Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exe
Resource
win10v2004-20241007-en
General
-
Target
22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exe
-
Size
815KB
-
MD5
5603b697a87c60e7771e73e48eeaa436
-
SHA1
2059a3edc598f3d25e67076c4a6e7e1c66c5bc89
-
SHA256
22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498
-
SHA512
4b6d2c76822822147f0c7614b8df61f461571c712376e3855e56060b17e87dfc155460cb1216abb887f9af28a89b3c7f02b2595f279ee7e78b14daf02aab265e
-
SSDEEP
24576:Ryf4rh9+1urXPMcbaboTv12HEW0Q/z34R2:Ef4FXPMcmCN4TQ
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4908-19-0x00000000026D0000-0x00000000026EA000-memory.dmp healer behavioral1/memory/4908-21-0x0000000002880000-0x0000000002898000-memory.dmp healer behavioral1/memory/4908-29-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-49-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-47-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-45-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-43-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-41-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-39-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-37-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-35-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-33-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-31-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-27-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-25-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-23-0x0000000002880000-0x0000000002892000-memory.dmp healer behavioral1/memory/4908-22-0x0000000002880000-0x0000000002892000-memory.dmp healer -
Healer family
-
Processes:
pro7573.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7573.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2256-2142-0x0000000002A30000-0x0000000002A62000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2020-2155-0x0000000000B20000-0x0000000000B50000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si829669.exe family_redline behavioral1/memory/6028-2166-0x00000000001C0000-0x00000000001EE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu4765.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation qu4765.exe -
Executes dropped EXE 5 IoCs
Processes:
un515111.exepro7573.exequ4765.exe1.exesi829669.exepid process 4876 un515111.exe 4908 pro7573.exe 2256 qu4765.exe 2020 1.exe 6028 si829669.exe -
Processes:
pro7573.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7573.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7573.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exeun515111.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un515111.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 508 4908 WerFault.exe pro7573.exe 5560 2256 WerFault.exe qu4765.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exesi829669.exe22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exeun515111.exepro7573.exequ4765.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si829669.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un515111.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7573.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4765.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro7573.exepid process 4908 pro7573.exe 4908 pro7573.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro7573.exequ4765.exedescription pid process Token: SeDebugPrivilege 4908 pro7573.exe Token: SeDebugPrivilege 2256 qu4765.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exeun515111.exequ4765.exedescription pid process target process PID 512 wrote to memory of 4876 512 22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exe un515111.exe PID 512 wrote to memory of 4876 512 22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exe un515111.exe PID 512 wrote to memory of 4876 512 22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exe un515111.exe PID 4876 wrote to memory of 4908 4876 un515111.exe pro7573.exe PID 4876 wrote to memory of 4908 4876 un515111.exe pro7573.exe PID 4876 wrote to memory of 4908 4876 un515111.exe pro7573.exe PID 4876 wrote to memory of 2256 4876 un515111.exe qu4765.exe PID 4876 wrote to memory of 2256 4876 un515111.exe qu4765.exe PID 4876 wrote to memory of 2256 4876 un515111.exe qu4765.exe PID 2256 wrote to memory of 2020 2256 qu4765.exe 1.exe PID 2256 wrote to memory of 2020 2256 qu4765.exe 1.exe PID 2256 wrote to memory of 2020 2256 qu4765.exe 1.exe PID 512 wrote to memory of 6028 512 22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exe si829669.exe PID 512 wrote to memory of 6028 512 22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exe si829669.exe PID 512 wrote to memory of 6028 512 22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exe si829669.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exe"C:\Users\Admin\AppData\Local\Temp\22edae441b154c8ce9c514c60681b2a8ed9d57c2da09b56c04c8637ba4b71498.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515111.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515111.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7573.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7573.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4908 -s 10844⤵
- Program crash
PID:508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4765.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4765.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 15324⤵
- Program crash
PID:5560 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si829669.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si829669.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4908 -ip 49081⤵PID:824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 2256 -ip 22561⤵PID:5384
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD51d1f2ebf774bb4bbf72f15eba80f03b4
SHA1ee84148fc57cf295da351d2757a5000f303a411f
SHA256482c8c3e8dff117b94befa728e7d9b9b66f7c875de0503bb4f6d4909b3e2a11f
SHA512a981a4ce310647db36235b12c78105832a64ae1689a6292f8d37b1f550c3a01944207cb694650fdc0dc124df89a1a0b8ec9fc50c74d428d2e6ac4b81b8cc7b8a
-
Filesize
661KB
MD5d719befc2213ad1c7ad6e2ab2a269c0b
SHA1de65cc3d11cadce3b677e06b1e859d83a74edd16
SHA2564b09e1a403aa2dac646c920599cf6c84dd135f6ea07b425e8d186735d875496d
SHA51272b703e811feee9ba15e2d860778bcd74685e0cd8d168a2406cf1d86f4df8d7c818d78edfab98c166ed39d5c46cb6aa3c548b3a1a0bd4076155fe13afd066ece
-
Filesize
332KB
MD50a740eb525bdea1535dbfffbc1ce8fb9
SHA1362537992e3ba9baf2f961dcd48b8b990440c930
SHA256321fda5541931bb567c60705dd2955325d96c720be309134456f841601e77da1
SHA51255195662bf5a1dc986cd559916df477aa1e11752fa5e0a1b74c43f8088255fc57e1300ef5a7915e8a3401a1661f423047b06a2cbfd232f49b633c839b9ebf8a3
-
Filesize
495KB
MD5b69805a8e5cd27b5ceb34f4aaa130023
SHA113823a6e1a87e3d5b8b71cbbc6f16758f091b578
SHA25633f4823593171a85b7bdf134a251a5eaf77957d484a8de35fb4c691ac657ad27
SHA512af123e3b1ebba3d794c105059ae1ce7d1c5969ce0d06c8f0c454277718dda5543bc1fb2887aadb7a4d774b32272680e17b005865435742a1906c59d81ba44034
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0