Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 12:30
Static task
static1
Behavioral task
behavioral1
Sample
3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exe
Resource
win10v2004-20241007-en
General
-
Target
3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exe
-
Size
801KB
-
MD5
59fab2a7b76b04efc9202d7c1271855c
-
SHA1
6894dc15ba4d12a97827942509e2909a6307c626
-
SHA256
3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c
-
SHA512
5131caaaf8a679701258c4698d9eaf3811af691fa3b760da190ec83e76f931976a6658becc7d1ea586019346f3d994da61932d7352135a2ba6b097893d7ce4a1
-
SSDEEP
12288:9MrYy90RdBsrFAMJBI8ky0K42JPDFSDTLwi6ZkjBfgpUtSYz72hMSXcnmwHAKTmp:VyWd6rbJiy0KDFi6ZkjBNhf2hMYrLp
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/1788-19-0x00000000008E0000-0x00000000008FA000-memory.dmp healer behavioral1/memory/1788-21-0x00000000024E0000-0x00000000024F8000-memory.dmp healer behavioral1/memory/1788-33-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-49-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-47-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-45-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-43-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-41-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-39-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-37-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-35-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-31-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-29-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-27-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-25-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-23-0x00000000024E0000-0x00000000024F2000-memory.dmp healer behavioral1/memory/1788-22-0x00000000024E0000-0x00000000024F2000-memory.dmp healer -
Healer family
-
Processes:
pro0274.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0274.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0274.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0274.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0274.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0274.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0274.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3200-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2620-2155-0x0000000000DA0000-0x0000000000DD0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si744318.exe family_redline behavioral1/memory/3732-2166-0x0000000000760000-0x000000000078E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu5604.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation qu5604.exe -
Executes dropped EXE 5 IoCs
Processes:
un111308.exepro0274.exequ5604.exe1.exesi744318.exepid process 876 un111308.exe 1788 pro0274.exe 3200 qu5604.exe 2620 1.exe 3732 si744318.exe -
Processes:
pro0274.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0274.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0274.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exeun111308.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un111308.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 212 1788 WerFault.exe pro0274.exe 4208 3200 WerFault.exe qu5604.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu5604.exe1.exesi744318.exe3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exeun111308.exepro0274.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si744318.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un111308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0274.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro0274.exepid process 1788 pro0274.exe 1788 pro0274.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro0274.exequ5604.exedescription pid process Token: SeDebugPrivilege 1788 pro0274.exe Token: SeDebugPrivilege 3200 qu5604.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exeun111308.exequ5604.exedescription pid process target process PID 2632 wrote to memory of 876 2632 3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exe un111308.exe PID 2632 wrote to memory of 876 2632 3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exe un111308.exe PID 2632 wrote to memory of 876 2632 3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exe un111308.exe PID 876 wrote to memory of 1788 876 un111308.exe pro0274.exe PID 876 wrote to memory of 1788 876 un111308.exe pro0274.exe PID 876 wrote to memory of 1788 876 un111308.exe pro0274.exe PID 876 wrote to memory of 3200 876 un111308.exe qu5604.exe PID 876 wrote to memory of 3200 876 un111308.exe qu5604.exe PID 876 wrote to memory of 3200 876 un111308.exe qu5604.exe PID 3200 wrote to memory of 2620 3200 qu5604.exe 1.exe PID 3200 wrote to memory of 2620 3200 qu5604.exe 1.exe PID 3200 wrote to memory of 2620 3200 qu5604.exe 1.exe PID 2632 wrote to memory of 3732 2632 3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exe si744318.exe PID 2632 wrote to memory of 3732 2632 3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exe si744318.exe PID 2632 wrote to memory of 3732 2632 3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exe si744318.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exe"C:\Users\Admin\AppData\Local\Temp\3e2a2e0fc41ae4491d45b0eae149e5a741adcde37ba8a6bb129586975a82819c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un111308.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un111308.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0274.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0274.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 10964⤵
- Program crash
PID:212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5604.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5604.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3200 -s 13844⤵
- Program crash
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si744318.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si744318.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3732
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1788 -ip 17881⤵PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3200 -ip 32001⤵PID:3280
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5c84cb95c25033bdb0a4e4b37b6a44a73
SHA17bf6d8d18e31bd67a4110c95a3d5283a379482b0
SHA2567776ca19a4238dcc893bef1108fcb9431a74aeb16833a66153fd2c9b138a2b55
SHA5124eb6fdcc30b43281831a3d58a913f9d26e718c51498f36fece53ee88a0fa464529b8e44c6650238dfb2066f7df95905f43891a3c25eb3df2b787a14922766981
-
Filesize
647KB
MD58d3be5f169d8962b073676afd21cf96f
SHA1f8915bcd08cebac90281cd3dceed4c144f1d06a2
SHA2561e0c57f7e67b7cb57667ef99761855c60ace767e93d9117582d10521cad81997
SHA512021a36a69dae69f903dd93773cd880f17140936c45459ac79b8aa637d229909f34e91bad7f171bab11380145b8473e6ca22e469d94e1e4f5576b4755a7bf1d37
-
Filesize
252KB
MD555cb9882392a008a7130212ce7e83dda
SHA15bbf9c1bfd6a8b8e51e3bbded21ee087f146e7f3
SHA2561bc91fbc2e46324852b5d64a3cb6d7fbfa60a06a0768ae5c68e6f8a77bbc0972
SHA512b5b0a5cb6ef47987348c042f342a1f3903d4a2714f425f8fac2531a815b02ef1d79e390b22b2ac090822545aae53a31fc86442a7eb9a12eb4138660cf763e054
-
Filesize
435KB
MD5f3c9159a2a976d289988e289e35698d4
SHA1011c98d4f064d4535545cf55be00e74e0fb93bd6
SHA2561e670574ed3c2da155e75a44dc6a1714d8ed864b003f0d7d6b02042b5335df1e
SHA5125be76aea5b9896c1e0f712a1ff9f4e270dfcd9caf737924d6771276edb112011ce409d29a04aa793c78411fcd5c1bf50a7eaaeec134d41958e982e32db08a598
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0