Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630.exe
Resource
win10v2004-20241007-en
General
-
Target
ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630.exe
-
Size
660KB
-
MD5
b4f4338a28f252eaae707ceefa38f716
-
SHA1
f638d04e5be045014f5079e35ac4dac848c9fe06
-
SHA256
ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630
-
SHA512
64ae46ecab93c98c0acf39fbb9e943b56a6d2a6916cd71daaf34f65ff2479a93470aab21623f0aa3409c215eeb7088bd4474f960964066a88ede70e26cc86a13
-
SSDEEP
12288:wMrHy90KOyuYveX0zVCLbGA+DECS6LNSc3puIcbSMOcysfeG:nyhNG0zV0bGA+DECS6JwbSlxG
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c93-12.dat healer behavioral1/memory/3668-15-0x0000000000760000-0x000000000076A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr700905.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr700905.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr700905.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr700905.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr700905.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr700905.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1908-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x0008000000023c8d-2110.dat family_redline behavioral1/memory/3532-2118-0x0000000000130000-0x0000000000160000-memory.dmp family_redline behavioral1/files/0x0007000000023c91-2127.dat family_redline behavioral1/memory/3768-2129-0x0000000000740000-0x000000000076E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ku272054.exe -
Executes dropped EXE 5 IoCs
pid Process 3488 ziZQ0528.exe 3668 jr700905.exe 1908 ku272054.exe 3532 1.exe 3768 lr862750.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr700905.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziZQ0528.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6140 1908 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziZQ0528.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku272054.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr862750.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3668 jr700905.exe 3668 jr700905.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3668 jr700905.exe Token: SeDebugPrivilege 1908 ku272054.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4680 wrote to memory of 3488 4680 ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630.exe 83 PID 4680 wrote to memory of 3488 4680 ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630.exe 83 PID 4680 wrote to memory of 3488 4680 ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630.exe 83 PID 3488 wrote to memory of 3668 3488 ziZQ0528.exe 84 PID 3488 wrote to memory of 3668 3488 ziZQ0528.exe 84 PID 3488 wrote to memory of 1908 3488 ziZQ0528.exe 96 PID 3488 wrote to memory of 1908 3488 ziZQ0528.exe 96 PID 3488 wrote to memory of 1908 3488 ziZQ0528.exe 96 PID 1908 wrote to memory of 3532 1908 ku272054.exe 97 PID 1908 wrote to memory of 3532 1908 ku272054.exe 97 PID 1908 wrote to memory of 3532 1908 ku272054.exe 97 PID 4680 wrote to memory of 3768 4680 ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630.exe 102 PID 4680 wrote to memory of 3768 4680 ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630.exe 102 PID 4680 wrote to memory of 3768 4680 ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630.exe"C:\Users\Admin\AppData\Local\Temp\ea6e883fa335283119f47a7cbbc8b9613b60abf2cb7d40a8750fc0b1830bd630.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZQ0528.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZQ0528.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr700905.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr700905.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku272054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku272054.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 13764⤵
- Program crash
PID:6140
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr862750.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr862750.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1908 -ip 19081⤵PID:6024
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5231d2ff1e74d7426c9ec78d3cacbcb8a
SHA1bb7e9532f9147f6b107ce07d59e8040261966798
SHA256446176cde4eeda1cbbc58dfa309e5112c2e54cd453f620ac46c9295f6cf786f8
SHA512747db4645615d059ce48d64c34c02edb4c7d047289e4d3fbdb4c876dfb3ecabe0764193cd44726adf1f97e20682153783c206caa45c2470c88dfde2e49c0a392
-
Filesize
507KB
MD548b6a9aff5f507b83350037d19d4be1a
SHA1409f74605216570305e873385ca55e57448915b1
SHA2569c53eb8c6113e28223639ef2865c4c0f4debace5ebc8964b79c9274663c45fc3
SHA51209b2d83195ed0b0a8d01b0a4cff7f0fb9510ac17f4666df7efdff4da3b380186b20e6cf390420269f0086f170ef73172e5f9b900429ce1e9fa6f96d6f404a7e0
-
Filesize
14KB
MD5542e172fae0c23d27ec81e4db7349a3b
SHA11123336d916a17df3cc8a5c40245e8b125bc3b96
SHA2567532fa09d5dbb678c9411e74a63cda2fed4821970b724cd24a09c968983edbbd
SHA51291f5aa79fcfabeeae23c6183a07f961738b5cd4ed55cbdeb756579325bbe220352b62bfd23faaf7796a88b1b9d99c09678043d88d9679a0f5560598e05b72d8c
-
Filesize
426KB
MD50dac91abc312d57dfd7986e51ae68b4e
SHA1e3938ebe94f7d9610a8f655dd6f513e6b6cc544f
SHA25628bca441f201ab3de07e55c04e0313324627d8bfb59f099d031e8525198730cf
SHA51260f34da6195ab10cbd30bf245ffda8a817ffe8676fe7e67d7ef1e4e2bc3a64afcb264ca5b33de95857f1ec775d072706bfc5148252544a9debf490fba205629d
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0