Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 21:35
Static task
static1
Behavioral task
behavioral1
Sample
2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exe
Resource
win10v2004-20241007-en
General
-
Target
2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exe
-
Size
685KB
-
MD5
ea416bec7c7f776ea239844c26d84dff
-
SHA1
8a5a45a200eb9902f1cf0ce348cc636a5d68ea13
-
SHA256
2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c
-
SHA512
d4c5bd0f588f40430bde950a3936ca8f7391f479791f107e82ff80a282da8ca6b87bf25089f9a45f9f3c3c7d60ce3c8c77bcd54015e750a23799781d2d26329c
-
SSDEEP
12288:nMrMy90YNItNsErYZ1kjMCnXYtlPic5k9s54oIMwbysDQCF2x4NvBD2kHI2/K:HyvZZWjM8X2aJiGlD/6ufo2y
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr113306.exe healer behavioral1/memory/4168-15-0x00000000003D0000-0x00000000003DA000-memory.dmp healer -
Healer family
-
Processes:
jr113306.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr113306.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr113306.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr113306.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr113306.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr113306.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr113306.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/756-2104-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4304-2117-0x0000000000A50000-0x0000000000A80000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr198293.exe family_redline behavioral1/memory/1144-2128-0x0000000000E30000-0x0000000000E5E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku793066.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ku793066.exe -
Executes dropped EXE 5 IoCs
Processes:
ziOd4286.exejr113306.exeku793066.exe1.exelr198293.exepid process 2316 ziOd4286.exe 4168 jr113306.exe 756 ku793066.exe 4304 1.exe 1144 lr198293.exe -
Processes:
jr113306.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr113306.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exeziOd4286.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziOd4286.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4044 756 WerFault.exe ku793066.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziOd4286.exeku793066.exe1.exelr198293.exe2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziOd4286.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku793066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr198293.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr113306.exepid process 4168 jr113306.exe 4168 jr113306.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr113306.exeku793066.exedescription pid process Token: SeDebugPrivilege 4168 jr113306.exe Token: SeDebugPrivilege 756 ku793066.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exeziOd4286.exeku793066.exedescription pid process target process PID 4976 wrote to memory of 2316 4976 2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exe ziOd4286.exe PID 4976 wrote to memory of 2316 4976 2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exe ziOd4286.exe PID 4976 wrote to memory of 2316 4976 2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exe ziOd4286.exe PID 2316 wrote to memory of 4168 2316 ziOd4286.exe jr113306.exe PID 2316 wrote to memory of 4168 2316 ziOd4286.exe jr113306.exe PID 2316 wrote to memory of 756 2316 ziOd4286.exe ku793066.exe PID 2316 wrote to memory of 756 2316 ziOd4286.exe ku793066.exe PID 2316 wrote to memory of 756 2316 ziOd4286.exe ku793066.exe PID 756 wrote to memory of 4304 756 ku793066.exe 1.exe PID 756 wrote to memory of 4304 756 ku793066.exe 1.exe PID 756 wrote to memory of 4304 756 ku793066.exe 1.exe PID 4976 wrote to memory of 1144 4976 2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exe lr198293.exe PID 4976 wrote to memory of 1144 4976 2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exe lr198293.exe PID 4976 wrote to memory of 1144 4976 2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exe lr198293.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exe"C:\Users\Admin\AppData\Local\Temp\2d2924ad49474efa89718ca265d1ee2785c5578707b4ee447517b1c2f2661b9c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOd4286.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOd4286.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr113306.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr113306.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku793066.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku793066.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 11924⤵
- Program crash
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr198293.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr198293.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1144
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 756 -ip 7561⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5de2a7ee7d642aa9b51c3e76cc025fac3
SHA1aff6fda78ea15a0c1d99dae9582e55e62a173249
SHA2567bd7a0ad4baeb0f1555a22f939d25d4af6381adb6ae580681b508667de7a0f30
SHA5123d9cae8a9e8a28d3dc0fd67d10aeb8c61992962ec8e73159b63888854032d0d45f2bb029723b2b639e10b4f6ea6cff15b605894044d776cb32153155b778fb6d
-
Filesize
530KB
MD58583b37e9c2cfcee5b8ea087f439944a
SHA14e94ff9cd832c268dfd5432e8ad0c65f52e114a1
SHA256ebda341893f274d8fd43e4dd9000dadfbd59fded6cdb574a24abe1a81c1c52a9
SHA512aa60bf2079ac5bc141132e6c214065368df1cb68d30df0abc456d24a8b6b765e3a98fbec7236849c52ebba00a7eafab7e29cfd3ad898bf4f9a829f0b01d50c54
-
Filesize
12KB
MD567e7229261a358fa02bbf0baef420bd8
SHA13fd259a2015de966245f1c486664cf216bfaf1e9
SHA25653cfbcbd32db47d859f984849ebc78a2eb71ce6bbde2c2bd776b6219bbd86eb0
SHA5124ba3d872889994844ee6eec98c302ea88358bf5950e18fe6e1d0fa6768af178510b983f08e6455bd5acc8c9205ec604c3cad9a2d50733c8549b9aa15b8535e84
-
Filesize
495KB
MD551033d61f3a782bfec52f8d13cca7350
SHA108d3b2d7095044ce6d82f4ea46e52972101cbc35
SHA256d12ce7cab695c5e5f6651e10118164a2bd50706ec263286af3a1f9c4d45a11d4
SHA5129c09aeba2d23eac17ba5651129f02a4b01cc6ccdd4bb164bad3afa24e5b43337ea08aadd0809e2f63cc053a84b367e48e64efc6ebdc5814aaf7142557d8035d3
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0