Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:32
Static task
static1
Behavioral task
behavioral1
Sample
de86e76777384c674dde285bee762e2447a2d8c146c4cf2d0d9da6b52ba11f54.exe
Resource
win10v2004-20241007-en
General
-
Target
de86e76777384c674dde285bee762e2447a2d8c146c4cf2d0d9da6b52ba11f54.exe
-
Size
661KB
-
MD5
b3a5f3db24179e48a4fbb5a8a1ac6886
-
SHA1
473617d11536477123887143f9e78eb546d5eb8a
-
SHA256
de86e76777384c674dde285bee762e2447a2d8c146c4cf2d0d9da6b52ba11f54
-
SHA512
091cef15cd35572b388456421b909b713a30eaa16e642b5c9ec87b3c22b5677cf9aded4fb18834cff5d10ffefc6f795f41bbfe326b4f111c75449386731a27c0
-
SSDEEP
12288:PMrYy90PkSVfSg7kY/lQ/xfv7a2FeQ2UbMf4tochzdxPJsOQPAfUX:byGVfOxLa2Fh2xfVGdxP+tE6
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
dozt
77.91.124.145:4125
-
auth_value
857bdfe4fa14711025859d89f18b32cb
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b95-12.dat healer behavioral1/memory/4576-15-0x00000000002F0000-0x00000000002FA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr062999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr062999.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr062999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr062999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr062999.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr062999.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2544-2105-0x0000000005550000-0x0000000005582000-memory.dmp family_redline behavioral1/files/0x0009000000022719-2111.dat family_redline behavioral1/memory/3488-2118-0x0000000000E60000-0x0000000000E90000-memory.dmp family_redline behavioral1/files/0x000a000000023b93-2128.dat family_redline behavioral1/memory/5228-2129-0x0000000000140000-0x0000000000170000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ku464383.exe -
Executes dropped EXE 5 IoCs
pid Process 2720 ziST7167.exe 4576 jr062999.exe 2544 ku464383.exe 3488 1.exe 5228 lr268665.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr062999.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" de86e76777384c674dde285bee762e2447a2d8c146c4cf2d0d9da6b52ba11f54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziST7167.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1592 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 396 2544 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de86e76777384c674dde285bee762e2447a2d8c146c4cf2d0d9da6b52ba11f54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziST7167.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku464383.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr268665.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4576 jr062999.exe 4576 jr062999.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4576 jr062999.exe Token: SeDebugPrivilege 2544 ku464383.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1424 wrote to memory of 2720 1424 de86e76777384c674dde285bee762e2447a2d8c146c4cf2d0d9da6b52ba11f54.exe 84 PID 1424 wrote to memory of 2720 1424 de86e76777384c674dde285bee762e2447a2d8c146c4cf2d0d9da6b52ba11f54.exe 84 PID 1424 wrote to memory of 2720 1424 de86e76777384c674dde285bee762e2447a2d8c146c4cf2d0d9da6b52ba11f54.exe 84 PID 2720 wrote to memory of 4576 2720 ziST7167.exe 85 PID 2720 wrote to memory of 4576 2720 ziST7167.exe 85 PID 2720 wrote to memory of 2544 2720 ziST7167.exe 94 PID 2720 wrote to memory of 2544 2720 ziST7167.exe 94 PID 2720 wrote to memory of 2544 2720 ziST7167.exe 94 PID 2544 wrote to memory of 3488 2544 ku464383.exe 95 PID 2544 wrote to memory of 3488 2544 ku464383.exe 95 PID 2544 wrote to memory of 3488 2544 ku464383.exe 95 PID 1424 wrote to memory of 5228 1424 de86e76777384c674dde285bee762e2447a2d8c146c4cf2d0d9da6b52ba11f54.exe 100 PID 1424 wrote to memory of 5228 1424 de86e76777384c674dde285bee762e2447a2d8c146c4cf2d0d9da6b52ba11f54.exe 100 PID 1424 wrote to memory of 5228 1424 de86e76777384c674dde285bee762e2447a2d8c146c4cf2d0d9da6b52ba11f54.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\de86e76777384c674dde285bee762e2447a2d8c146c4cf2d0d9da6b52ba11f54.exe"C:\Users\Admin\AppData\Local\Temp\de86e76777384c674dde285bee762e2447a2d8c146c4cf2d0d9da6b52ba11f54.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziST7167.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziST7167.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr062999.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr062999.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku464383.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku464383.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 13684⤵
- Program crash
PID:396
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr268665.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr268665.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2544 -ip 25441⤵PID:1120
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1592
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD51777d3df3294c657a20224352276a249
SHA10d690ce67ad762615aa260dd63046897ad076381
SHA2562dfb9a465c5c181221a32dafdd02995a95aab5942ea5a0cbc95267d3d8048cdf
SHA512b3cfe5f84f7dedb832ef74b897ae5338235e1eaa147f144b47a5a08f1dea96d1162e98b85e3c2dd066129c86edeb19ad176888ceefe357a13a16195a82ffc7c9
-
Filesize
507KB
MD5996419514e7cfb287e995d66e0672c43
SHA15869124eec4b1dc688ceb3d937b1504d3eb7fcfa
SHA256c7b1082657be0216422b02f97d11a2d3af1b194f312e61b35f2918ac62a91d6c
SHA512e9f71240f3ee6bf95cd58dd2bf3c70c0b08d86143ea8424f4bdb22b146dc65a35558809b8dbbb203be08f5fbdb52951655a75b43deed6877c3ef70e1b6227efa
-
Filesize
13KB
MD5747d45fe3c7150b97a38f7253511fe06
SHA1c7f7d9462aacfab4f29dde304aea69d8b0da01b6
SHA256e434e472c43b9c4831aa041a476c3446fff98730a0b77170ef485a826ba0957f
SHA5124190ad381d983a1a0fb4db0dec1e2bbb2d106c61ce4c394a04f5ce748371fdf6413016baa06e0f5e02dbc048fbd59e0cac1a13d55fae1e6ae142580b63f4c1a8
-
Filesize
426KB
MD5c9a6d2e08b02d5d6818d58177797d3b2
SHA19975067688f00f18472eb120c0ec3aba26e62021
SHA256d3d5ab21e16222825322072aa582770323ad8566c1d47cb7c435d4ad99176e54
SHA5125cf9b47ebaf7b3501952544c319936f5ee406511d7428621ddfd5f455a8410f128b0e13c03a64758e2aaed62cc7107747d617fbb0c56e795d604c52f3d8ea943
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0