Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 17:49
Static task
static1
Behavioral task
behavioral1
Sample
ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe
Resource
win10v2004-20241007-en
General
-
Target
ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe
-
Size
787KB
-
MD5
df8bc5c98a5ddec32c30d426ad7e51c3
-
SHA1
faca6fc948110a7e5611b2397d3a94129225f765
-
SHA256
ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8
-
SHA512
81db0b69618405f212e9cfa6324cfd4719ed412ce1881e9afaf461736c21ad70cb31357d50411b5a329f01e103780371b64bb2e10a6fe1ab06ac4a1c557526bc
-
SSDEEP
24576:KyeW0OlaVrQquBgu41jdiu8ermgDJUk+N:ReohquCX1jP/mgD
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
Processes:
resource yara_rule behavioral1/memory/2036-19-0x00000000023C0000-0x00000000023DA000-memory.dmp healer behavioral1/memory/2036-21-0x0000000004A40000-0x0000000004A58000-memory.dmp healer behavioral1/memory/2036-35-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-49-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-47-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-45-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-43-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-41-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-39-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-37-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-33-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-31-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-29-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-27-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-25-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-22-0x0000000004A40000-0x0000000004A52000-memory.dmp healer behavioral1/memory/2036-23-0x0000000004A40000-0x0000000004A52000-memory.dmp healer -
Healer family
-
Processes:
pro5423.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro5423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro5423.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro5423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro5423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro5423.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro5423.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1584-2143-0x0000000002690000-0x00000000026C2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5440-2156-0x0000000000780000-0x00000000007B0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si367201.exe family_redline behavioral1/memory/1960-2167-0x0000000000410000-0x000000000043E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
qu0090.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation qu0090.exe -
Executes dropped EXE 5 IoCs
Processes:
un927407.exepro5423.exequ0090.exe1.exesi367201.exepid process 1276 un927407.exe 2036 pro5423.exe 1584 qu0090.exe 5440 1.exe 1960 si367201.exe -
Processes:
pro5423.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro5423.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro5423.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exeun927407.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un927407.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2032 2036 WerFault.exe pro5423.exe 4580 1584 WerFault.exe qu0090.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
qu0090.exe1.exesi367201.exeea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exeun927407.exepro5423.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu0090.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language si367201.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un927407.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro5423.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
pro5423.exepid process 2036 pro5423.exe 2036 pro5423.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
pro5423.exequ0090.exedescription pid process Token: SeDebugPrivilege 2036 pro5423.exe Token: SeDebugPrivilege 1584 qu0090.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exeun927407.exequ0090.exedescription pid process target process PID 2300 wrote to memory of 1276 2300 ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe un927407.exe PID 2300 wrote to memory of 1276 2300 ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe un927407.exe PID 2300 wrote to memory of 1276 2300 ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe un927407.exe PID 1276 wrote to memory of 2036 1276 un927407.exe pro5423.exe PID 1276 wrote to memory of 2036 1276 un927407.exe pro5423.exe PID 1276 wrote to memory of 2036 1276 un927407.exe pro5423.exe PID 1276 wrote to memory of 1584 1276 un927407.exe qu0090.exe PID 1276 wrote to memory of 1584 1276 un927407.exe qu0090.exe PID 1276 wrote to memory of 1584 1276 un927407.exe qu0090.exe PID 1584 wrote to memory of 5440 1584 qu0090.exe 1.exe PID 1584 wrote to memory of 5440 1584 qu0090.exe 1.exe PID 1584 wrote to memory of 5440 1584 qu0090.exe 1.exe PID 2300 wrote to memory of 1960 2300 ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe si367201.exe PID 2300 wrote to memory of 1960 2300 ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe si367201.exe PID 2300 wrote to memory of 1960 2300 ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe si367201.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe"C:\Users\Admin\AppData\Local\Temp\ea4d7ec466a5852380f10ee581c1a2a27bedc09c78ef59022ba29fcc8abcdda8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un927407.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un927407.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5423.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5423.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 10844⤵
- Program crash
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0090.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0090.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1584 -s 13844⤵
- Program crash
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si367201.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si367201.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2036 -ip 20361⤵PID:4728
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1584 -ip 15841⤵PID:5524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD579ccb3890476dbfc5e8625cf4b6c00f6
SHA17bd4ab2d2a1f558bd3e866701df8d5abe83db2dd
SHA25635f6285af7160c819e5a9d4b58169df0bea149845c03b3c79b807a3988517dc0
SHA512c22ea642a40dd0ba7ea7ff14cbdc8d033cabacf9b3f4fb3e5472412143016820422744a2f68e72b4dcb9bdd42bcf801ca4ce93e03a687ee89786392111429123
-
Filesize
633KB
MD5a94a7dfe4021a7785db6f27068761af9
SHA131d52f245a44ef9ecbd7608d13a5cdfa8ea55f86
SHA256b3294c813153d67f1f387b2a2b6a4c376d5d69223f84ddad8ba807f373f824e3
SHA5122d3c7baa674bb9064e351f9b769f3377d3cdc9e2f6a250e5910fb42703984900838d910c073e7a08f8102b1813fa7e2ef30b546accb4e8c824c7a47008d0dfe9
-
Filesize
231KB
MD5d44bdd2bdda402b0d098f2034712a741
SHA15df4b978370530676aa2cc0f123f2921359e84b4
SHA256ad587357ddf8f8bb0db0b3af725d883fbefcdb87da12ee298ba2f55cb46c6069
SHA51243a0708bb4291dee35df13fe31f8531332eaac41836d8765dde5fd3f7099cd59135c647ec089d5d547426e14ef110cf0a21286ba5c8371aec306bf7414e22f77
-
Filesize
414KB
MD5572f3637a437f46c1cac81c0d7792b94
SHA1b4ab03f4fd358ae7e5fc8d63475560760363527b
SHA25631eb57471d9551b99458d8aa3ffe40fc6442629bde07102efd85bcac440a48bc
SHA512ab81d9b93a9a68060efccfc1f2ab0cf8e2a58c12c2d44deda90e1bfe58efa7eeb92ff944fb604076900cd9cae09b3ee01e33ce0e4ec4289c8eb44243bd13b658
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0