Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-04-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
46e9c10bc32dd04b8ef9fadb99eca630e3d47eedc0165516b858bb7856da5e83.exe
Resource
win10v2004-20240226-en
General
-
Target
46e9c10bc32dd04b8ef9fadb99eca630e3d47eedc0165516b858bb7856da5e83.exe
-
Size
652KB
-
MD5
14a97fee99c8fced60e9cad2584f4aa7
-
SHA1
f4d706194ffa5e91058aa1fbc391557f2fba0dca
-
SHA256
46e9c10bc32dd04b8ef9fadb99eca630e3d47eedc0165516b858bb7856da5e83
-
SHA512
5dc88fef231ff426ad5b8c1c0fdf965f5d01e293ef448745bfde09e182bd04b76d51c85d736405e625a5426157638464dbcf27b844aab5d8d5fe0113614ac95e
-
SSDEEP
12288:xMr7y90STdMwnLHu/oaTJfEniBrTVPs5RVtCEGKlVMA5g:2ybSwLHuRhPo0uQb
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023227-13.dat healer behavioral1/memory/3580-14-0x0000000000170000-0x000000000017A000-memory.dmp healer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr484884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr484884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr484884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr484884.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr484884.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr484884.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2384-2111-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x000700000002322a-2117.dat family_redline behavioral1/memory/4920-2125-0x0000000000910000-0x0000000000940000-memory.dmp family_redline behavioral1/files/0x0007000000023225-2139.dat family_redline behavioral1/memory/4068-2141-0x0000000000E00000-0x0000000000E2E000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023227-13.dat INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/3580-14-0x0000000000170000-0x000000000017A000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 5 IoCs
resource yara_rule behavioral1/memory/2384-2111-0x0000000005400000-0x0000000005432000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/files/0x000700000002322a-2117.dat INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/4920-2125-0x0000000000910000-0x0000000000940000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/files/0x0007000000023225-2139.dat INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/4068-2141-0x0000000000E00000-0x0000000000E2E000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation ku722878.exe -
Executes dropped EXE 5 IoCs
pid Process 4524 zivy7303.exe 3580 jr484884.exe 2384 ku722878.exe 4920 1.exe 4068 lr379668.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr484884.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 46e9c10bc32dd04b8ef9fadb99eca630e3d47eedc0165516b858bb7856da5e83.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zivy7303.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3232 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4596 2384 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3580 jr484884.exe 3580 jr484884.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3580 jr484884.exe Token: SeDebugPrivilege 2384 ku722878.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3252 wrote to memory of 4524 3252 46e9c10bc32dd04b8ef9fadb99eca630e3d47eedc0165516b858bb7856da5e83.exe 86 PID 3252 wrote to memory of 4524 3252 46e9c10bc32dd04b8ef9fadb99eca630e3d47eedc0165516b858bb7856da5e83.exe 86 PID 3252 wrote to memory of 4524 3252 46e9c10bc32dd04b8ef9fadb99eca630e3d47eedc0165516b858bb7856da5e83.exe 86 PID 4524 wrote to memory of 3580 4524 zivy7303.exe 87 PID 4524 wrote to memory of 3580 4524 zivy7303.exe 87 PID 4524 wrote to memory of 2384 4524 zivy7303.exe 96 PID 4524 wrote to memory of 2384 4524 zivy7303.exe 96 PID 4524 wrote to memory of 2384 4524 zivy7303.exe 96 PID 2384 wrote to memory of 4920 2384 ku722878.exe 97 PID 2384 wrote to memory of 4920 2384 ku722878.exe 97 PID 2384 wrote to memory of 4920 2384 ku722878.exe 97 PID 3252 wrote to memory of 4068 3252 46e9c10bc32dd04b8ef9fadb99eca630e3d47eedc0165516b858bb7856da5e83.exe 101 PID 3252 wrote to memory of 4068 3252 46e9c10bc32dd04b8ef9fadb99eca630e3d47eedc0165516b858bb7856da5e83.exe 101 PID 3252 wrote to memory of 4068 3252 46e9c10bc32dd04b8ef9fadb99eca630e3d47eedc0165516b858bb7856da5e83.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\46e9c10bc32dd04b8ef9fadb99eca630e3d47eedc0165516b858bb7856da5e83.exe"C:\Users\Admin\AppData\Local\Temp\46e9c10bc32dd04b8ef9fadb99eca630e3d47eedc0165516b858bb7856da5e83.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivy7303.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivy7303.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr484884.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr484884.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3580
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku722878.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku722878.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 13804⤵
- Program crash
PID:4596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr379668.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr379668.exe2⤵
- Executes dropped EXE
PID:4068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2384 -ip 23841⤵PID:536
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5502bbe4f68566db8ffe8acdf61eb0eb6
SHA17745a2d21b789b35fbf593f24393de9008d0df30
SHA2568885442da8a77ae5076de07d7dc9c25b37bb56d1218784df7ac67a15f0501b36
SHA5125760bcac134d65030afeda8ab0c6da89b4795c4bacf60fac8975816e541fb2f2029ed84fad49f0297a7107de0717f27ade00520a56b15ad2cb69e16d4c3a28a9
-
Filesize
498KB
MD531a7711093ab1c92e1d599d54b2984d6
SHA1309f9e8848b01fe7229d8a6e069cf56de426f910
SHA256d083160fa2ed9c5037806fe50d4e467431cb83ab1157830a3357194232d98b3c
SHA5124a6cad337cad6cb444d5584a3e95cd163f9eb16b2de75e0a776bad39d674983bcb07753d99cdab1b2f63576e44d3c01eb43e8a930331d54a992c56be7f47a9d2
-
Filesize
12KB
MD573ca7d6c3646363d5e0f8d94c5f063e1
SHA17c2342ed0ff6edf7bc2ff6148e4874d0300b37bf
SHA256ab985a683058ef9d9c10c311592f16c2ebfaa3dbb54b973ba0f8eb9921662822
SHA51298412a9f7b84bdb937d07b6a44a9695f351a15301d1ad708b79df907cac93f64ab752edec4007706fd0c3f20ddc0dbcbfc233c4d68edce2eca530190a4f78743
-
Filesize
417KB
MD5bf60d846ae7c73d56be7f3c06ef04541
SHA1851585e4e481326a527c70d70bec57750c14c6d8
SHA2567db8da80b25d1ae6ce7bf0df261f1ef969e081775bec905eafbaa57fcb40b687
SHA5125ff2e59ba3f0f4ba748f27164f3fbf2bf7ee752ed584a68a6854d57d3beef784ae5772570b727f79fc386da9cf3b688145617e30c1ff47ccf9b02d40ab19d7b1
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0