Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 16:01
Static task
static1
Behavioral task
behavioral1
Sample
210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exe
Resource
win10v2004-20241007-en
General
-
Target
210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exe
-
Size
683KB
-
MD5
c8db7696d71a6ca9b7c9c9360d1077f4
-
SHA1
1b2b2e72b02a3cfe59ba91e08e0f47878d99c361
-
SHA256
210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c
-
SHA512
27e52108d0ef0bd35a79bca8976a547dec0d9c42887a7da854c7a80f928da4ca570039a9e20b527613820fa53eeefc942ceffa14900715044078321e4092e460
-
SSDEEP
12288:RMrTy90zYETreTZEYxtwKW273Ub2rgcS70KsrSJZwwU6HHhO9mb:mygnTGdPBi2P8YSThF
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr753666.exe healer behavioral1/memory/5048-15-0x0000000000030000-0x000000000003A000-memory.dmp healer -
Healer family
-
Processes:
jr753666.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr753666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr753666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr753666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr753666.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr753666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr753666.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3020-2104-0x0000000005890000-0x00000000058C2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5796-2117-0x0000000000FB0000-0x0000000000FE0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr986417.exe family_redline behavioral1/memory/2892-2128-0x0000000000450000-0x000000000047E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku974246.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ku974246.exe -
Executes dropped EXE 5 IoCs
Processes:
ziSw6108.exejr753666.exeku974246.exe1.exelr986417.exepid process 3008 ziSw6108.exe 5048 jr753666.exe 3020 ku974246.exe 5796 1.exe 2892 lr986417.exe -
Processes:
jr753666.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr753666.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exeziSw6108.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziSw6108.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5480 3020 WerFault.exe ku974246.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziSw6108.exeku974246.exe1.exelr986417.exe210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziSw6108.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku974246.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr986417.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr753666.exepid process 5048 jr753666.exe 5048 jr753666.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr753666.exeku974246.exedescription pid process Token: SeDebugPrivilege 5048 jr753666.exe Token: SeDebugPrivilege 3020 ku974246.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exeziSw6108.exeku974246.exedescription pid process target process PID 2820 wrote to memory of 3008 2820 210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exe ziSw6108.exe PID 2820 wrote to memory of 3008 2820 210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exe ziSw6108.exe PID 2820 wrote to memory of 3008 2820 210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exe ziSw6108.exe PID 3008 wrote to memory of 5048 3008 ziSw6108.exe jr753666.exe PID 3008 wrote to memory of 5048 3008 ziSw6108.exe jr753666.exe PID 3008 wrote to memory of 3020 3008 ziSw6108.exe ku974246.exe PID 3008 wrote to memory of 3020 3008 ziSw6108.exe ku974246.exe PID 3008 wrote to memory of 3020 3008 ziSw6108.exe ku974246.exe PID 3020 wrote to memory of 5796 3020 ku974246.exe 1.exe PID 3020 wrote to memory of 5796 3020 ku974246.exe 1.exe PID 3020 wrote to memory of 5796 3020 ku974246.exe 1.exe PID 2820 wrote to memory of 2892 2820 210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exe lr986417.exe PID 2820 wrote to memory of 2892 2820 210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exe lr986417.exe PID 2820 wrote to memory of 2892 2820 210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exe lr986417.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exe"C:\Users\Admin\AppData\Local\Temp\210450875da2d17a82687345659e077ea0cd302012b995bc690ac69fa19ecc6c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSw6108.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSw6108.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr753666.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr753666.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku974246.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku974246.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 13884⤵
- Program crash
PID:5480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr986417.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr986417.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3020 -ip 30201⤵PID:5888
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD52619fc4568d88c5af66ad8aa92f42a38
SHA144bd93cccd26a67ba197e15f57d318bb286c14b4
SHA25664678a3e40f325a7cc422337907cb2538a5bb1f2df7de0acbe3f1367fa9b87d8
SHA512303aca776441cddb9ccc78dcd30624c87091522269b4887409dbe1a63e8ec2c0769e51fbe02a8d3645c0681929a052655f403b9899b61c9172319fb272a9c66b
-
Filesize
530KB
MD5d269c6ed9a420b59c67320410d93e4b2
SHA11ebaf4fd6e3ea93b5ea1a89f3b8e6e4965615d27
SHA25642ee23989b12145f46bd4ca4f426bfca1f3e66794621702e7e818513043310c7
SHA5121f1c305d6977bd7db62e3685432dd2f897328d960708d81c612cc7c97c02f88900d058e11001b70244a74d29565f856ee96dacef5072b46d29b22d7f9265ebc4
-
Filesize
12KB
MD5f42c5e225d737b9c3fee86c53fcde9e1
SHA1194f0b1858498d790ffc30a750e689f8677a76e2
SHA256d3362dd3c549e8bf353de30125a3730b33efac4e127bd0eb24eb66a197ec09e0
SHA5126b0560f2b4e11bf154311db52d8cb4e04b8d2ee21fd26d1cefece829d13541fa0c3194115175a8d65c1c3f9fe86eb68b5eb74ec6bf374ca3aa5b87b4b8c90a92
-
Filesize
495KB
MD568024fadcf43a4aa9dab1c9083b5d374
SHA1a8ec5dfddc20546692bc8df24e04fbbe4d40d9fc
SHA2567ab24d4414baf942371639f79714ca3d25f41c122b5fcb389926ef8e8d3c56fe
SHA512f65788865d89e9c812cc08b60ee0a26d1fc5a0d4d71f75e8ca5050014b1846914a4bf799daf2aebba0ae477381f9f78892124b15375bbcc26b5372d9810b149d
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0