Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 15:00
Static task
static1
Behavioral task
behavioral1
Sample
23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exe
Resource
win10v2004-20241007-en
General
-
Target
23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exe
-
Size
661KB
-
MD5
8ee02a031afd1591d0fad1f040774627
-
SHA1
82759a129c9ff860fc8d2a7ea7756572ec4e5f6d
-
SHA256
23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148
-
SHA512
66333f424ad4f9219c43aa7517bfb22b58ca107ae0f0e44e077dde038b1f7345ef1a37e6dc6108616cf89399ae59154be228569a4e1e50fb41af818bd85698d1
-
SSDEEP
12288:6MrYy90fr1th3Vq0wIxAn4AJTy35Yiqy0nxPo2fdxPPPOv/yQWU5NphEb2:+ykRTVq05xA1JTy36TyOfOiQWU5NDp
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr971122.exe healer behavioral1/memory/1384-15-0x00000000002A0000-0x00000000002AA000-memory.dmp healer -
Healer family
-
Processes:
jr971122.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr971122.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr971122.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr971122.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr971122.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr971122.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr971122.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4768-2105-0x0000000005420000-0x0000000005452000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3984-2118-0x0000000000D20000-0x0000000000D50000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr797415.exe family_redline behavioral1/memory/648-2129-0x0000000000090000-0x00000000000C0000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku199752.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ku199752.exe -
Executes dropped EXE 5 IoCs
Processes:
ziUl0764.exejr971122.exeku199752.exe1.exelr797415.exepid process 3100 ziUl0764.exe 1384 jr971122.exe 4768 ku199752.exe 3984 1.exe 648 lr797415.exe -
Processes:
jr971122.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr971122.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exeziUl0764.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziUl0764.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 5752 4768 WerFault.exe ku199752.exe 6100 648 WerFault.exe lr797415.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziUl0764.exeku199752.exe1.exelr797415.exe23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziUl0764.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku199752.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr797415.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr971122.exepid process 1384 jr971122.exe 1384 jr971122.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr971122.exeku199752.exedescription pid process Token: SeDebugPrivilege 1384 jr971122.exe Token: SeDebugPrivilege 4768 ku199752.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exeziUl0764.exeku199752.exedescription pid process target process PID 1268 wrote to memory of 3100 1268 23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exe ziUl0764.exe PID 1268 wrote to memory of 3100 1268 23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exe ziUl0764.exe PID 1268 wrote to memory of 3100 1268 23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exe ziUl0764.exe PID 3100 wrote to memory of 1384 3100 ziUl0764.exe jr971122.exe PID 3100 wrote to memory of 1384 3100 ziUl0764.exe jr971122.exe PID 3100 wrote to memory of 4768 3100 ziUl0764.exe ku199752.exe PID 3100 wrote to memory of 4768 3100 ziUl0764.exe ku199752.exe PID 3100 wrote to memory of 4768 3100 ziUl0764.exe ku199752.exe PID 4768 wrote to memory of 3984 4768 ku199752.exe 1.exe PID 4768 wrote to memory of 3984 4768 ku199752.exe 1.exe PID 4768 wrote to memory of 3984 4768 ku199752.exe 1.exe PID 1268 wrote to memory of 648 1268 23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exe lr797415.exe PID 1268 wrote to memory of 648 1268 23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exe lr797415.exe PID 1268 wrote to memory of 648 1268 23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exe lr797415.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exe"C:\Users\Admin\AppData\Local\Temp\23c73fecfffcafb75e8612e004ab926769e26a5f168249e52f2664136f415148.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUl0764.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUl0764.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr971122.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr971122.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku199752.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku199752.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4768 -s 15244⤵
- Program crash
PID:5752 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr797415.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr797415.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 9443⤵
- Program crash
PID:6100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4768 -ip 47681⤵PID:5368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 648 -ip 6481⤵PID:1580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD51e34428e4c54063e8b62c2a03dbcb607
SHA1b5577bc08096fe619b417d6f38a99558e7e1ca17
SHA25625e0e6c9dca6242432c4b17fc94d46a0d985a780aec0656fb76846043e0d32d1
SHA51242b47de8215b189818b9880ce662f054e9853d39910bb9c5edbd42afe1b22e75a85a459297fcba29e274890921a3f18db6742049b2636fa68a24a6705a97e38e
-
Filesize
508KB
MD5f9834973d25a280bed6d24226f540d4d
SHA11507ea277a0fda6ea2377c744eea644c6b6a10b1
SHA256203c4ae51e75e854e5930f5e0cb93ac391ae2c7cbf5f3b88eda6fbd7ac0a7bf8
SHA512f7b26bb27995108c61a395c990cf341899aec85f2aad6bf674ec91350670cc7dc2917e4dbf354e46250e5c4141b1d67a9417629d0022c618704d6dee2c63240a
-
Filesize
13KB
MD5859f97ad37c8f871553bbac5985b2782
SHA1fb6dd615ae8dd157ffc41a4e2a6918bb257c4738
SHA2561551094c09bcc849f6b14dee4f1e237197ed73393472c72f705798aa6bdbfec4
SHA5123d0b8b176ddf34f0b2a3f6cb6382dca0edadc7c0b5c9169fa72de65d8737c3c84ea18067c21d3d4cfd88b3fe2c6db52b64ee0c7f3d159f50f91f15bf5e1bad11
-
Filesize
437KB
MD5636335ccfa69fa58d7db89b38422136e
SHA1f8cff6329c28cf2de632a89c3485ba8782daff23
SHA256dfc55c0ca75990e8f333b90dc0148f0f37b1578baf2a3948b682a5bdf6ca599d
SHA51256362ecd44537ffdadf709d6d1cb134b5be6bea89488916dbe713acbb1b87ebcf99943bb943ca75e752c7928c23772e906c2a64957b8e83109a06e92661fca42
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0