Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 20:55
Static task
static1
Behavioral task
behavioral1
Sample
b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exe
Resource
win10v2004-20241007-en
General
-
Target
b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exe
-
Size
655KB
-
MD5
f0fb18352cdea4ccce7ba99eb2a0ed42
-
SHA1
034bb2d519aae04729de59a5d036ca4cf638419d
-
SHA256
b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5
-
SHA512
8a345f83ab5652885661db8b1777dc1a9e8376d0c4b990b7651e65f9d0b6488f5b35133ccac270ef5319b2d3ac07802189cfc78deffde2b29587dd27e7c88d44
-
SSDEEP
12288:uMrUy90xcAqZ8sCG3pPkrCVsItmOEA28Isf8lO9uUHJZs6Tl:+y0cbZ3L3JTtq/8IAbJZsO
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr947359.exe healer behavioral1/memory/4532-15-0x0000000000300000-0x000000000030A000-memory.dmp healer -
Healer family
-
Processes:
jr947359.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr947359.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr947359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr947359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr947359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr947359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr947359.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/5072-2105-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3264-2118-0x0000000000340000-0x0000000000370000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr011899.exe family_redline behavioral1/memory/2456-2129-0x00000000001D0000-0x00000000001FE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku862290.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation ku862290.exe -
Executes dropped EXE 5 IoCs
Processes:
ziux8885.exejr947359.exeku862290.exe1.exelr011899.exepid process 4804 ziux8885.exe 4532 jr947359.exe 5072 ku862290.exe 3264 1.exe 2456 lr011899.exe -
Processes:
jr947359.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr947359.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exeziux8885.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziux8885.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5056 5072 WerFault.exe ku862290.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku862290.exe1.exelr011899.exeb988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exeziux8885.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku862290.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr011899.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziux8885.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr947359.exepid process 4532 jr947359.exe 4532 jr947359.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr947359.exeku862290.exedescription pid process Token: SeDebugPrivilege 4532 jr947359.exe Token: SeDebugPrivilege 5072 ku862290.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exeziux8885.exeku862290.exedescription pid process target process PID 872 wrote to memory of 4804 872 b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exe ziux8885.exe PID 872 wrote to memory of 4804 872 b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exe ziux8885.exe PID 872 wrote to memory of 4804 872 b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exe ziux8885.exe PID 4804 wrote to memory of 4532 4804 ziux8885.exe jr947359.exe PID 4804 wrote to memory of 4532 4804 ziux8885.exe jr947359.exe PID 4804 wrote to memory of 5072 4804 ziux8885.exe ku862290.exe PID 4804 wrote to memory of 5072 4804 ziux8885.exe ku862290.exe PID 4804 wrote to memory of 5072 4804 ziux8885.exe ku862290.exe PID 5072 wrote to memory of 3264 5072 ku862290.exe 1.exe PID 5072 wrote to memory of 3264 5072 ku862290.exe 1.exe PID 5072 wrote to memory of 3264 5072 ku862290.exe 1.exe PID 872 wrote to memory of 2456 872 b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exe lr011899.exe PID 872 wrote to memory of 2456 872 b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exe lr011899.exe PID 872 wrote to memory of 2456 872 b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exe lr011899.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exe"C:\Users\Admin\AppData\Local\Temp\b988ade24aa208e9e4d6f1356e2ea17c1e9ff06c7e3844b157c3c9a113d7e3c5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziux8885.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziux8885.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr947359.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr947359.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku862290.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku862290.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5072 -s 15044⤵
- Program crash
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr011899.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr011899.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5072 -ip 50721⤵PID:4304
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD528ac561ae8974fdf825274bb90d05ad8
SHA1faee039436598a4383264ff20ae5e2f81099c117
SHA2565e8c0f9189db7f22d980054e1fbf201872bb17c030f53448649cb3fb45a245e7
SHA51283297c5b42e281d0d4420642e5553a483be35135ed6908035e879a0ba1cdf29b39de9b8d404df5e99c1645f9c2453a77e5d07d1f31fc5ba52e565e82c917d5ee
-
Filesize
501KB
MD568a5fe87cdd77b021e1c8659786cdfb4
SHA15cb8b317d0564be427752f7ec23794654c20ae67
SHA2560c63f233bf46758b2deca96dc62d94e20f08e69c8bff25b85bfbd3b0e24660c8
SHA51285cbb6176ba05185eadbca00d681fcfb53dca01ca2b6fdbb97c39ce71ec3712970b1f3b0fbb32c598ab6e3b8d05daa1dbaeb686eaf7a6593a6c75922e207eaa4
-
Filesize
11KB
MD5d77cdbe802fa4c0b9802e69417e56a00
SHA1b3d806e546cebc873fa9c177f81c1d0f0f9806ba
SHA256011a958959079cfde2c4e7e61045820995e56c18f7d649682dac34906b5359bb
SHA51201028d605352694b50f3fc5702ba4bc8b5fb30eb24559d800e2206b87d21c86c7d1ca10c35e4d33a24d9c83aa792fc5acf0ae67d3f7dad35e0f165f67c2c048b
-
Filesize
424KB
MD5384be6b0a1455dac8c6d26774a8b4278
SHA1a18a455ae76331985ecc96c1477c8fcb77d0ca57
SHA2560f4a5601852e6e93cab48e7e16bee824dd769aa818c403b4b738c2ab689f7bfe
SHA512e8314b31223b95c939c230201dc1511063d263e1a889425eb57388cea0526e163425de058cfe45be737f9536c668530ff3b10ed265a936727d63a8ea9a749d6b
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0