Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:05
Static task
static1
Behavioral task
behavioral1
Sample
e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exe
Resource
win10v2004-20241007-en
General
-
Target
e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exe
-
Size
991KB
-
MD5
e81ad2f72254acf7e4f6f48c12620a16
-
SHA1
5168d53d4a2c5d7caf4ddade01c6c880e46b03d8
-
SHA256
e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe
-
SHA512
6cc0c548cde2f3709d38e09815fd2db1e9c6745f38c55a332d6c10dc1acb6bc55d9ed8ee2ed83d2a2a80214833e2a005a78a443159511f1108c5e2b6d7261bdb
-
SSDEEP
24576:GyFGHm6wvAqXpwP0IxCDtrI2w/HqQxIFjr40k:Vl6wvBphI2sqQxmjE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 19 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9621.exe healer behavioral1/memory/1840-28-0x0000000000EA0000-0x0000000000EAA000-memory.dmp healer behavioral1/memory/1500-34-0x0000000004C10000-0x0000000004C2A000-memory.dmp healer behavioral1/memory/1500-36-0x0000000007120000-0x0000000007138000-memory.dmp healer behavioral1/memory/1500-44-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-64-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-62-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-60-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-58-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-56-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-54-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-52-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-50-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-48-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-46-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-42-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-40-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-38-0x0000000007120000-0x0000000007132000-memory.dmp healer behavioral1/memory/1500-37-0x0000000007120000-0x0000000007132000-memory.dmp healer -
Healer family
-
Processes:
tz9621.exev0918ZK.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" tz9621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" tz9621.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection v0918ZK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" v0918ZK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" v0918ZK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" v0918ZK.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection tz9621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" tz9621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" tz9621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" tz9621.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" v0918ZK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" v0918ZK.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/4336-72-0x0000000004B20000-0x0000000004B66000-memory.dmp family_redline behavioral1/memory/4336-73-0x0000000004C00000-0x0000000004C44000-memory.dmp family_redline behavioral1/memory/4336-97-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-107-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-105-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-103-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-101-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-99-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-95-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-93-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-91-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-89-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-87-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-85-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-83-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-81-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-79-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-77-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-75-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/4336-74-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
Processes:
zap1883.exezap0662.exezap9172.exetz9621.exev0918ZK.exew09uS99.exepid process 4744 zap1883.exe 3904 zap0662.exe 4532 zap9172.exe 1840 tz9621.exe 1500 v0918ZK.exe 4336 w09uS99.exe -
Processes:
tz9621.exev0918ZK.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" tz9621.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features v0918ZK.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" v0918ZK.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exezap1883.exezap0662.exezap9172.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zap1883.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zap0662.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" zap9172.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5596 sc.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4424 1500 WerFault.exe v0918ZK.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
