Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:37
Static task
static1
Behavioral task
behavioral1
Sample
6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exe
Resource
win10v2004-20241007-en
General
-
Target
6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exe
-
Size
685KB
-
MD5
7ecbde67ff3cc96990bf7acca0b4ee15
-
SHA1
0c9f08233715b157aff4ff2f0e84f3865f84220f
-
SHA256
6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65
-
SHA512
9b185b1d8690f2e2b1f709a0c3d4e1f59ea20e64d820b6f9aa5d0c7505a86ebdbdd37971c9ed92c1d864f2f1c072651c0256e8d0a1ce88c6d4c7ae28fd25e6f2
-
SSDEEP
12288:xMr2y90cB6aaC8Dxw1H0y4/vGYIpO/n92qGMSbjb/rS3iRhwkq6ka:Xyt/l8Nwp0p/OY792UofHRX//
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr682638.exe healer behavioral1/memory/4360-15-0x0000000000380000-0x000000000038A000-memory.dmp healer -
Healer family
-
Processes:
jr682638.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr682638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr682638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr682638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr682638.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr682638.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr682638.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3076-2105-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1800-2118-0x0000000000510000-0x0000000000540000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr501416.exe family_redline behavioral1/memory/4604-2130-0x0000000000B80000-0x0000000000BAE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku161887.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ku161887.exe -
Executes dropped EXE 5 IoCs
Processes:
zigD3652.exejr682638.exeku161887.exe1.exelr501416.exepid process 3188 zigD3652.exe 4360 jr682638.exe 3076 ku161887.exe 1800 1.exe 4604 lr501416.exe -
Processes:
jr682638.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr682638.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exezigD3652.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zigD3652.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5656 3076 WerFault.exe ku161887.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
zigD3652.exeku161887.exe1.exelr501416.exe6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zigD3652.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku161887.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr501416.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr682638.exepid process 4360 jr682638.exe 4360 jr682638.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr682638.exeku161887.exedescription pid process Token: SeDebugPrivilege 4360 jr682638.exe Token: SeDebugPrivilege 3076 ku161887.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exezigD3652.exeku161887.exedescription pid process target process PID 3132 wrote to memory of 3188 3132 6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exe zigD3652.exe PID 3132 wrote to memory of 3188 3132 6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exe zigD3652.exe PID 3132 wrote to memory of 3188 3132 6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exe zigD3652.exe PID 3188 wrote to memory of 4360 3188 zigD3652.exe jr682638.exe PID 3188 wrote to memory of 4360 3188 zigD3652.exe jr682638.exe PID 3188 wrote to memory of 3076 3188 zigD3652.exe ku161887.exe PID 3188 wrote to memory of 3076 3188 zigD3652.exe ku161887.exe PID 3188 wrote to memory of 3076 3188 zigD3652.exe ku161887.exe PID 3076 wrote to memory of 1800 3076 ku161887.exe 1.exe PID 3076 wrote to memory of 1800 3076 ku161887.exe 1.exe PID 3076 wrote to memory of 1800 3076 ku161887.exe 1.exe PID 3132 wrote to memory of 4604 3132 6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exe lr501416.exe PID 3132 wrote to memory of 4604 3132 6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exe lr501416.exe PID 3132 wrote to memory of 4604 3132 6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exe lr501416.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exe"C:\Users\Admin\AppData\Local\Temp\6b8098e4ad403ae939a9a8704385934add132d29f6ca8e43296d1f6ff5e03e65.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigD3652.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigD3652.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr682638.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr682638.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku161887.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku161887.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 12044⤵
- Program crash
PID:5656 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr501416.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr501416.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3076 -ip 30761⤵PID:4312
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5a5dc4ae4de5293c753b8faeba912a396
SHA1b7a6b8998a1e775dc959a0b5db5bead9f9d484e7
SHA256f80225ff1b8aaab82498e4d135db2ae8feb817bf30d17a98fe1fba4733a2dbe5
SHA51251b8785c85aea2f923d59ba28c0bdd790051c88754052305e464e83fbdfda3e9544eaa282acd08b8addbfcabec60683b985e9d28379491ace9420d14bafd44a9
-
Filesize
530KB
MD5e490dd724f8983c06cb2b9b0a19a7b7e
SHA1b811d2e1df75afd213d1c1ac61ae4ba9e41f2217
SHA2569fd5a500db327d4ce0ba314c6df49327399625ae958146e010f62511967f816b
SHA512b005bdbdbce35e6bce43fecab6bf6efede7ee7127abb64d7da0cef861773debae797f9d13a00a5fa81a48f484c78b81c2d962168ee5768912e76b1f0092e8725
-
Filesize
12KB
MD59e38610edd3cdce6545f20425b5c4937
SHA18c9474ca8d44790736a6fc69a88590bea1ff2296
SHA256bbd28a1494548c4cfb9105fdccffe7dafd20b09b3ddf77fd0c4a815633529c20
SHA5128d3bc747097d249d2e5ea9ee0b6632ef5bf23542b7292268dbcdbf5de0e5d4746e4d7b59aa823146579b9f0299813a30be3d14a5fef957ae48c2a16949833857
-
Filesize
495KB
MD5c054773f3f2f879ac177ea9310060814
SHA1a73c5a946b6fcbd77941727eee69d2d0defd04cf
SHA2562f9cbae1d2bc09a0c7d12c9b303dc21cb6e69431e4dbe72ba40146d80104d4fc
SHA51213b534723a7b8f3e83292edf2e46a2c8d9f468409cddcd2272ebe88fe8c9cbccd6ee801ed8965aa1188d16f1d3053934494e7552c193f71e7891fcc14d97254a
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0