Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 23:03
Static task
static1
Behavioral task
behavioral1
Sample
99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exe
Resource
win10v2004-20241007-en
General
-
Target
99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exe
-
Size
650KB
-
MD5
f0982ed548ce74ee29eaa500933d3344
-
SHA1
e3faeba6e595d19461a56fd462f6dc20a5f69c56
-
SHA256
99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0
-
SHA512
691561b4cfe8aaba087b40e57e3c6aa24d4714389fb1f88e120e0b52c9f7e20d1fde566509a985c42887a52c7b15006acb83dc042afa98e10e4ac0fbea161231
-
SSDEEP
12288:5MrNy90T+xESOcTKu9tKQAzWe3KU5wTseubc+HPZK74:Iyg+xE3ceu9tKQA6e3KAiuw+H0U
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr265233.exe healer behavioral1/memory/2660-15-0x0000000000FD0000-0x0000000000FDA000-memory.dmp healer -
Healer family
-
Processes:
jr265233.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr265233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr265233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr265233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr265233.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr265233.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr265233.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3564-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5760-2118-0x0000000000770000-0x00000000007A0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr046527.exe family_redline behavioral1/memory/1576-2129-0x0000000000C90000-0x0000000000CBE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku661922.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ku661922.exe -
Executes dropped EXE 5 IoCs
Processes:
zixt2369.exejr265233.exeku661922.exe1.exelr046527.exepid process 2896 zixt2369.exe 2660 jr265233.exe 3564 ku661922.exe 5760 1.exe 1576 lr046527.exe -
Processes:
jr265233.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr265233.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exezixt2369.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zixt2369.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5208 3564 WerFault.exe ku661922.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exelr046527.exe99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exezixt2369.exeku661922.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr046527.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zixt2369.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku661922.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr265233.exepid process 2660 jr265233.exe 2660 jr265233.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr265233.exeku661922.exedescription pid process Token: SeDebugPrivilege 2660 jr265233.exe Token: SeDebugPrivilege 3564 ku661922.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exezixt2369.exeku661922.exedescription pid process target process PID 3940 wrote to memory of 2896 3940 99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exe zixt2369.exe PID 3940 wrote to memory of 2896 3940 99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exe zixt2369.exe PID 3940 wrote to memory of 2896 3940 99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exe zixt2369.exe PID 2896 wrote to memory of 2660 2896 zixt2369.exe jr265233.exe PID 2896 wrote to memory of 2660 2896 zixt2369.exe jr265233.exe PID 2896 wrote to memory of 3564 2896 zixt2369.exe ku661922.exe PID 2896 wrote to memory of 3564 2896 zixt2369.exe ku661922.exe PID 2896 wrote to memory of 3564 2896 zixt2369.exe ku661922.exe PID 3564 wrote to memory of 5760 3564 ku661922.exe 1.exe PID 3564 wrote to memory of 5760 3564 ku661922.exe 1.exe PID 3564 wrote to memory of 5760 3564 ku661922.exe 1.exe PID 3940 wrote to memory of 1576 3940 99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exe lr046527.exe PID 3940 wrote to memory of 1576 3940 99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exe lr046527.exe PID 3940 wrote to memory of 1576 3940 99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exe lr046527.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exe"C:\Users\Admin\AppData\Local\Temp\99986161e6a11e0e3ac55947f8f46ca52da9ea08f8ba06f354caa72612d707f0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixt2369.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixt2369.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr265233.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr265233.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku661922.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku661922.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 13844⤵
- Program crash
PID:5208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr046527.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr046527.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3564 -ip 35641⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD585792d89fd3227ee027800955f3e411d
SHA166fe2f04316d96b0d53c2f3d8742a8b12356559c
SHA25647fe60075cee9f63d889fe54a49547fcb942b7ed25cc79563019865969bfb4b0
SHA512ff7bbbb29d8fa4e64384e7a0fd7ed5c25cfdc07dcb644eb12eced6cc02633b2d1a075e3fb9bfa0ea7384c89286cf3bbed672b95bd1ec87adb707a343b9914529
-
Filesize
496KB
MD534e8c093d45e918105fe036f7a9e9034
SHA18a8642dacb3451e3b40c23af84ddcb09660d8eb5
SHA256b0bbdf05a32749dabae757e003f22cb83e4941702992b6c880744d61ab1d6214
SHA5122de764ef075c97691c0a639c6c08177ff7f344bac37d351983f589631df0fdd25035de140d7b6fd8e7142a58bb2c229696588bd6e406e76765ed32e8850d32f8
-
Filesize
12KB
MD5f165f6afa488d4c4d384027614d11e9d
SHA1b2ff4270d502b5a7e40fdd4b630e08fa5288c3ef
SHA25608d1d7b56c6b0a2de7d3ce7b4c3c387d58ca42a5f07a7b683b19c3078a4a5f6a
SHA512c131d26e521b15274a9cf4a8abf3cb4716aec3e6372cc5e36040f05055d38b14e287dea7973c4db8aeab75faacbff39d837f83573a16a08517da36c9a40f0fe1
-
Filesize
414KB
MD5dd1238ad9a5a3b22356aa3c0dfeda3c2
SHA16743daedb1c4c96770f9e318c0bffc06f05635fc
SHA256e022098a3f2b92e3852515c3db156efd08d21439654c13a20b0793e657f3b3c2
SHA5120e5464659c533ba000d3dbbe55856187461bc775d9e19741e0c8b740fd73987e933cb5281800d806ab57d193c3f47f5b7c936e01978d233c97c9e2a892bf7a4f
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0