Analysis
-
max time kernel
138s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:14
Static task
static1
Behavioral task
behavioral1
Sample
de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exe
Resource
win10v2004-20241007-en
General
-
Target
de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exe
-
Size
655KB
-
MD5
46e93bf7167eb58721b205334c04a049
-
SHA1
dfee2e6af2f8419e3455f51e09a7aaf95a69f23e
-
SHA256
de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3
-
SHA512
4b9b40ec7c0490c9ff3571edb3503002e72e06e385a1b50c909ad365a468d641c752cfa967606e4bc97975bd0b5c497e4963bd23d490ba2f544af7bd4d4ebc21
-
SSDEEP
12288:cMr+y90Ua18x1D1VcsmZqdSnD8Wt44X34Z7XqVXas/NsJrMMo4Esh95:Ky7Rx1DqVnDj/X34ZeVFsJFvL5
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr891869.exe healer behavioral1/memory/2876-15-0x0000000000310000-0x000000000031A000-memory.dmp healer -
Healer family
-
Processes:
jr891869.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr891869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr891869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr891869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr891869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr891869.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr891869.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/116-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1512-2118-0x0000000000DD0000-0x0000000000E00000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr291642.exe family_redline behavioral1/memory/932-2129-0x0000000000E20000-0x0000000000E4E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku622831.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ku622831.exe -
Executes dropped EXE 5 IoCs
Processes:
ziCg2751.exejr891869.exeku622831.exe1.exelr291642.exepid process 512 ziCg2751.exe 2876 jr891869.exe 116 ku622831.exe 1512 1.exe 932 lr291642.exe -
Processes:
jr891869.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr891869.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exeziCg2751.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziCg2751.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1908 116 WerFault.exe ku622831.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exeziCg2751.exeku622831.exe1.exelr291642.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziCg2751.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku622831.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr291642.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr891869.exepid process 2876 jr891869.exe 2876 jr891869.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr891869.exeku622831.exedescription pid process Token: SeDebugPrivilege 2876 jr891869.exe Token: SeDebugPrivilege 116 ku622831.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exeziCg2751.exeku622831.exedescription pid process target process PID 4988 wrote to memory of 512 4988 de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exe ziCg2751.exe PID 4988 wrote to memory of 512 4988 de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exe ziCg2751.exe PID 4988 wrote to memory of 512 4988 de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exe ziCg2751.exe PID 512 wrote to memory of 2876 512 ziCg2751.exe jr891869.exe PID 512 wrote to memory of 2876 512 ziCg2751.exe jr891869.exe PID 512 wrote to memory of 116 512 ziCg2751.exe ku622831.exe PID 512 wrote to memory of 116 512 ziCg2751.exe ku622831.exe PID 512 wrote to memory of 116 512 ziCg2751.exe ku622831.exe PID 116 wrote to memory of 1512 116 ku622831.exe 1.exe PID 116 wrote to memory of 1512 116 ku622831.exe 1.exe PID 116 wrote to memory of 1512 116 ku622831.exe 1.exe PID 4988 wrote to memory of 932 4988 de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exe lr291642.exe PID 4988 wrote to memory of 932 4988 de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exe lr291642.exe PID 4988 wrote to memory of 932 4988 de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exe lr291642.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exe"C:\Users\Admin\AppData\Local\Temp\de8f204d4febf2d844b28b4727a998b3896850a176cde2e1995bfedee4978cb3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCg2751.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCg2751.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr891869.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr891869.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku622831.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku622831.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 13724⤵
- Program crash
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr291642.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr291642.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:932
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 116 -ip 1161⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5e32c043cceaf701ec596d395e8d2b7bd
SHA1ccea8ac4161841b90d941eebde166fda6a21a927
SHA25676fc02c9e13144a9e86ac203116fda05d1a8b6941af4d4fac855da429a5f5830
SHA5122195df3e1026f9109ca274bc33959e340b3c86d51bcec07244c3f9207e0798c384f8c6f04e72cb754ecd1d6e31bfd5439b9ae84077d45140b4c74fd9036a6a49
-
Filesize
502KB
MD591f47a18ab073e728e564d383748afa0
SHA1a5d7d7497717264b685a7c41d887a50b14ba0bbc
SHA2560ccbce0597f79ea98306a7e36b76ae6e6552d076cfdde894e2df350c02593769
SHA51257e0924cf8a29a6ec0084b177dc97fc79a4469ac3c3dce1e1036191973c72652155b4cba2d4d64aa6aa288b99cb2696d1950e1704402e567f9adab87b2b5130c
-
Filesize
11KB
MD554422ab3024d4dc2244c37bdd95e66ea
SHA1f232f6fb96ab795cc98522907f4e29740b36dfa8
SHA256c15cfbe7dee5c92962ac951217efc072f7dd5b80dd547cf764ce169a61497095
SHA5125c9ba83cbe8150c077af83b6bbb8d4a5cdff988fd4915be872be968aefb453c2bdfb97cf681903e2ee8c373bd969eb054f8374d0cf60387c1aa44fd791c54f5d
-
Filesize
424KB
MD5bd8e7e6b5bd8505fadff97260e0e87a6
SHA1035e69ec935b6dc530b8eba549209bfe12bec755
SHA256a54ae6a241b780d6b49784fe26d95871ffb1fa1508ed71d919f234889d6667a7
SHA5126b28ed22871fb345d2d8bce93e01907448076997f159294ccdd498589ec9e01ee83b4ce1b10cd4339e9f6be215e07ff37f84f1448ce576ade7685cb4be169761
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0