Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exe
Resource
win10v2004-20241007-en
General
-
Target
2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exe
-
Size
651KB
-
MD5
6ed13c869a4a1d8565610c3bf4b05131
-
SHA1
5c59e0071f807a4a8fc4a664ec34cd65404a53c3
-
SHA256
2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335
-
SHA512
8b0535d53378b3a08b755c70d06104be8e06b0e55a48218ee35bddcf1e98d0ad410726565a5b2e4190fce8900fa0fe3af821ff8f459975f55a3aa21150426a21
-
SSDEEP
12288:IMrhy90UHiuN7U5Nsz/5JMGOkl3ppgG8q5r8rS9x5o:5yTiuNAgzrMkIGriST5o
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr030789.exe healer behavioral1/memory/1884-15-0x0000000000A30000-0x0000000000A3A000-memory.dmp healer -
Healer family
-
Processes:
jr030789.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr030789.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr030789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr030789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr030789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr030789.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr030789.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2556-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5664-2118-0x0000000000040000-0x0000000000070000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062260.exe family_redline behavioral1/memory/1524-2129-0x00000000002E0000-0x000000000030E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku497186.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ku497186.exe -
Executes dropped EXE 5 IoCs
Processes:
ziCH0765.exejr030789.exeku497186.exe1.exelr062260.exepid process 2192 ziCH0765.exe 1884 jr030789.exe 2556 ku497186.exe 5664 1.exe 1524 lr062260.exe -
Processes:
jr030789.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr030789.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exeziCH0765.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziCH0765.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5728 2556 WerFault.exe ku497186.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
lr062260.exe2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exeziCH0765.exeku497186.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr062260.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziCH0765.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku497186.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr030789.exepid process 1884 jr030789.exe 1884 jr030789.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr030789.exeku497186.exedescription pid process Token: SeDebugPrivilege 1884 jr030789.exe Token: SeDebugPrivilege 2556 ku497186.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exeziCH0765.exeku497186.exedescription pid process target process PID 2908 wrote to memory of 2192 2908 2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exe ziCH0765.exe PID 2908 wrote to memory of 2192 2908 2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exe ziCH0765.exe PID 2908 wrote to memory of 2192 2908 2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exe ziCH0765.exe PID 2192 wrote to memory of 1884 2192 ziCH0765.exe jr030789.exe PID 2192 wrote to memory of 1884 2192 ziCH0765.exe jr030789.exe PID 2192 wrote to memory of 2556 2192 ziCH0765.exe ku497186.exe PID 2192 wrote to memory of 2556 2192 ziCH0765.exe ku497186.exe PID 2192 wrote to memory of 2556 2192 ziCH0765.exe ku497186.exe PID 2556 wrote to memory of 5664 2556 ku497186.exe 1.exe PID 2556 wrote to memory of 5664 2556 ku497186.exe 1.exe PID 2556 wrote to memory of 5664 2556 ku497186.exe 1.exe PID 2908 wrote to memory of 1524 2908 2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exe lr062260.exe PID 2908 wrote to memory of 1524 2908 2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exe lr062260.exe PID 2908 wrote to memory of 1524 2908 2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exe lr062260.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exe"C:\Users\Admin\AppData\Local\Temp\2f3e8295f9975d435b4152a233ef2f5b577a579e335e40b8fc5843666e28e335.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCH0765.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCH0765.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr030789.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr030789.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku497186.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku497186.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 14964⤵
- Program crash
PID:5728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062260.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062260.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2556 -ip 25561⤵PID:5420
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD500392fc550373abd7f7b43196605ffc6
SHA1a87e1315419970292a36954f3843ca9a14df5056
SHA25665ee9df9fc550c29f9c712ed05ed4bbb8b339456778ca456709e3f5f2c309608
SHA512a07ead2e87f9c38e4bd9085025d24361012ab14f8a6c2733a32ed52ad426bf7bb5518de92381395197eb087d50cf9edf0e589bc85d2b88f5fb83a88527771afa
-
Filesize
497KB
MD52d692eb3dd5718cc73fae6320ee27020
SHA1feb6b33443f960cf16a1e69d6ba1b6f214a184a5
SHA2569e932494bdfc8fb45c7689c99dab94333c7ed48b6fd8ce1ef8c7d94aa0c528be
SHA51227464586361b826797589d2e7d050f0a203cac8baa778d7eb0096e53bee38715f7cf3060461164329593a681423ebeca416231eca6f2b426ae78d599048f84df
-
Filesize
11KB
MD55356023633e7ab4aa7dd97393254a87a
SHA149910d246e2ccfc0fd9eacbdecf971cf0d65d86a
SHA256d54f92917bd7860b0f00bb86d92d2dc2c24d191952f1b20e20ea652e328d3e15
SHA512375339cd008164f0d53e8e2e93bdab5ae8ba2cf8798f9ff3817f03fe64de09f1005edb0c7427efcaabd6000c234ecb1b9ae22a7da0b0754d374d025cd08cb5d4
-
Filesize
415KB
MD5be01f830039762509eac386d28a27f9c
SHA1faa424a6d77f04cbe4b618d641dedc834be6c2ee
SHA25607ec95be75ee6c8a9ad8c6038cba4a424d216714793785a325579bbccd9ddd0f
SHA5121a34c7d6294325f2b43ea5296e19c03c83a1ab980f9d25cc4cf45fbb43ec5d634b29dcdaf7aaac1a235b2afc6d0edb71a94de2e57041d4ec3db8e5b7877383d3
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0