Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:46
Static task
static1
Behavioral task
behavioral1
Sample
e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exe
Resource
win10v2004-20241007-en
General
-
Target
e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exe
-
Size
815KB
-
MD5
40629fc5565dcfd3360b51e8943c7659
-
SHA1
09abd133259d9ed778e56a3d9b199550cf1680d5
-
SHA256
e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d
-
SHA512
8eaf8202d6ea8770c68df66ecd89cc655c08b14722c1c91e6cf98252640fdf5ea945bead4ec6303c0d2c5375a7a987cea59909617bec0e2838d74d6a5a9a97b9
-
SSDEEP
24576:PyD93/gEOZ5a426xkDYx2DyGbroIYlmp:aDF/gEO7xkKYJoIYlm
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2780-19-0x0000000002550000-0x000000000256A000-memory.dmp healer behavioral1/memory/2780-21-0x0000000002840000-0x0000000002858000-memory.dmp healer behavioral1/memory/2780-33-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-49-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-47-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-45-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-43-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-41-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-39-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-37-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-35-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-29-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-27-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-25-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-23-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-31-0x0000000002840000-0x0000000002852000-memory.dmp healer behavioral1/memory/2780-22-0x0000000002840000-0x0000000002852000-memory.dmp healer -
Healer family
-
Processes:
pro8080.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8080.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8080.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4304-2143-0x0000000005740000-0x0000000005772000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5116-2156-0x0000000000A80000-0x0000000000AB0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si371532.exe family_redline behavioral1/memory/624-2167-0x0000000000730000-0x000000000075E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu2186.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation qu2186.exe -
Executes dropped EXE 5 IoCs
Processes:
un475841.exepro8080.exequ2186.exe1.exesi371532.exepid process 1168 un475841.exe 2780 pro8080.exe 4304 qu2186.exe 5116 1.exe 624 si371532.exe -
Processes:
pro8080.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8080.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8080.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
un475841.exee37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un475841.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2240 2780 WerFault.exe pro8080.exe 4388 4304 WerFault.exe qu2186.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
si371532.exee37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exeun475841.exepro8080.exequ2186.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si371532.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un475841.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8080.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu2186.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8080.exepid process 2780 pro8080.exe 2780 pro8080.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8080.exequ2186.exedescription pid process Token: SeDebugPrivilege 2780 pro8080.exe Token: SeDebugPrivilege 4304 qu2186.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exeun475841.exequ2186.exedescription pid process target process PID 2700 wrote to memory of 1168 2700 e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exe un475841.exe PID 2700 wrote to memory of 1168 2700 e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exe un475841.exe PID 2700 wrote to memory of 1168 2700 e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exe un475841.exe PID 1168 wrote to memory of 2780 1168 un475841.exe pro8080.exe PID 1168 wrote to memory of 2780 1168 un475841.exe pro8080.exe PID 1168 wrote to memory of 2780 1168 un475841.exe pro8080.exe PID 1168 wrote to memory of 4304 1168 un475841.exe qu2186.exe PID 1168 wrote to memory of 4304 1168 un475841.exe qu2186.exe PID 1168 wrote to memory of 4304 1168 un475841.exe qu2186.exe PID 4304 wrote to memory of 5116 4304 qu2186.exe 1.exe PID 4304 wrote to memory of 5116 4304 qu2186.exe 1.exe PID 4304 wrote to memory of 5116 4304 qu2186.exe 1.exe PID 2700 wrote to memory of 624 2700 e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exe si371532.exe PID 2700 wrote to memory of 624 2700 e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exe si371532.exe PID 2700 wrote to memory of 624 2700 e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exe si371532.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exe"C:\Users\Admin\AppData\Local\Temp\e37140c335a7ab696ff5904f08bdb9c3ae956247e02ed9d96f78dd8cb2bebc5d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un475841.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un475841.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8080.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8080.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 10044⤵
- Program crash
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2186.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2186.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 12164⤵
- Program crash
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si371532.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si371532.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2780 -ip 27801⤵PID:464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4304 -ip 43041⤵PID:2204
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD50b36c73a70ee878eaaec3c694677c7bb
SHA1ebc1d77d97462efb699a59183b65d99391402ab0
SHA256b2ce90badc6775a9a8bc699cb30bddefbf46dc9d364d89b9ace9b89537f93bc1
SHA51278637a574c1993fa702376cdaec029bb8f250b197cedab82d2d06a13929a8b2a32375522596d446a98fa3f11c90f05aafac32fd6943e313ea1b7695ad59a9539
-
Filesize
661KB
MD5ccc4ca41a2f9b5d1f8983c20db7e0575
SHA1aeaf48b6f58cdcb7a0537de6d3870999d3da0efc
SHA2560d7acf42e2a46e5c8e5b8e776e9dfa801964c03cb5bcc8d18b312797fba18956
SHA5124c54996f3069e9e5f90a1da96ab75f609c15f51d326d483f72406aed8b2a2cdaf77665a432d8407bced5e51efb098b75919ee5e50f069e715d338820eb484e1f
-
Filesize
332KB
MD5f38222b5fe47b058b9eb65bbd5994515
SHA132be133c8ea1706e466576a4e0e8a67da206a88d
SHA256ca093ca8136d50d65c36688144ac5b0295767ad5ec6b12beeee7f253cab10d6d
SHA5128d580a80f6cb42f55c85e3f5cb49e09eb14fb8dc7597fab454fa6d113632ca59b9e7b4416206f77f08500d1eb5053275c7194d50b904abc8d5f04bd1a3493430
-
Filesize
495KB
MD5b64ab478e366249aa6014741a733e9fe
SHA162b4d2bd57dc32a71dedbc2ca4823f70a0f3b123
SHA256066b94911f4209b9a8bcaece53514d9bfc0e9a87089837fee12b93b433a39c8e
SHA512c6cd9c42180d5d688c6db797f68d3b2b4797630e88dcbb5ef776e960a714ecf8f30ce8b5e29a7d568df988ab354cdc9ff39b86229315317b35c0f6de70d5f52d
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0