Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 23:44
Static task
static1
Behavioral task
behavioral1
Sample
dced29db12cda9fbabe781ffb924b040c7934d6e0a416ca143cfb7822ef15654.exe
Resource
win10v2004-20240226-en
General
-
Target
dced29db12cda9fbabe781ffb924b040c7934d6e0a416ca143cfb7822ef15654.exe
-
Size
506KB
-
MD5
de178356a6f4d1b00dc29cdc134a900d
-
SHA1
395edeac50a471cfe8bee42a9a4a7a821f8a602f
-
SHA256
dced29db12cda9fbabe781ffb924b040c7934d6e0a416ca143cfb7822ef15654
-
SHA512
7db453b2ee441d8131bf2628f564dee32f43beb98d5c3ef6c1649205615314e660ac2859d1fc40306856ec77203074d87960706ba977980a580f6d7dd92b6968
-
SSDEEP
12288:LMr0y90l6CDXimn175GUb7T4Qo0hzYxE+J7Sn:vycH17gsTuuYxEMOn
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x00080000000231fc-5.dat healer behavioral1/memory/1512-7-0x0000000000FF0000-0x0000000000FFA000-memory.dmp healer -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr782807.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr782807.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr782807.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr782807.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr782807.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr782807.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/4664-2106-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x00070000000231ff-2111.dat family_redline behavioral1/memory/1884-2119-0x0000000000AD0000-0x0000000000B00000-memory.dmp family_redline -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 2 IoCs
resource yara_rule behavioral1/files/0x00080000000231fc-5.dat INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender behavioral1/memory/1512-7-0x0000000000FF0000-0x0000000000FFA000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
Detects executables packed with ConfuserEx Mod 3 IoCs
resource yara_rule behavioral1/memory/4664-2106-0x0000000005400000-0x0000000005432000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx behavioral1/files/0x00070000000231ff-2111.dat INDICATOR_EXE_Packed_ConfuserEx behavioral1/memory/1884-2119-0x0000000000AD0000-0x0000000000B00000-memory.dmp INDICATOR_EXE_Packed_ConfuserEx -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation ku979304.exe -
Executes dropped EXE 3 IoCs
pid Process 1512 jr782807.exe 4664 ku979304.exe 1884 1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr782807.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dced29db12cda9fbabe781ffb924b040c7934d6e0a416ca143cfb7822ef15654.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4028 4664 WerFault.exe 95 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1512 jr782807.exe 1512 jr782807.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1512 jr782807.exe Token: SeDebugPrivilege 4664 ku979304.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4296 wrote to memory of 1512 4296 dced29db12cda9fbabe781ffb924b040c7934d6e0a416ca143cfb7822ef15654.exe 85 PID 4296 wrote to memory of 1512 4296 dced29db12cda9fbabe781ffb924b040c7934d6e0a416ca143cfb7822ef15654.exe 85 PID 4296 wrote to memory of 4664 4296 dced29db12cda9fbabe781ffb924b040c7934d6e0a416ca143cfb7822ef15654.exe 95 PID 4296 wrote to memory of 4664 4296 dced29db12cda9fbabe781ffb924b040c7934d6e0a416ca143cfb7822ef15654.exe 95 PID 4296 wrote to memory of 4664 4296 dced29db12cda9fbabe781ffb924b040c7934d6e0a416ca143cfb7822ef15654.exe 95 PID 4664 wrote to memory of 1884 4664 ku979304.exe 98 PID 4664 wrote to memory of 1884 4664 ku979304.exe 98 PID 4664 wrote to memory of 1884 4664 ku979304.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\dced29db12cda9fbabe781ffb924b040c7934d6e0a416ca143cfb7822ef15654.exe"C:\Users\Admin\AppData\Local\Temp\dced29db12cda9fbabe781ffb924b040c7934d6e0a416ca143cfb7822ef15654.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr782807.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr782807.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ku979304.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ku979304.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
PID:1884
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 15163⤵
- Program crash
PID:4028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4664 -ip 46641⤵PID:3340
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5c0f9e039ee4b94cda67c4f99bded7e4a
SHA1484441d507c9b109ba594e790a6bd2cc2410f207
SHA256736569a639993d42a3d4f3a8693e402e4f3b151ac6a5128727ece38fbb5e5d3b
SHA51288335bc796fc8c51a77e90f685caff2188c9ea67018378d09ed216ad7d9635438e9ab44defdff252fd5d0d49ec6dea209c4edc3df1751e0ee53ebc03c7511a22
-
Filesize
426KB
MD571d0b2dc85f89e363dc3e233370e7cfe
SHA101e673e944a9812828bf6e4721056a87bc8016a8
SHA256a0f34d1d604fce6f544c4dbbe55b78e6a58ac1eb556840613f60cb8e39abd353
SHA512e24b3e48bb045a2824ac8c8811f75c9899728edd7e98c828aee6dd0a02488510a1982b253550e20c9976d4525dd6f8c00f111fc1162289e8c08098f9aaa5222b
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0