Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 14:38
Static task
static1
Behavioral task
behavioral1
Sample
1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1.exe
Resource
win10v2004-20241007-en
General
-
Target
1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1.exe
-
Size
1.0MB
-
MD5
37f7bcb6d24a909fa799dfad47ca6c28
-
SHA1
6b9a2cc3664db7615219ee10c100be45c854f74e
-
SHA256
1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1
-
SHA512
64c8685b9c3f2e87ef1229f3921a779e29eb72717a11497659b02f8915302360f466115c220d4aebc99dbe64068c3a66a2e32f4cb35690b35bee6f3c76d6a6a4
-
SSDEEP
24576:NyI+yvV4nLtzROhfOPgv+lg7DIIACpi6ufRcJw+4Oi:oJyNQNsh2o+sDTz4Qw+4O
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/552-25-0x00000000022D0000-0x00000000022EA000-memory.dmp healer behavioral1/memory/552-27-0x00000000025A0000-0x00000000025B8000-memory.dmp healer behavioral1/memory/552-55-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-53-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-51-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-49-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-47-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-45-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-43-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-41-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-39-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-37-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-35-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-33-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-31-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-29-0x00000000025A0000-0x00000000025B2000-memory.dmp healer behavioral1/memory/552-28-0x00000000025A0000-0x00000000025B2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pr277946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pr277946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pr277946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pr277946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pr277946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pr277946.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4848-2149-0x0000000005410000-0x0000000005442000-memory.dmp family_redline behavioral1/files/0x0015000000023a9a-2154.dat family_redline behavioral1/memory/6960-2162-0x0000000000D80000-0x0000000000DB0000-memory.dmp family_redline behavioral1/files/0x000a000000023b86-2171.dat family_redline behavioral1/memory/6212-2173-0x0000000000EE0000-0x0000000000F0E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation qu503013.exe -
Executes dropped EXE 6 IoCs
pid Process 872 un604814.exe 2996 un841355.exe 552 pr277946.exe 4848 qu503013.exe 6960 1.exe 6212 rk708059.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pr277946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pr277946.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un604814.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" un841355.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2164 552 WerFault.exe 85 5908 4848 WerFault.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un841355.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr277946.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu503013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rk708059.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un604814.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 552 pr277946.exe 552 pr277946.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 552 pr277946.exe Token: SeDebugPrivilege 4848 qu503013.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3412 wrote to memory of 872 3412 1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1.exe 83 PID 3412 wrote to memory of 872 3412 1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1.exe 83 PID 3412 wrote to memory of 872 3412 1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1.exe 83 PID 872 wrote to memory of 2996 872 un604814.exe 84 PID 872 wrote to memory of 2996 872 un604814.exe 84 PID 872 wrote to memory of 2996 872 un604814.exe 84 PID 2996 wrote to memory of 552 2996 un841355.exe 85 PID 2996 wrote to memory of 552 2996 un841355.exe 85 PID 2996 wrote to memory of 552 2996 un841355.exe 85 PID 2996 wrote to memory of 4848 2996 un841355.exe 100 PID 2996 wrote to memory of 4848 2996 un841355.exe 100 PID 2996 wrote to memory of 4848 2996 un841355.exe 100 PID 4848 wrote to memory of 6960 4848 qu503013.exe 101 PID 4848 wrote to memory of 6960 4848 qu503013.exe 101 PID 4848 wrote to memory of 6960 4848 qu503013.exe 101 PID 872 wrote to memory of 6212 872 un604814.exe 104 PID 872 wrote to memory of 6212 872 un604814.exe 104 PID 872 wrote to memory of 6212 872 un604814.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1.exe"C:\Users\Admin\AppData\Local\Temp\1e22f608e62a43dc92f79175556f37d57af67b3f3ae8239b980bbb9e27b172e1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un604814.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un604814.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un841355.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\un841355.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr277946.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pr277946.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:552 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 552 -s 10845⤵
- Program crash
PID:2164
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu503013.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\qu503013.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 13845⤵
- Program crash
PID:5908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk708059.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk708059.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 552 -ip 5521⤵PID:4448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4848 -ip 48481⤵PID:7132
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
800KB
MD53b480416209b97bcb59b971e0ff33778
SHA1e7c64cbc1fa4a00de65607d2a0bd5dcb87c9b01c
SHA25632afe63ddb43a78c495b4cb6d43c78633abb70b2bf95eaddd8a33530a0c1f3eb
SHA51257ae574a38a7a159118797e852068035f1877ecacca91152d146e73db7e1f60dc55d47f5e22808b5a6f466a8367ec926fc3d1616ace9127895361d69691f74ba
-
Filesize
168KB
MD5e68fd85577ade1c2aa31c33c024db078
SHA16c1dc83ea2180931ce0c34301918779fc710d14a
SHA256424431f99f3edcccf6f006d3ffc586557d1d86ae29092a28d20e394f0dd77ca0
SHA5127f609e71060ff053ff44fe4ae9d3d728fc38fee1ac19b36fef2a1cff1256e4e2f8df947875a2a245d57fde44b63a28504234d80514c5e7fbc095b85464156caa
-
Filesize
646KB
MD56ed69ba10d72cf9d8f10aeef0c8dd72f
SHA1f2aaa309666428291cb3061e603ada53a60b4194
SHA256e8ec3c824f42ce3a59db15738625d2d4a74fcc096cd255a709f80ff5393f5855
SHA512dab3a6640cb49fa295f458496fbf81a6c47d45333f0dc853f27cf2726759188a4874018c4abbd808a4ed1d09f83f2efcdb3d565a687e99fb08d59f1399f121c0
-
Filesize
243KB
MD5cabb163b07c95c2f8507e9abf627355e
SHA1e28435168b09bb1b323287014ac17263707b32cd
SHA2567bfba3c237a76c712e7d70f48d1fb8162f8251ad9aef911e63e02785e71ec62e
SHA512c2849df8698746dce9adfea1e1d7873f0e8363d816a3edc3abbef4d0eb3e2b7e9d71a73d7a8c88d65945f98ab3ca957da15ec046788a2406e5087eddd3c8b129
-
Filesize
426KB
MD52907ed9327ad173ea95b90f61702a0bb
SHA1f8ebad1d6baa7eedb4dcf0a121d9f55ead8afa2a
SHA256d0c0786cc7195a05e227400605b4c017475bfd477a77c171bcb10e614aa975bb
SHA512826e0e9acc204daca5d2254f65ac45ddbab6264659dca27ed1a41323f3aa50e00a3030617cb7c7b99655896edd91c82930614dda8e45a633a537ec83bf07f1b0
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0