Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exe
Resource
win10v2004-20241007-en
General
-
Target
e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exe
-
Size
685KB
-
MD5
772105fa7d5785c083d6441fd927d426
-
SHA1
3be8f16768dcc529c9e7f81eb8e0648f1a59acfd
-
SHA256
e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27
-
SHA512
69eeb93b8797707def2fb525902268ed901d52df5183256f9927e1800fd733a68e705bc41f79ac5efdf3aade9f8117b8fd17b9bd86ffd1c17a8a094440c64fe9
-
SSDEEP
12288:8MrMy90v2qYDw05v4+RfgpVk+7KEiVNLjF2cAJSrlkzrSJYIaHhQ:Ay1qYD7v4+SpyE5iVD25804Ta+
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr881985.exe healer behavioral1/memory/2664-15-0x0000000000AD0000-0x0000000000ADA000-memory.dmp healer -
Healer family
-
Processes:
jr881985.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr881985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr881985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr881985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr881985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr881985.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr881985.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1500-2105-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1364-2118-0x0000000000D40000-0x0000000000D70000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr268621.exe family_redline behavioral1/memory/2536-2129-0x0000000000660000-0x000000000068E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku486346.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ku486346.exe -
Executes dropped EXE 5 IoCs
Processes:
ziQZ4140.exejr881985.exeku486346.exe1.exelr268621.exepid process 2648 ziQZ4140.exe 2664 jr881985.exe 1500 ku486346.exe 1364 1.exe 2536 lr268621.exe -
Processes:
jr881985.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr881985.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziQZ4140.exee94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziQZ4140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2552 1500 WerFault.exe ku486346.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exelr268621.exee94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exeziQZ4140.exeku486346.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr268621.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziQZ4140.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku486346.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr881985.exepid process 2664 jr881985.exe 2664 jr881985.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr881985.exeku486346.exedescription pid process Token: SeDebugPrivilege 2664 jr881985.exe Token: SeDebugPrivilege 1500 ku486346.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exeziQZ4140.exeku486346.exedescription pid process target process PID 1268 wrote to memory of 2648 1268 e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exe ziQZ4140.exe PID 1268 wrote to memory of 2648 1268 e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exe ziQZ4140.exe PID 1268 wrote to memory of 2648 1268 e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exe ziQZ4140.exe PID 2648 wrote to memory of 2664 2648 ziQZ4140.exe jr881985.exe PID 2648 wrote to memory of 2664 2648 ziQZ4140.exe jr881985.exe PID 2648 wrote to memory of 1500 2648 ziQZ4140.exe ku486346.exe PID 2648 wrote to memory of 1500 2648 ziQZ4140.exe ku486346.exe PID 2648 wrote to memory of 1500 2648 ziQZ4140.exe ku486346.exe PID 1500 wrote to memory of 1364 1500 ku486346.exe 1.exe PID 1500 wrote to memory of 1364 1500 ku486346.exe 1.exe PID 1500 wrote to memory of 1364 1500 ku486346.exe 1.exe PID 1268 wrote to memory of 2536 1268 e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exe lr268621.exe PID 1268 wrote to memory of 2536 1268 e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exe lr268621.exe PID 1268 wrote to memory of 2536 1268 e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exe lr268621.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exe"C:\Users\Admin\AppData\Local\Temp\e94c989a85740be05149d61657990b605eebb225a7b1c3ff1733e4284d768b27.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQZ4140.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQZ4140.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr881985.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr881985.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku486346.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku486346.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 15244⤵
- Program crash
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr268621.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr268621.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1500 -ip 15001⤵PID:4680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD58f3ea14240f069c813bd5efdaec439f3
SHA1f090615d69d0e8be41c17804473959cd65051087
SHA25664b8d2327078f40b8ac1e08432659ffa1d7940171967b6390c62f30cb5402885
SHA512ea7aae4644f64d50ae117f37fb1645f05bfbcf0a531377be9f076b40b9ebdd6d99af2ca94c70912ac036a202b4653acb422d57caee69a7df2e75aab6059fc9b7
-
Filesize
531KB
MD5e2fe6c580e99d9016e1c2f51a18bbff9
SHA1a11b849624da2f10c8182767fa5e9bb7e31f956b
SHA256416f5a636ac0d55430225c1758ae3fdd8fefe7684e74abb5b817be5cfab25874
SHA512f285b45d2d671d6a47d9b2a0f6fb00785bb1d5a321f06988b785cf8955d02e2eef3722a6c151e311644a6ea5792441e4922cc9da0e8865aeb06cc0b6c52f1722
-
Filesize
12KB
MD563a36d88e7be0cc64fdfc459d3648e70
SHA1f209992ca59e4bfeb03f29cd87d0cbdef2e12ee4
SHA25689592d7da0312a1850e36eb99197b5c8f6b350893b914c58156538746e3507f6
SHA512b4cf637e887f8737d0fbbb8ace61ad5a264c732ccce191ac1fed785832e8a8bc48cbe00d4545e026b94b4a10e59badd260a1faa7916c1e92e6958934460804a7
-
Filesize
495KB
MD51185c08f1dd2b4d8c07912660372c952
SHA1ed9c6f50c3ec834342ff11bdd0ecf13690269203
SHA2560f9842b3c8ab1e44887b137b8649038f9bbc467676112f2e72f04961d06aedfa
SHA5124c51f8f0cdb48e6ca7bef251679a5bd3e58bb3f4d619311692e361aaa7a3dfd6a3ed11aa4dad8f0f4f860cd6783c9dc89805bba0601cb2d11192e65f9795f431
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0