Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exe
Resource
win10v2004-20241007-en
General
-
Target
d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exe
-
Size
656KB
-
MD5
e32a3e8b369834644fbbd6b08e62c60d
-
SHA1
8bfd180e6672801f7ba2c3b94f90393ad440180c
-
SHA256
d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d
-
SHA512
c15c087fa0e587c8b90e92b00959302448cfa308fb007aeaed15c9508f49c71bfafa8acea8066bcb221d41178271e2a825a7734dfdb2d3502f77f603ce5557b1
-
SSDEEP
12288:bMr2y90lJCzQHf3OAzzUdMgyqSnh8Jt44gKdbkXq6DNe/Ny61SY0It4D/EezTN2:Ry/z83OkzU+gynhy/gKdb16Iy61L0O4m
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr666437.exe healer behavioral1/memory/1540-15-0x0000000000830000-0x000000000083A000-memory.dmp healer -
Healer family
-
Processes:
jr666437.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr666437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr666437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr666437.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr666437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr666437.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr666437.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3080-2104-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5956-2117-0x0000000000130000-0x0000000000160000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr107794.exe family_redline behavioral1/memory/5032-2128-0x0000000000F60000-0x0000000000F8E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku935220.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ku935220.exe -
Executes dropped EXE 5 IoCs
Processes:
ziYP3350.exejr666437.exeku935220.exe1.exelr107794.exepid process 3088 ziYP3350.exe 1540 jr666437.exe 3080 ku935220.exe 5956 1.exe 5032 lr107794.exe -
Processes:
jr666437.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr666437.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exeziYP3350.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYP3350.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3416 3080 WerFault.exe ku935220.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exeziYP3350.exeku935220.exe1.exelr107794.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziYP3350.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku935220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr107794.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr666437.exepid process 1540 jr666437.exe 1540 jr666437.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr666437.exeku935220.exedescription pid process Token: SeDebugPrivilege 1540 jr666437.exe Token: SeDebugPrivilege 3080 ku935220.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exeziYP3350.exeku935220.exedescription pid process target process PID 3060 wrote to memory of 3088 3060 d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exe ziYP3350.exe PID 3060 wrote to memory of 3088 3060 d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exe ziYP3350.exe PID 3060 wrote to memory of 3088 3060 d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exe ziYP3350.exe PID 3088 wrote to memory of 1540 3088 ziYP3350.exe jr666437.exe PID 3088 wrote to memory of 1540 3088 ziYP3350.exe jr666437.exe PID 3088 wrote to memory of 3080 3088 ziYP3350.exe ku935220.exe PID 3088 wrote to memory of 3080 3088 ziYP3350.exe ku935220.exe PID 3088 wrote to memory of 3080 3088 ziYP3350.exe ku935220.exe PID 3080 wrote to memory of 5956 3080 ku935220.exe 1.exe PID 3080 wrote to memory of 5956 3080 ku935220.exe 1.exe PID 3080 wrote to memory of 5956 3080 ku935220.exe 1.exe PID 3060 wrote to memory of 5032 3060 d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exe lr107794.exe PID 3060 wrote to memory of 5032 3060 d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exe lr107794.exe PID 3060 wrote to memory of 5032 3060 d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exe lr107794.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exe"C:\Users\Admin\AppData\Local\Temp\d8985f882c5c1119ebe97cc9b364cd7c3068bd616d0f5ac9dce233693e11754d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYP3350.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYP3350.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr666437.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr666437.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku935220.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku935220.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5956 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3080 -s 15004⤵
- Program crash
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr107794.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr107794.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5032
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3080 -ip 30801⤵PID:1232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5ed7bef922834b34b1a25a08137b65733
SHA10466f27221433eb73a697566759fbc1aae2e2c9d
SHA256f20be7a2265cbb297c4d054ac852036ee6194e7f66040aca029d67cbeaefa3e9
SHA51288f1c1a1c09bab2f2f5a80c1d1ba66a7dbc006ed0a0784df0eb21c84b1173f3c1ecf71a28489afe7222e646f80a4cd36bd7a84d11ad08d7506e867ace69e0d75
-
Filesize
502KB
MD5261b11e69c6833375bdd99d9880c2e80
SHA1532632b52c578d840021ddd026a6c2ebe0a5a26d
SHA2568b8fb39db378cccac7a66194c8b296ce8a27b135ae92c496e237ce7b612740be
SHA51210cf3c66f2a66c74e1bedc384e3abe61108ad13512a2b758dcad88ba8f4f7e941017d9fb12ca1a7a1e8b7ddf23511f00f1db7a349b97b4b4419bba1733cc45ec
-
Filesize
11KB
MD5f6d0b8f359744b55258659dd2b3e3bad
SHA1aed13b92a575889d502c87c7989b6fd00ab27580
SHA2566a0bfb156ac8580978927364c5ef4f905434225f53654cb1d06b56b944556a86
SHA512c88e4bc9b508a549d87b4c5007ebf599a2631e594dbcb8702f51df34f2201c57cdb4ac1ef68cd52062cf78810247da93585e7ff0af97f43f559b14c13d89f2b9
-
Filesize
424KB
MD5dca0b41b484612e1760a657a52133e58
SHA146ec6291c1d6f44692d08b82d4564720aa7d64be
SHA2568cee146f838ee8e1c31810b25b188a204031d107e877238d5c1e9249fae2c096
SHA512ac2e1bafbe232b5bd0e9e57c2288a730baa5ab19c2efd87fe907416e00b2532d49e8b1479528c8a6fd2498a88585638bd8a893a4c9d01c46c588cbf1dfac588b
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0