Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 04:00
Static task
static1
Behavioral task
behavioral1
Sample
e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exe
Resource
win10v2004-20241007-en
General
-
Target
e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exe
-
Size
787KB
-
MD5
c9bb4d8a987e3548112b6c53a29f1a60
-
SHA1
2eb2d612c5ce1427a074c65c56236a4678a99ab4
-
SHA256
e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab
-
SHA512
571dee29dfc1becf4fe28d88d93cfda45be9081b38350582ecd98c7acda3af2360d0f865721dfb1c9892bdde745b573b0b7dadc9b156874e14155a8a7231888d
-
SSDEEP
24576:wyN2yGMzIfhBuJmn7LaRuPe3VoaUATtRbyUy:3N2tM8vuGaAWJUAvh
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/3672-19-0x00000000021A0000-0x00000000021BA000-memory.dmp healer behavioral1/memory/3672-21-0x0000000002490000-0x00000000024A8000-memory.dmp healer behavioral1/memory/3672-39-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-49-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-47-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-46-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-43-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-41-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-37-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-36-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-33-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-31-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-29-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-27-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-25-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-23-0x0000000002490000-0x00000000024A2000-memory.dmp healer behavioral1/memory/3672-22-0x0000000002490000-0x00000000024A2000-memory.dmp healer -
Healer family
-
Processes:
pro1001.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro1001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro1001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro1001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro1001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro1001.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro1001.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4168-2142-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4952-2155-0x0000000000AB0000-0x0000000000AE0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si208490.exe family_redline behavioral1/memory/2748-2166-0x0000000000620000-0x000000000064E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu8082.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation qu8082.exe -
Executes dropped EXE 5 IoCs
Processes:
un524245.exepro1001.exequ8082.exe1.exesi208490.exepid process 924 un524245.exe 3672 pro1001.exe 4168 qu8082.exe 4952 1.exe 2748 si208490.exe -
Processes:
pro1001.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro1001.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro1001.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exeun524245.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un524245.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2944 3672 WerFault.exe pro1001.exe 1884 4168 WerFault.exe qu8082.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exesi208490.exee4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exeun524245.exepro1001.exequ8082.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si208490.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un524245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro1001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8082.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro1001.exepid process 3672 pro1001.exe 3672 pro1001.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro1001.exequ8082.exedescription pid process Token: SeDebugPrivilege 3672 pro1001.exe Token: SeDebugPrivilege 4168 qu8082.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exeun524245.exequ8082.exedescription pid process target process PID 4772 wrote to memory of 924 4772 e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exe un524245.exe PID 4772 wrote to memory of 924 4772 e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exe un524245.exe PID 4772 wrote to memory of 924 4772 e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exe un524245.exe PID 924 wrote to memory of 3672 924 un524245.exe pro1001.exe PID 924 wrote to memory of 3672 924 un524245.exe pro1001.exe PID 924 wrote to memory of 3672 924 un524245.exe pro1001.exe PID 924 wrote to memory of 4168 924 un524245.exe qu8082.exe PID 924 wrote to memory of 4168 924 un524245.exe qu8082.exe PID 924 wrote to memory of 4168 924 un524245.exe qu8082.exe PID 4168 wrote to memory of 4952 4168 qu8082.exe 1.exe PID 4168 wrote to memory of 4952 4168 qu8082.exe 1.exe PID 4168 wrote to memory of 4952 4168 qu8082.exe 1.exe PID 4772 wrote to memory of 2748 4772 e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exe si208490.exe PID 4772 wrote to memory of 2748 4772 e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exe si208490.exe PID 4772 wrote to memory of 2748 4772 e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exe si208490.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exe"C:\Users\Admin\AppData\Local\Temp\e4111198477649c7f60c72bdc88a6de14aae9cc3fa064b04f813f902176997ab.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un524245.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un524245.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1001.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1001.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 10924⤵
- Program crash
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8082.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8082.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 14244⤵
- Program crash
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si208490.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si208490.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2748
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3672 -ip 36721⤵PID:4424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4168 -ip 41681⤵PID:548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD58365a573f9ce5bf2712b6e863e48fc78
SHA1f8a5b0b6491fde6e3e78bc38552172f9af897446
SHA25659c639368b63ccb49421824e43748cc9370cbfd5339292b096a45573138626d2
SHA51262f003aa124978f92cbd0e515d0b4bd3b0b3eba804e4caf224ccd6a4dfe64a031978d5516a1ae97c2db31e0427c58285e027ca982d745448e9ab3539a6d0b4ff
-
Filesize
633KB
MD56125f09a02715e4caa9f2fa036b28b4f
SHA1392a2e9dd9598698f021e1ba070febf9b7ddb7d2
SHA256079c61ba3b99e59cf99629212d09766517fdc8a5a8fca24a1718aba16d204e8e
SHA512e1d0a3883f40d6c5511e83acdfc97309b104920f8af179c8aca95bf476dc6067754ac3f7e61e52d88f21cd202b4b2aee23eb5995ac0add4e565bd1f9122ad697
-
Filesize
230KB
MD5ced487580348be9cf49f3010894f488e
SHA10af083927901d762da36b86232d3e278ab8372f6
SHA25633f410c7ed567bb8435a274281d89330e422802e1bb6abb07d79c70392203ea4
SHA5129b8a0db4133a5aea0c0ffbca1c3e5b29b1cae19a6ac52b9280a7e28b95877b5f1a0f91daf3daedce4c7a9edefca19e1c76f7e7b95938fe2800bb990fa5cc6ca2
-
Filesize
414KB
MD5cfca2b713a5d5ce49bec8d66c8ed5d45
SHA16435c2b2d7be93e2471578bb20615b41f6554f10
SHA25675793f3e0a61f9fb6ae27e98d963cce83cdbf83bf6ef706e2651e573d790a6f3
SHA512dc488bb12bf0c54ae0f4d7ffbe2ea1f52d64c74f87866de3e855a9cfdb0b59a34142dac591818de899fb57fde288611b9cb4af0f3ed19e662ba4799a2068a914
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0