Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exe
Resource
win10v2004-20241007-en
General
-
Target
e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exe
-
Size
815KB
-
MD5
4a106ec971c38cecafa9db7ecef432ed
-
SHA1
b4c0f66697d83686cc8e2e8540bfae5b19023689
-
SHA256
e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa
-
SHA512
c582d4152c7bc529c21c509db1288e8776d8c36e504019ced5a25a23b51afdf883d6d97e68753295ec63178f9bc0df5d9de62c3f6ed0ea7d998fe1b76ed0cbfb
-
SSDEEP
12288:WMrGy90lBM3yhOhTD8PrFpNULP23mgSt+3JrSpVbW8qSn3:ky+BmMPHNw2RiWkVbPt3
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3604-19-0x00000000027B0000-0x00000000027CA000-memory.dmp healer behavioral1/memory/3604-21-0x0000000002930000-0x0000000002948000-memory.dmp healer behavioral1/memory/3604-26-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-49-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-47-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-45-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-43-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-41-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-39-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-37-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-35-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-33-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-31-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-29-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-27-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-23-0x0000000002930000-0x0000000002942000-memory.dmp healer behavioral1/memory/3604-22-0x0000000002930000-0x0000000002942000-memory.dmp healer -
Healer family
-
Processes:
pro3626.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3626.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3626.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2972-2143-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3556-2156-0x00000000004D0000-0x0000000000500000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si611854.exe family_redline behavioral1/memory/6132-2167-0x0000000000B50000-0x0000000000B7E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu7122.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation qu7122.exe -
Executes dropped EXE 5 IoCs
Processes:
un226491.exepro3626.exequ7122.exe1.exesi611854.exepid process 4204 un226491.exe 3604 pro3626.exe 2972 qu7122.exe 3556 1.exe 6132 si611854.exe -
Processes:
pro3626.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3626.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3626.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exeun226491.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un226491.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 4476 3604 WerFault.exe pro3626.exe 4824 2972 WerFault.exe qu7122.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
si611854.exee209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exeun226491.exepro3626.exequ7122.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si611854.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un226491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu7122.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro3626.exepid process 3604 pro3626.exe 3604 pro3626.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro3626.exequ7122.exedescription pid process Token: SeDebugPrivilege 3604 pro3626.exe Token: SeDebugPrivilege 2972 qu7122.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exeun226491.exequ7122.exedescription pid process target process PID 3100 wrote to memory of 4204 3100 e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exe un226491.exe PID 3100 wrote to memory of 4204 3100 e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exe un226491.exe PID 3100 wrote to memory of 4204 3100 e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exe un226491.exe PID 4204 wrote to memory of 3604 4204 un226491.exe pro3626.exe PID 4204 wrote to memory of 3604 4204 un226491.exe pro3626.exe PID 4204 wrote to memory of 3604 4204 un226491.exe pro3626.exe PID 4204 wrote to memory of 2972 4204 un226491.exe qu7122.exe PID 4204 wrote to memory of 2972 4204 un226491.exe qu7122.exe PID 4204 wrote to memory of 2972 4204 un226491.exe qu7122.exe PID 2972 wrote to memory of 3556 2972 qu7122.exe 1.exe PID 2972 wrote to memory of 3556 2972 qu7122.exe 1.exe PID 2972 wrote to memory of 3556 2972 qu7122.exe 1.exe PID 3100 wrote to memory of 6132 3100 e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exe si611854.exe PID 3100 wrote to memory of 6132 3100 e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exe si611854.exe PID 3100 wrote to memory of 6132 3100 e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exe si611854.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exe"C:\Users\Admin\AppData\Local\Temp\e209de4ba3a4b0187846f2d8057d8d22243b15384b174558ac4ddaeaefaf01fa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226491.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226491.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3626.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3626.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 11044⤵
- Program crash
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7122.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7122.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 13804⤵
- Program crash
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si611854.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si611854.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3604 -ip 36041⤵PID:1728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2972 -ip 29721⤵PID:3088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD54379149ede3701760e27aebcf10f6a65
SHA1f46ee8d21cf866b0554a1a54ba9dfc31fac3a660
SHA25659f153cc4c686707120b172f2a3176b3a44591a4b9c75e90f477573374454c51
SHA512251849747b838dc88c516af4f2cfddfdf0b5425f3e94a8b99ed2dabfb57be27d4897a3a8a3049c998a49a13528132808837cae2a6003291c884b3e8d0ea33018
-
Filesize
661KB
MD5c70e76da262afb96045176f91f86c8d2
SHA1fc2b9b205baf6f309812a900942fc949a478c2c4
SHA25608c5f2e338a066972b292a4f2a73477a60a96af4f51017089752aafebff77126
SHA5124d0646e535a26eeb066b9750e96a23ba4e9d14410731980edf10cac58bafa93a64f89f47ce540c0b6d7babe28c92e0e6ff2fc777f38a8215b6639675956101fb
-
Filesize
332KB
MD54eb514f064cdb5796188122c95578c8f
SHA19c83b3bdef301a93ae311731a1bd2a31d0aa9daa
SHA256df2bf2080e60f77696b9c215591b75b78645b19cb69df1470e28e6764adb7aa2
SHA512f3c457cfae88c00ad52501525d31ebadff4bc498ac918e44a6d7f6f39ca21eb79fbb2b31abcab9a8e60f76f0f512a30e9fcd9b30039710c2f74813145b461736
-
Filesize
495KB
MD53ba5cd209789d470fb0d3d0ebfc2e822
SHA1a2bf93472bb9b91a195516cf6cd46f753c0844ac
SHA256e520a89c5e7477172ebff716b67c1b76aa13f8b0df1e7efa0b02bee78364b482
SHA512a0aa45f7c110df439b7f990dc7dfbf69e63641d7f6b700c6fb3bd1995d0750294593ad8e4c38094fa860f105cd5b394c5475a278579cb372492c2b95657afe64
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0