v0918ZK.exew09uS99.exee5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exezap1883.exezap0662.exezap9172.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v0918ZK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w09uS99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap1883.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap0662.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zap9172.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
tz9621.exev0918ZK.exepid process 1840 tz9621.exe 1840 tz9621.exe 1500 v0918ZK.exe 1500 v0918ZK.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
tz9621.exev0918ZK.exew09uS99.exedescription pid process Token: SeDebugPrivilege 1840 tz9621.exe Token: SeDebugPrivilege 1500 v0918ZK.exe Token: SeDebugPrivilege 4336 w09uS99.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exezap1883.exezap0662.exezap9172.exedescription pid process target process PID 4916 wrote to memory of 4744 4916 e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exe zap1883.exe PID 4916 wrote to memory of 4744 4916 e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exe zap1883.exe PID 4916 wrote to memory of 4744 4916 e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exe zap1883.exe PID 4744 wrote to memory of 3904 4744 zap1883.exe zap0662.exe PID 4744 wrote to memory of 3904 4744 zap1883.exe zap0662.exe PID 4744 wrote to memory of 3904 4744 zap1883.exe zap0662.exe PID 3904 wrote to memory of 4532 3904 zap0662.exe zap9172.exe PID 3904 wrote to memory of 4532 3904 zap0662.exe zap9172.exe PID 3904 wrote to memory of 4532 3904 zap0662.exe zap9172.exe PID 4532 wrote to memory of 1840 4532 zap9172.exe tz9621.exe PID 4532 wrote to memory of 1840 4532 zap9172.exe tz9621.exe PID 4532 wrote to memory of 1500 4532 zap9172.exe v0918ZK.exe PID 4532 wrote to memory of 1500 4532 zap9172.exe v0918ZK.exe PID 4532 wrote to memory of 1500 4532 zap9172.exe v0918ZK.exe PID 3904 wrote to memory of 4336 3904 zap0662.exe w09uS99.exe PID 3904 wrote to memory of 4336 3904 zap0662.exe w09uS99.exe PID 3904 wrote to memory of 4336 3904 zap0662.exe w09uS99.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exe"C:\Users\Admin\AppData\Local\Temp\e5434597cb3915577c89d7bf1b10c5286ce1a831dc96e38fa5011c065f8ce4fe.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1883.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zap1883.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0662.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zap0662.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9172.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\zap9172.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9621.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\tz9621.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0918ZK.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\v0918ZK.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 11006⤵
- Program crash
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w09uS99.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\w09uS99.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1500 -ip 15001⤵PID:1624
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5596
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
807KB
MD5ccd8818d5dfbb71c6c0182a441ebacda
SHA13409d5e55cbdfef9accad1207b372d7df55edbf0
SHA2561ecd08e4d8e07176d4221f322d6536b21671db787f3262d48d1071c67fb53064
SHA512361d8093ddff5949fd750e09ad1c51ddb7d0d32488033394c3ed9501c9049825588628378609dc073de888bbdd5a0f0d8532e5f2bebef47171d3686b5f81a1b7
-
Filesize
665KB
MD5c67f90ba161a2f513cfb8a56ddf08f36
SHA10e517c71e5c6a787d2765d3e9e39b2738ef64c07
SHA25690a73f0dc025dbac4657ec443352f4574946907cc65924ec13d37de40368a4f7
SHA512108c33a91db7848203ff2d1dae8edf31cf7088a747dec06a77e06c0b49ccab4e6370773d21b166a28b9f03aeeeae84f8b3c1c7a0d7ec5ec4d284a6888f1470f8
-
Filesize
342KB
MD57b30cc1a6f766de1ab06a8fc80303247
SHA16ca317741677686a84d2326a78b9a34bc39f55a3
SHA25672e8a6f3749679daaa549478b8ded4dbf4301e92b8d48e4414bd0f5ab3ea177b
SHA512cb42444f0f5ed9c43abd728f234f7c90db319c6ebf1db175309d87b5a1baa5268506f583c7a306bca8aaca3b9b48bee4550748a3ce2eff1990f1c1a6942f4e23
-
Filesize
329KB
MD5700cc2808f873915d0ce46215ccec5f5
SHA1f595a5dec8852edbd003401fc408b2829a088eb9
SHA256cb74957ab5fc6f0057bf0fccce230852c4e7dbc2ce5ac78cd9c85d7326b60e9a
SHA512a7a527e44127a5b4dbde15bc8bccf64d4cd15d18efd50cc781b11e947a81000144fce7b031ffac72c78d220d4336ec0e24f9d0d3492b0879b38abd2b857d23c3
-
Filesize
11KB
MD5deca37f9a132e24ec089ac0ddaf6c6d5
SHA1c31528bb75bcdbd0e5af6f9c38f3f6121768fe03
SHA256685d946b39e750f1327d63291be9795c435ac34cc45c2b06c9304437ba9c1a19
SHA5121ce6320d6a855a332bca720aa182bb82763e5ae130af9d3918c12e2162a1786edf894d5607c314823693154a7ab223f599ebde71a0b262b8cabba84c6f5b5e99
-
Filesize
284KB
MD51c2e652a5e971db7bf2cf0d57e071386
SHA115311954ac99526eeb865e54a74d7e7dd3cf22e9
SHA25692b6bc528c6cfafe33ee2423053eb41635bcf3fe5d9dc98a1ce5a04904e470c7
SHA512a4ba8f825896386f2a8bcee6e8ca9c90a16f541f74a65da4edf56515303e1579d4cf188c845589dcbeb425cbdae28470a678d8dfd546559efbf1a6d550f9310c