Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:54
Static task
static1
Behavioral task
behavioral1
Sample
f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9.exe
Resource
win10v2004-20241007-en
General
-
Target
f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9.exe
-
Size
1.0MB
-
MD5
4f82dbdce363409aab291a6dca1083d3
-
SHA1
2fb1709945af8f0bad40b92e7c462ad4ee665245
-
SHA256
f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9
-
SHA512
243f511240d19f8fd80d5d28535edb7bf7b74b5b2f0f2ca299971ddb3d965d3d6f6c4736f3036abec9be463c3d64e1e3bc3c479706d34b73b3b2d4da5b41751b
-
SSDEEP
24576:UyO3BO36CrsSKep1e9gEUroxloMaCEKH71P:jSq6CoSKep1SpRxq/ZK
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
disa
185.161.248.90:4125
-
auth_value
93f8c4ca7000e3381dd4b6b86434de05
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b92-19.dat healer behavioral1/memory/868-22-0x0000000000D50000-0x0000000000D5A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it937518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it937518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it937518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it937518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it937518.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it937518.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/5108-2174-0x0000000005760000-0x0000000005792000-memory.dmp family_redline behavioral1/files/0x000a000000023b95-2179.dat family_redline behavioral1/memory/2484-2188-0x0000000000670000-0x000000000069E000-memory.dmp family_redline behavioral1/files/0x000a000000023b8f-2191.dat family_redline behavioral1/memory/6080-2193-0x0000000000DF0000-0x0000000000E20000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation jr159105.exe -
Executes dropped EXE 6 IoCs
pid Process 3608 zizl9018.exe 2984 ziaj9807.exe 868 it937518.exe 5108 jr159105.exe 2484 1.exe 6080 kp071386.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it937518.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zizl9018.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziaj9807.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 232 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zizl9018.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziaj9807.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr159105.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp071386.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 868 it937518.exe 868 it937518.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 868 it937518.exe Token: SeDebugPrivilege 5108 jr159105.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3128 wrote to memory of 3608 3128 f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9.exe 84 PID 3128 wrote to memory of 3608 3128 f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9.exe 84 PID 3128 wrote to memory of 3608 3128 f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9.exe 84 PID 3608 wrote to memory of 2984 3608 zizl9018.exe 85 PID 3608 wrote to memory of 2984 3608 zizl9018.exe 85 PID 3608 wrote to memory of 2984 3608 zizl9018.exe 85 PID 2984 wrote to memory of 868 2984 ziaj9807.exe 86 PID 2984 wrote to memory of 868 2984 ziaj9807.exe 86 PID 2984 wrote to memory of 5108 2984 ziaj9807.exe 94 PID 2984 wrote to memory of 5108 2984 ziaj9807.exe 94 PID 2984 wrote to memory of 5108 2984 ziaj9807.exe 94 PID 5108 wrote to memory of 2484 5108 jr159105.exe 95 PID 5108 wrote to memory of 2484 5108 jr159105.exe 95 PID 5108 wrote to memory of 2484 5108 jr159105.exe 95 PID 3608 wrote to memory of 6080 3608 zizl9018.exe 96 PID 3608 wrote to memory of 6080 3608 zizl9018.exe 96 PID 3608 wrote to memory of 6080 3608 zizl9018.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9.exe"C:\Users\Admin\AppData\Local\Temp\f719ceb68098a8d8580528cb508c2b61fde8080d3b5c3df94fc85c4f91e3faf9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizl9018.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizl9018.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziaj9807.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziaj9807.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it937518.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it937518.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr159105.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr159105.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp071386.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp071386.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6080
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:232
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD55749b00ca3371ac91b363f0257f46775
SHA1da346656b33d15768baeba4d9edf6bb7ffcd5ecf
SHA2569fd934687874e0106953aca3327240836d26267ba9fe9893a16aa31be92492b3
SHA51275ce8095e64cb026a0fcf6d363c7e1b192e0d269d4ce985e2170daae0a928b8b2abf7e0c376db8935420bbe0287954a1c82b2f1e5221333eef7f2a1f8be04f15
-
Filesize
169KB
MD569e0896d5bf96cc333493b6e20aa8990
SHA164933812743bdd317e0bf918c8b4a35cf1e9b09e
SHA2565556c2cd6037f436712245cc11cf572e50d87b11b55ac24a0815d069e7267724
SHA512eab8c1c2fcad3a0cd83951074401d8367037796f4a6a90b98d0544f1d63b132d1732381c831633ba6f7976627969025a7a84d1372410f4be0aa3f3dbec8cf982
-
Filesize
569KB
MD55e4f19173cb4571f6f94ebdc2c613bd7
SHA17ec2ab34fb0f4450bb427d07e2c27e3bd21b8b37
SHA256f99f59cc65b63dfcdf427cd007e89e0c1fd8dc5b1670451d5ae37cdaffb6a5ac
SHA5121276fc8b40e91c249250b11e9e6882192ea6a8ed2720bd21502e36e4ecc4616727e0d5e50082cf2571c66346d252811579086acd524bb6eabcc65daae7717481
-
Filesize
11KB
MD54550c759e930c94020888cdcfed8085f
SHA19b035d7e7b3c41a3856bc7c4d2465b16ed6c584d
SHA2568faf4df83e6c0ff8ba8765fccb128886c9ba09639e56e739283650cd620307dc
SHA51212c7b6b7847ae75488741e79ad8b29b1d2f79e7c50fb9f3fa5a30f09061bbce095ef83439df500a9d74f5716ecfb22218d59db64c02fedead100c322749f392c
-
Filesize
588KB
MD5648b197f84cfe41c24ff88fedc2376dd
SHA1ffe00a58d67516766e1107b188b842a35659c5b9
SHA256b34210c7b961cdd0e4f2fa7aec906321a33ff64f14fe70c88cc8eb177f15035d
SHA512123a1676ad7a41cede176697490d890ce7c9c087af76a54012b6bac19eeaeac9bbf4b92b7d45e1c16cdff2a2614fb9df83277f6d5469365fd22c4bda0940de81
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1