Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:37
Static task
static1
Behavioral task
behavioral1
Sample
1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exe
Resource
win10v2004-20241007-en
General
-
Target
1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exe
-
Size
787KB
-
MD5
51cbc5aefe24bf138ff73454b7098bd7
-
SHA1
c3f777287b50ed7d829b246e3c53bed3a8096b0b
-
SHA256
1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5
-
SHA512
241a03a0a50cc7a0c4a6b499f9804f55f73e29b8bfc439b0a0c39be22a75b3f0ebf23081224358170661ea86b2ddfda2b03e4f5c90e903e02f1fa51edc7e3836
-
SSDEEP
12288:BMr0y900BU7HKEvmLwZr2UdlvJg0V5iO+v8LI3f71vdZVjRoCVGxP:ZyOWwt2UdlvJJAO+vwI3fxNjBVYP
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4124-19-0x00000000021C0000-0x00000000021DA000-memory.dmp healer behavioral1/memory/4124-21-0x0000000002720000-0x0000000002738000-memory.dmp healer behavioral1/memory/4124-31-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-49-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-47-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-46-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-43-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-41-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-40-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-37-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-35-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-33-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-30-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-27-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-25-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-23-0x0000000002720000-0x0000000002732000-memory.dmp healer behavioral1/memory/4124-22-0x0000000002720000-0x0000000002732000-memory.dmp healer -
Healer family
-
Processes:
pro0651.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0651.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2488-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1504-2155-0x00000000004E0000-0x0000000000510000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si452658.exe family_redline behavioral1/memory/1624-2166-0x0000000000370000-0x000000000039E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu0872.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation qu0872.exe -
Executes dropped EXE 5 IoCs
Processes:
un724912.exepro0651.exequ0872.exe1.exesi452658.exepid process 3552 un724912.exe 4124 pro0651.exe 2488 qu0872.exe 1504 1.exe 1624 si452658.exe -
Processes:
pro0651.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0651.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0651.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exeun724912.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un724912.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 1324 4124 WerFault.exe pro0651.exe 3240 2488 WerFault.exe qu0872.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
si452658.exe1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exeun724912.exepro0651.exequ0872.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si452658.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un724912.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0651.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0651.exepid process 4124 pro0651.exe 4124 pro0651.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0651.exequ0872.exedescription pid process Token: SeDebugPrivilege 4124 pro0651.exe Token: SeDebugPrivilege 2488 qu0872.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exeun724912.exequ0872.exedescription pid process target process PID 1764 wrote to memory of 3552 1764 1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exe un724912.exe PID 1764 wrote to memory of 3552 1764 1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exe un724912.exe PID 1764 wrote to memory of 3552 1764 1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exe un724912.exe PID 3552 wrote to memory of 4124 3552 un724912.exe pro0651.exe PID 3552 wrote to memory of 4124 3552 un724912.exe pro0651.exe PID 3552 wrote to memory of 4124 3552 un724912.exe pro0651.exe PID 3552 wrote to memory of 2488 3552 un724912.exe qu0872.exe PID 3552 wrote to memory of 2488 3552 un724912.exe qu0872.exe PID 3552 wrote to memory of 2488 3552 un724912.exe qu0872.exe PID 2488 wrote to memory of 1504 2488 qu0872.exe 1.exe PID 2488 wrote to memory of 1504 2488 qu0872.exe 1.exe PID 2488 wrote to memory of 1504 2488 qu0872.exe 1.exe PID 1764 wrote to memory of 1624 1764 1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exe si452658.exe PID 1764 wrote to memory of 1624 1764 1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exe si452658.exe PID 1764 wrote to memory of 1624 1764 1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exe si452658.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exe"C:\Users\Admin\AppData\Local\Temp\1ee6c1181bab4aca38e276f1e6f453614743c02fb2dd77dd497b5d61739a4ab5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724912.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724912.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0651.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0651.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 10844⤵
- Program crash
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0872.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0872.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2488 -s 14844⤵
- Program crash
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si452658.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si452658.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1624
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4124 -ip 41241⤵PID:3636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2488 -ip 24881⤵PID:3712
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD57d8d95e8bb963fb44365ee8b255b7444
SHA1312cf7830e92fe9494eff0641c905ee92fdf3ffc
SHA256af13121856614cedbe82c7ba1648b23a93331e4ae35a932e22047ce195ae8451
SHA512d69a6a37da945160b2f96a8180aab435206ba6fd1afefb97cdd48bf27c77ac3708b7fbd469197e5877584290216d485df55a743c05119adefbae870b34c9cdb6
-
Filesize
633KB
MD5cb7cc918b98b596f679f54272aaca1a3
SHA1b9381133830c9bb1479e130fe4822e2b5ceecc98
SHA25602d4e0e7943963194e05db2821ec0f681c3257efc841b2b082eb6310b4df884d
SHA512d8b6fbbb7bca270d0eff5434cebcd924ab21e21be98c8eecae131f63d085308fa9c887dab6cc6bb87fa2c0979994538899cb4e644f7c38b019f5ad4a39fed032
-
Filesize
230KB
MD5d83bb57ccdc36005ad7d34a0e6d201f6
SHA13fec3badcd295c18c05056537c9e95db725fda5e
SHA256e2fefd6c415de3f611ad514e8bb4ce2f9b8c535a936efb8b119ae49e1827bbac
SHA512bfa59df163d0c4cacb3a68bcb0aaa84d382435db9a03bd78f3d07a1aaf85c5eea2eb62db6caed8aded2c5420370f8057cfa29af99ee2041ec921a69b7f3b2327
-
Filesize
414KB
MD59602247b641ec7f8511b2f044a006bb1
SHA157928ce427b5a38e7a957dd8893fee974f4cfa86
SHA256daad4e49d250f9c2023c082dfcf58e9085cc58d6ede9ef4311f42e30f91a5d21
SHA51245bbe42e4e12ed55c22447827869fa6b5a6bac2068c863b3e526cb5dc75880a3406a567e169bba6dbfb3a43c379ec1b056ce8a00b2fdfdb8550f38f5efc4cc51
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0