Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exe
Resource
win10v2004-20241007-en
General
-
Target
3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exe
-
Size
787KB
-
MD5
9a13540d36180f50b7a23c3b8d66f606
-
SHA1
6083211ce853187f8fed2c13184f6da93cc70f11
-
SHA256
3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c
-
SHA512
354d8f11971ae5d065d98fb35fbfaba5d6db066015fc6e72571eb0f658b9a7b893e690aa0b77e3f1d6b954cd7aefb9258dcfd494161a89311f18d3d1f44267f3
-
SSDEEP
12288:fMrcy90Olt35SAxSFiFaH33lXJSKS177ZHteoPUv3rv14d+j5bil:jypSAxSFTXVXJ27eocv3rt55ul
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2112-19-0x0000000002450000-0x000000000246A000-memory.dmp healer behavioral1/memory/2112-21-0x00000000024F0000-0x0000000002508000-memory.dmp healer behavioral1/memory/2112-49-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-47-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-45-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-43-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-39-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-37-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-35-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-33-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-31-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-29-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-27-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-25-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-23-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-22-0x00000000024F0000-0x0000000002502000-memory.dmp healer behavioral1/memory/2112-41-0x00000000024F0000-0x0000000002502000-memory.dmp healer -
Healer family
-
Processes:
pro5963.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5963.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5963.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1228-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5464-2156-0x0000000000700000-0x0000000000730000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si525364.exe family_redline behavioral1/memory/5800-2167-0x0000000000E40000-0x0000000000E6E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu1620.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation qu1620.exe -
Executes dropped EXE 5 IoCs
Processes:
un985315.exepro5963.exequ1620.exe1.exesi525364.exepid process 1640 un985315.exe 2112 pro5963.exe 1228 qu1620.exe 5464 1.exe 5800 si525364.exe -
Processes:
pro5963.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5963.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5963.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exeun985315.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un985315.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2488 2112 WerFault.exe pro5963.exe 5652 1228 WerFault.exe qu1620.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exeun985315.exepro5963.exequ1620.exe1.exesi525364.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un985315.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5963.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1620.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si525364.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5963.exepid process 2112 pro5963.exe 2112 pro5963.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5963.exequ1620.exedescription pid process Token: SeDebugPrivilege 2112 pro5963.exe Token: SeDebugPrivilege 1228 qu1620.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exeun985315.exequ1620.exedescription pid process target process PID 3672 wrote to memory of 1640 3672 3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exe un985315.exe PID 3672 wrote to memory of 1640 3672 3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exe un985315.exe PID 3672 wrote to memory of 1640 3672 3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exe un985315.exe PID 1640 wrote to memory of 2112 1640 un985315.exe pro5963.exe PID 1640 wrote to memory of 2112 1640 un985315.exe pro5963.exe PID 1640 wrote to memory of 2112 1640 un985315.exe pro5963.exe PID 1640 wrote to memory of 1228 1640 un985315.exe qu1620.exe PID 1640 wrote to memory of 1228 1640 un985315.exe qu1620.exe PID 1640 wrote to memory of 1228 1640 un985315.exe qu1620.exe PID 1228 wrote to memory of 5464 1228 qu1620.exe 1.exe PID 1228 wrote to memory of 5464 1228 qu1620.exe 1.exe PID 1228 wrote to memory of 5464 1228 qu1620.exe 1.exe PID 3672 wrote to memory of 5800 3672 3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exe si525364.exe PID 3672 wrote to memory of 5800 3672 3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exe si525364.exe PID 3672 wrote to memory of 5800 3672 3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exe si525364.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exe"C:\Users\Admin\AppData\Local\Temp\3eef239dc3b2813808107f78446bde85b53b29c18bcec415933ffb6b16b9612c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un985315.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un985315.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5963.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5963.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 10844⤵
- Program crash
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1620.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1620.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 13844⤵
- Program crash
PID:5652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si525364.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si525364.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2112 -ip 21121⤵PID:2212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1228 -ip 12281⤵PID:5516
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5fafed798f88b5cd659bf776d89c9b35d
SHA1b1f6b526599fca693b0b85201de3685b7f340163
SHA256260555c4e6af4b667c8f95eb43896b69bcdae93a728cbaa94cf43de63f47a62a
SHA5124e7c0c560c64ea59b285138b2f15374391f2bd9206ec7c0fdcd18115983c4efdc52cb206fcebc0e0e010e3a285aec7c24390be71a64b8c0b01d5e784a54f96c4
-
Filesize
633KB
MD57bad77350cec2dee52d8df55449f015d
SHA12fd2d87bdb76108608aa131efa47494566a84cf7
SHA25664a3560e70e3a7e14c273b0d5e46801dc9b01033b9e5023341fae0ddecf9d760
SHA5121aebc186e5da12d759166462f0435b879e4c1f81f3647f132615eb78a2bb3ece441b259297b165bd7cb0c5c80fff3c7419fd1cf0be24bf1030fa54ad276897cc
-
Filesize
230KB
MD5a7786899352b197bf4b4ed085bc42f74
SHA18a17e512a1728e0b001a7ecd7f7ee166917a4796
SHA25601deb34611a546364a29695c2d03fdb219e35f88f808859ebda87ade0231dab0
SHA5126d7e0651fa62f5ce5a1c1714092852b383ccc8acfac9c19982925fcb653e893dc24cb574a34a3f4d291a6f673e8c7e93529bd1275d4dbfd601f0b2f4a59a9089
-
Filesize
414KB
MD5783ae6592701aa668c22c51494583541
SHA12adc9661a0af6f4beb0345c191a5406125aea049
SHA2563de175f3e81c8024a0deb227e4e7988e5bc554cdcaa14cb8421ea37ff31328e3
SHA512034f9af3b71dbc5c99c6063a0f986116d96558c30b706d5baec90e97c6caf7d62916d3f02202c2e75f0415861c2ad514226516aebfcdf65ee854b0a67215c7fe
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0