000025E0000-0x00000000025F2000-memory.dmp healer -
Healer family
-
Processes:
pro1834.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1834.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1834.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1284-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4808-2155-0x0000000000D20000-0x0000000000D50000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si392460.exe family_redline behavioral1/memory/3184-2166-0x0000000000CE0000-0x0000000000D0E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu1128.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation qu1128.exe -
Executes dropped EXE 5 IoCs
Processes:
un535234.exepro1834.exequ1128.exe1.exesi392460.exepid process 536 un535234.exe 656 pro1834.exe 1284 qu1128.exe 4808 1.exe 3184 si392460.exe -
Processes:
pro1834.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1834.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1834.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exeun535234.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un535234.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2424 656 WerFault.exe pro1834.exe 776 1284 WerFault.exe qu1128.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exeun535234.exepro1834.exequ1128.exe1.exesi392460.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un535234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1834.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1128.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si392460.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1834.exepid process 656 pro1834.exe 656 pro1834.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1834.exequ1128.exedescription pid process Token: SeDebugPrivilege 656 pro1834.exe Token: SeDebugPrivilege 1284 qu1128.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exeun535234.exequ1128.exedescription pid process target process PID 4724 wrote to memory of 536 4724 e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exe un535234.exe PID 4724 wrote to memory of 536 4724 e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exe un535234.exe PID 4724 wrote to memory of 536 4724 e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exe un535234.exe PID 536 wrote to memory of 656 536 un535234.exe pro1834.exe PID 536 wrote to memory of 656 536 un535234.exe pro1834.exe PID 536 wrote to memory of 656 536 un535234.exe pro1834.exe PID 536 wrote to memory of 1284 536 un535234.exe qu1128.exe PID 536 wrote to memory of 1284 536 un535234.exe qu1128.exe PID 536 wrote to memory of 1284 536 un535234.exe qu1128.exe PID 1284 wrote to memory of 4808 1284 qu1128.exe 1.exe PID 1284 wrote to memory of 4808 1284 qu1128.exe 1.exe PID 1284 wrote to memory of 4808 1284 qu1128.exe 1.exe PID 4724 wrote to memory of 3184 4724 e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exe si392460.exe PID 4724 wrote to memory of 3184 4724 e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exe si392460.exe PID 4724 wrote to memory of 3184 4724 e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exe si392460.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exe"C:\Users\Admin\AppData\Local\Temp\e14a83cafb20dcda8084dc7d97dda5703e8bf5f0e17a9b7a49d7134135c4be6a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un535234.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un535234.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1834.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1834.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 10644⤵
- Program crash
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1128.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1128.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 15204⤵
- Program crash
PID:776 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si392460.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si392460.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3184
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 656 -ip 6561⤵PID:2012
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1284 -ip 12841⤵PID:3152
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD51ad1e2bd4210dccdc7f63c7f279bbdbb
SHA1e406c6e88022f55b463c13d91be0ba4acf57aafd
SHA25637f5039e0677b5ea2283413c2b2bc979cb3ff3362047f96885c31860dfcbe7d8
SHA512d7dba97a9b1048e73f549c6d2c923b00d87edefade7a8ab6a0f521a9619ea5e3f7a06e49b49984e76a59c78bdf3916d16a9bbb879e479cfa8fd097b6311a537c
-
Filesize
640KB
MD50a9c10a6d90b423716e82d1c01218a4a
SHA1c7e5e9ffbc6c3fe867228cd28594e037d7cdb184
SHA2568ce7eacc8e8a35483f3059805343bc83b651fb01b91886355f1b132d637ded6c
SHA512933fd61771f0c712a3666a601f18f35d9a2c0825d5db252a5cc838bb42e01ba10679e276f5f551655715bb18982d121b3d4235505c17d52b10933b291b138efc
-
Filesize
241KB
MD52dac5f77b64e774d5c59d7178952b8fc
SHA17748c75a7e38ccc91ab45a7f1489fc6b0ba28a19
SHA25697bcf9573fb67393a419be618dbcd26065de382ac217c4dacc0ef981c65a2735
SHA512458ee93df6462b5a35a632020a601cb2163fa560b4c739341513fb9c3f7787f4910b84928afab0804b5e05512eb3887f33031f4f23c6541889bff35982fdcaa0
-
Filesize
424KB
MD5cbac9df2ab2118e61673c73f238c3579
SHA1b75c46b2423984379310945da77abe3260872716
SHA256cd70f3b218c96f5552de1abf0e9c7fb06b52dd64efed2cfa20342f60bd663950
SHA51279039295a0e9f420536a641c72b835d5dff86dbd7d6f0363a3d3b444465134d6814f3d65ace3a283e65cdaea82e8097066551e7c4adbbb09d0a2a80ae23f6679
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0