Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 04:25
Static task
static1
Behavioral task
behavioral1
Sample
e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exe
Resource
win10v2004-20241007-en
General
-
Target
e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exe
-
Size
794KB
-
MD5
2c3ae9391b5ee503834f870ae59a0400
-
SHA1
051e95cf278f730ba44b60d47486983249f870ab
-
SHA256
e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719
-
SHA512
9b5c9f01cd71e8a47c03e5405e91073d4f8c89805232e31a62da1f8a94c12a671e35acbb7c420646aef64c38c455c4e7fe795681f29e6e4ead315becb48cda2d
-
SSDEEP
24576:dyy3iNESJWtQovdQkwd/c+FgCQa9WZkoh:4y3iNESJWt67dtQvZk
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3880-19-0x00000000026C0000-0x00000000026DA000-memory.dmp healer behavioral1/memory/3880-21-0x0000000004B80000-0x0000000004B98000-memory.dmp healer behavioral1/memory/3880-23-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-49-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-47-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-45-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-43-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-41-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-39-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-37-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-35-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-33-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-31-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-29-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-27-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-25-0x0000000004B80000-0x0000000004B92000-memory.dmp healer behavioral1/memory/3880-22-0x0000000004B80000-0x0000000004B92000-memory.dmp healer -
Healer family
-
Processes:
pro8377.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8377.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro8377.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3076-2143-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3180-2156-0x0000000000630000-0x0000000000660000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si775125.exe family_redline behavioral1/memory/2500-2166-0x00000000001E0000-0x000000000020E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu1074.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation qu1074.exe -
Executes dropped EXE 5 IoCs
Processes:
un178260.exepro8377.exequ1074.exe1.exesi775125.exepid process 3584 un178260.exe 3880 pro8377.exe 3076 qu1074.exe 3180 1.exe 2500 si775125.exe -
Processes:
pro8377.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro8377.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8377.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exeun178260.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un178260.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2196 3880 WerFault.exe pro8377.exe 3380 3076 WerFault.exe qu1074.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
si775125.exee4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exeun178260.exepro8377.exequ1074.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si775125.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un178260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro8377.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu1074.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro8377.exepid process 3880 pro8377.exe 3880 pro8377.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro8377.exequ1074.exedescription pid process Token: SeDebugPrivilege 3880 pro8377.exe Token: SeDebugPrivilege 3076 qu1074.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exeun178260.exequ1074.exedescription pid process target process PID 4308 wrote to memory of 3584 4308 e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exe un178260.exe PID 4308 wrote to memory of 3584 4308 e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exe un178260.exe PID 4308 wrote to memory of 3584 4308 e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exe un178260.exe PID 3584 wrote to memory of 3880 3584 un178260.exe pro8377.exe PID 3584 wrote to memory of 3880 3584 un178260.exe pro8377.exe PID 3584 wrote to memory of 3880 3584 un178260.exe pro8377.exe PID 3584 wrote to memory of 3076 3584 un178260.exe qu1074.exe PID 3584 wrote to memory of 3076 3584 un178260.exe qu1074.exe PID 3584 wrote to memory of 3076 3584 un178260.exe qu1074.exe PID 3076 wrote to memory of 3180 3076 qu1074.exe 1.exe PID 3076 wrote to memory of 3180 3076 qu1074.exe 1.exe PID 3076 wrote to memory of 3180 3076 qu1074.exe 1.exe PID 4308 wrote to memory of 2500 4308 e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exe si775125.exe PID 4308 wrote to memory of 2500 4308 e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exe si775125.exe PID 4308 wrote to memory of 2500 4308 e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exe si775125.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exe"C:\Users\Admin\AppData\Local\Temp\e4ea006b64f60961a9fb152b6b606ab536a9a055ff472c933dd13db50451b719.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178260.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178260.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8377.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8377.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 10804⤵
- Program crash
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1074.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1074.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 14924⤵
- Program crash
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si775125.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si775125.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3880 -ip 38801⤵PID:3988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3076 -ip 30761⤵PID:4428
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5887f30d9a285576f57c8f9f0a59e1ac3
SHA115144e331dbb9e4fa7f93c79c26b4a2568322f1e
SHA256ae5c0323e7445858f6e2b728cd8b815b6a330e33cae263b5144da90a911bc420
SHA51226fc0f394c1afe92a1817f0688490f855a754167a74a18b102e6f207d3b69e26d4e5a28ed86f7495fba468def7170509c66682d876188efed5b84d35aab5204b
-
Filesize
641KB
MD5e411afc2bca877e790aad36d2f879106
SHA11bf672758c62f701a23ae4c536c4b41b28dd7caf
SHA25635b13770c3c2ac640775151e2bb57988d67bd9947391fb3860ab4805615bd428
SHA5127100b90c30b242e1866f5def44ca7ca6d93d15297b0a42ab9ffec3d4914a46d905cc5347729862a1885f6c5ab84342ee13052ecf0689ef361e23870ee359ce2b
-
Filesize
241KB
MD559a60ecb0caf3c8bb1ee12a649810898
SHA10e3e424eebc7335ef9c6a99105c1a88757589596
SHA25682401647a4bcda94c6fdbebbb43596e4529058e1647991aa62c9f269fba2d974
SHA512657ebec8a4a135579cfa0f612abd26406e4545e0f09eb1dd9d81a728bdf2a578351857e7b9f720d217483af8c6ae566f59e269fa8177b739c40e6d274f4d9e03
-
Filesize
424KB
MD5fe9eb6001e8c83143b79fd1d2a906899
SHA19f97f23794eae0655c78cac8552998a993ac3f89
SHA256408664beec4162a7a0517541ff7d224d547428c01557d27b3750cb84bd7acef4
SHA5125dcc242b76d28c57c6fe8b30293a296e0d0e7160705b218a0759f494c6db9437f9abd34afedfb87cdc8cea20954b28e434cb2c9cfc1cef3d511c8ff4d95a02a4
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0