Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exe
Resource
win10v2004-20241007-en
General
-
Target
ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exe
-
Size
787KB
-
MD5
d67b7615c3bbe2856c9decf41d8b4bbc
-
SHA1
ddf47ee023e8dc89189fbfa5e650a1549f696228
-
SHA256
ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba
-
SHA512
0dc36d8b4334aabf9d2b3d590ec8a7d40b8d2e658b82293b6b3017bcd578343d6e7ae8b1369789cdd54c7a9970fd22b126bd32facd926dba53bb836ee07818eb
-
SSDEEP
24576:My7V7+JBp7Qqo5CljUWUt6eZXi3zmdsnTHpvCZU:77+cqo4ljYUsUmdsTJvCZ
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/4848-19-0x00000000026A0000-0x00000000026BA000-memory.dmp healer behavioral1/memory/4848-21-0x00000000026F0000-0x0000000002708000-memory.dmp healer behavioral1/memory/4848-49-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-47-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-45-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-43-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-41-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-39-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-37-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-35-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-33-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-31-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-29-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-27-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-25-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-23-0x00000000026F0000-0x0000000002702000-memory.dmp healer behavioral1/memory/4848-22-0x00000000026F0000-0x0000000002702000-memory.dmp healer -
Healer family
-
Processes:
pro4310.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4310.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4310.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4184-2142-0x0000000004C40000-0x0000000004C72000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5516-2155-0x00000000008A0000-0x00000000008D0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si324120.exe family_redline behavioral1/memory/5904-2166-0x00000000006C0000-0x00000000006EE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu9431.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation qu9431.exe -
Executes dropped EXE 5 IoCs
Processes:
un944333.exepro4310.exequ9431.exe1.exesi324120.exepid process 4472 un944333.exe 4848 pro4310.exe 4184 qu9431.exe 5516 1.exe 5904 si324120.exe -
Processes:
pro4310.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4310.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4310.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exeun944333.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un944333.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3164 4848 WerFault.exe pro4310.exe 5588 4184 WerFault.exe qu9431.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exeun944333.exepro4310.exequ9431.exe1.exesi324120.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un944333.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9431.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si324120.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro4310.exepid process 4848 pro4310.exe 4848 pro4310.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro4310.exequ9431.exedescription pid process Token: SeDebugPrivilege 4848 pro4310.exe Token: SeDebugPrivilege 4184 qu9431.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exeun944333.exequ9431.exedescription pid process target process PID 3884 wrote to memory of 4472 3884 ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exe un944333.exe PID 3884 wrote to memory of 4472 3884 ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exe un944333.exe PID 3884 wrote to memory of 4472 3884 ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exe un944333.exe PID 4472 wrote to memory of 4848 4472 un944333.exe pro4310.exe PID 4472 wrote to memory of 4848 4472 un944333.exe pro4310.exe PID 4472 wrote to memory of 4848 4472 un944333.exe pro4310.exe PID 4472 wrote to memory of 4184 4472 un944333.exe qu9431.exe PID 4472 wrote to memory of 4184 4472 un944333.exe qu9431.exe PID 4472 wrote to memory of 4184 4472 un944333.exe qu9431.exe PID 4184 wrote to memory of 5516 4184 qu9431.exe 1.exe PID 4184 wrote to memory of 5516 4184 qu9431.exe 1.exe PID 4184 wrote to memory of 5516 4184 qu9431.exe 1.exe PID 3884 wrote to memory of 5904 3884 ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exe si324120.exe PID 3884 wrote to memory of 5904 3884 ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exe si324120.exe PID 3884 wrote to memory of 5904 3884 ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exe si324120.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exe"C:\Users\Admin\AppData\Local\Temp\ee08660a454ee7e2855003a1dc1f064854f00fcf3f8254b617ae20baefd084ba.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944333.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944333.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4310.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4310.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 10204⤵
- Program crash
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9431.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9431.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4184 -s 13844⤵
- Program crash
PID:5588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si324120.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si324120.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5904
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4848 -ip 48481⤵PID:1788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4184 -ip 41841⤵PID:5416
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD570d3f3891c00803f5303c756f00547f8
SHA10a5863caf423d1155595a7e7d2f2a4ce0b8ae894
SHA25671d3af96bb976df327a0371323a7484e9575bfd48a30754d935ec231632238c4
SHA512b64f3ad0be74cc9bacdb5c37bcdd4916781c7b7078359634fa3866f9ef7a374a5585624e50750a3ac8c4b5693be5a48a2d2a904d785eed52df390c23a9a1d194
-
Filesize
633KB
MD5e3ca312e5a08a0a566ace6d184c4d13b
SHA1165e7e79226074f64db3753ea678739e16e462d1
SHA2564364ed022e06c6cf40d3075b54b14cd3ffc5c1024802d89cc528d37678c0d26d
SHA5124368fc0bdf2e0223abb05a6ca172d46bc7313667ce5932c26ffd4154ed3a1fdd55668830328839ff5a25bd843261b5d372c6a898b9d54027ce0563a222874615
-
Filesize
231KB
MD519fba21013efde9926db8f7c0ba56cc8
SHA1f7c473f7719ce873f30897ed116d0cc4d335ddee
SHA25655ddec0aea386e1fe953ebf977c96f390541e4757bf23c8d18b14e0097640a5c
SHA51225773c66bbb54e64c030d015d1d79bc878087317beca43c2c5c45e4ba4c962cfea425a211c253b80895b4203d7467d33f8e068183212c4e46298aad44b8999d8
-
Filesize
414KB
MD58a7eaa082b64de302d3f7eb597fcfd95
SHA1cdf1eea69778fab35466edf25690b3cf76881791
SHA256c1afdfe780f8485501344e78ae1e50aaa173905b296124b36c4d366c7853c31d
SHA5120f7afe337e27fbe5ddd655c0ca2addcbeb7fb102885309c7eba54455ebeb131029db9f28ea9c1bc8a93c2211fe9916fde740ede02e251b34df89d3589cacd902
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0