Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 06:16
Static task
static1
Behavioral task
behavioral1
Sample
e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exe
Resource
win10v2004-20241007-en
General
-
Target
e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exe
-
Size
801KB
-
MD5
f3e52107bf5f01d292eec7d54a3968c7
-
SHA1
121572755e63cbf764da14ccf4bcbe7342a814e2
-
SHA256
e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6
-
SHA512
596edaeff331d8323e7da0d77cdab2c6de5369b9c022feebb70dcd78433a806c3424ebe9ca0a6f31cfebc4242682d5a367560321ba11ff5cfe95f8779c6c7df7
-
SSDEEP
24576:UylhTtvXQ1EJbbfBohiZLjB7Pf2IB2Gd/gJ9392JUKRu:jlh5vXQ1wtFjB7E7N6UKR
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4576-19-0x0000000002430000-0x000000000244A000-memory.dmp healer behavioral1/memory/4576-21-0x0000000002500000-0x0000000002518000-memory.dmp healer behavioral1/memory/4576-31-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-49-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-47-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-43-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-42-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-39-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-37-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-33-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-29-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-27-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-25-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-45-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-23-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-35-0x0000000002500000-0x0000000002512000-memory.dmp healer behavioral1/memory/4576-22-0x0000000002500000-0x0000000002512000-memory.dmp healer -
Healer family
-
Processes:
pro3314.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro3314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro3314.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro3314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro3314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro3314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro3314.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1216-2143-0x00000000053F0000-0x0000000005422000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5392-2156-0x0000000000710000-0x0000000000740000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si769645.exe family_redline behavioral1/memory/4772-2167-0x0000000000A70000-0x0000000000A9E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu1537.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation qu1537.exe -
Executes dropped EXE 5 IoCs
Processes:
un054015.exepro3314.exequ1537.exe1.exesi769645.exepid process 4520 un054015.exe 4576 pro3314.exe 1216 qu1537.exe 5392 1.exe 4772 si769645.exe -
Processes:
pro3314.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro3314.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro3314.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exeun054015.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un054015.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 640 4576 WerFault.exe pro3314.exe 1512 1216 WerFault.exe qu1537.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
si769645.exee9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exeun054015.exepro3314.exequ1537.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si769645.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un054015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro3314.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1537.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro3314.exepid process 4576 pro3314.exe 4576 pro3314.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro3314.exequ1537.exedescription pid process Token: SeDebugPrivilege 4576 pro3314.exe Token: SeDebugPrivilege 1216 qu1537.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exeun054015.exequ1537.exedescription pid process target process PID 3024 wrote to memory of 4520 3024 e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exe un054015.exe PID 3024 wrote to memory of 4520 3024 e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exe un054015.exe PID 3024 wrote to memory of 4520 3024 e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exe un054015.exe PID 4520 wrote to memory of 4576 4520 un054015.exe pro3314.exe PID 4520 wrote to memory of 4576 4520 un054015.exe pro3314.exe PID 4520 wrote to memory of 4576 4520 un054015.exe pro3314.exe PID 4520 wrote to memory of 1216 4520 un054015.exe qu1537.exe PID 4520 wrote to memory of 1216 4520 un054015.exe qu1537.exe PID 4520 wrote to memory of 1216 4520 un054015.exe qu1537.exe PID 1216 wrote to memory of 5392 1216 qu1537.exe 1.exe PID 1216 wrote to memory of 5392 1216 qu1537.exe 1.exe PID 1216 wrote to memory of 5392 1216 qu1537.exe 1.exe PID 3024 wrote to memory of 4772 3024 e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exe si769645.exe PID 3024 wrote to memory of 4772 3024 e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exe si769645.exe PID 3024 wrote to memory of 4772 3024 e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exe si769645.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exe"C:\Users\Admin\AppData\Local\Temp\e9a3c6b3bce07cd3393b5912abdc8333801f78c90dffa4c50eb6874e8c3a92b6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054015.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un054015.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3314.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3314.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 10844⤵
- Program crash
PID:640 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1537.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1537.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 13844⤵
- Program crash
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si769645.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si769645.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4576 -ip 45761⤵PID:3212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1216 -ip 12161⤵PID:5512
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5af68a1ec938568757b090ce041884c0e
SHA1b2751b2f0ea124259157abb67c6e5e1014b72cf2
SHA2568a89b18ab4fb1d4057020ea0877c70be5977c1d43a13e21027119f86624724d0
SHA51273b6abbb5a808c1943e9fb4183ebc20a4ef93b0ef937af40355b94e8c0b1c74f3f01b606a59736b8b161c607ff41693aa7fb39f08a8b2d116e3c5d4200d9d394
-
Filesize
648KB
MD5d476fa286d8747ffb200707b75490ae4
SHA106be790e6811cf6e2a632823ed32c76af6a74df8
SHA25618f17aa8ce640d305dcca05dd80894d6ec94da5ab0061f24ae7061e73a3db256
SHA512db1d8b329d26d88a064916c3bca3a4b38fb8bf78aa0ab1322a0ecd3cbc940fa131986044ce81abe7ed7fede2331193626eeaaf424810f2fd4e569eba6efb068f
-
Filesize
252KB
MD54328960e296836a6ddebc576bdbb6e25
SHA166970265d9cd091baad7486e974a672260cfb61d
SHA25653247134f24404eb4bedcfdbd83ce01530eab42ce988b636b74a9bc892c4f4be
SHA512893563926f72e9a9e56c825a551d8a345717b121ea21fb05ecdc32fd3656d25e20f33a7fbeb8be3811f308b395512fb5cb4488f5bfa7e923e0d43c37e84c87e9
-
Filesize
435KB
MD5c6f2dd2acc08362ec93807a8df4c2ebc
SHA1604edd0e3b85f33546e16d7a21ae8c7361d702e5
SHA25634151d1f179aa3ec91d6f654ca9338186ce9c00553899acb161af71a09721735
SHA51225daf995439f93b13933a92c6e691df237e3f50340b15561b92f7d1efbdffba257ba21481ba818fd1fa53efdcada53a441750160a9e14290015caee821e3aed5
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0