Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 15:12
Static task
static1
Behavioral task
behavioral1
Sample
c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exe
Resource
win10v2004-20241007-en
General
-
Target
c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exe
-
Size
651KB
-
MD5
4aadea30595d9910dfbaf7fc120e7de8
-
SHA1
79d7c02c6d2bbcca34ec6dbe37d825618e1832a4
-
SHA256
c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb
-
SHA512
6aa5e81fc8a90e225cbe3905ba39b32d8d2b1128b85a09cc4c061dcf19af28809567e28a4092e9d054d2500d18ed76543b965efdb125f60ab1f2d218cf68d111
-
SSDEEP
12288:fMrTy90uUQP1npZC1YmGM0L+wY7Gv7Rvm7ZMlnv8KpO2:8yl6MM0L+wYaRmtOUKpO2
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr836773.exe healer behavioral1/memory/620-15-0x0000000000580000-0x000000000058A000-memory.dmp healer -
Healer family
-
Processes:
jr836773.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr836773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr836773.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr836773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr836773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr836773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr836773.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3408-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5840-2118-0x0000000000870000-0x00000000008A0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr763167.exe family_redline behavioral1/memory/6212-2129-0x0000000000F00000-0x0000000000F2E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku945064.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ku945064.exe -
Executes dropped EXE 5 IoCs
Processes:
zivo0821.exejr836773.exeku945064.exe1.exelr763167.exepid process 4060 zivo0821.exe 620 jr836773.exe 3408 ku945064.exe 5840 1.exe 6212 lr763167.exe -
Processes:
jr836773.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr836773.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exezivo0821.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zivo0821.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4876 3408 WerFault.exe ku945064.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku945064.exe1.exelr763167.exec8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exezivo0821.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku945064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr763167.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zivo0821.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr836773.exepid process 620 jr836773.exe 620 jr836773.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr836773.exeku945064.exedescription pid process Token: SeDebugPrivilege 620 jr836773.exe Token: SeDebugPrivilege 3408 ku945064.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exezivo0821.exeku945064.exedescription pid process target process PID 2360 wrote to memory of 4060 2360 c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exe zivo0821.exe PID 2360 wrote to memory of 4060 2360 c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exe zivo0821.exe PID 2360 wrote to memory of 4060 2360 c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exe zivo0821.exe PID 4060 wrote to memory of 620 4060 zivo0821.exe jr836773.exe PID 4060 wrote to memory of 620 4060 zivo0821.exe jr836773.exe PID 4060 wrote to memory of 3408 4060 zivo0821.exe ku945064.exe PID 4060 wrote to memory of 3408 4060 zivo0821.exe ku945064.exe PID 4060 wrote to memory of 3408 4060 zivo0821.exe ku945064.exe PID 3408 wrote to memory of 5840 3408 ku945064.exe 1.exe PID 3408 wrote to memory of 5840 3408 ku945064.exe 1.exe PID 3408 wrote to memory of 5840 3408 ku945064.exe 1.exe PID 2360 wrote to memory of 6212 2360 c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exe lr763167.exe PID 2360 wrote to memory of 6212 2360 c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exe lr763167.exe PID 2360 wrote to memory of 6212 2360 c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exe lr763167.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exe"C:\Users\Admin\AppData\Local\Temp\c8a95bf4cf94d1e1b5a48fa64a5ecb496de01de3c2454b39ed405fa75cb5facb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivo0821.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivo0821.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr836773.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr836773.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku945064.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku945064.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 12044⤵
- Program crash
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr763167.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr763167.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6212
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3408 -ip 34081⤵PID:4040
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD50aa5f243982ba600c515c80214c987f7
SHA113080d81dad9beff2b842ba7b72c9d291aa8f82d
SHA2562fd5e17b700fc144e839afc4175d654723153193de3014ba3ed201526df4e721
SHA5123f5d46448d8245195b0746d956193795ee32b148fa5ce6f281fa6f153c4aa0fb81aa7f8fc54aaac40544ff5a1287db661b4e78466327971e381bb0d2906e4f31
-
Filesize
496KB
MD5a6a19d4b044ea7e04d2f9e2dff3f4af6
SHA1bbdd0a4d68b0bf74969415dbf43ce1899593ffc0
SHA256709683a755c04822fe4d230aea5e2a0683f520165d63252b09f9fc95c2fa1bb4
SHA512f0acb878efbc592d1638488120b689d0acfa7e308469728593c756766396e28608853351b3a37f4a11a392f4be272c4e8a0334d2df228721e5bca839975a5ad2
-
Filesize
11KB
MD5828300f560feecb4cdbb1c53e220b99f
SHA170ceed854594307ab357352ee2ef6fbbd78203c7
SHA2567a323fd196a22a4dc019537701e2621889456e707ea805606449b285a6ccd993
SHA5121655f113637c0458af6984dbcba500e78890c4ab3ece61a7c2554498233b230ce312acb4d902bb6e68593c04c21ee6ac2b38950db572823cb42b9d363d2b4c49
-
Filesize
414KB
MD56bab3b4063030018ff2f8622aa8e1611
SHA1d629442be688a2f9bf275040189437566967e356
SHA2562c1e4c7395a8b240ac363bde2af29e8de43c5d8fbec80570f308021f84047b20
SHA5121be92f1acdf7fb9d88869fa7163f33d17bb293c4093c97a018b3457e9c00e9d30abd1de02a5701f684d8813a95d1e1b0d748168763191be564417a2f85561c7f
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0