Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 23:10
Static task
static1
Behavioral task
behavioral1
Sample
7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exe
Resource
win10v2004-20241007-en
General
-
Target
7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exe
-
Size
652KB
-
MD5
2c9544d32551746100604d84046ecb31
-
SHA1
82a78b1a432494c33930f2ab804feaeec890b0e2
-
SHA256
7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13
-
SHA512
388e81cba8e1794b74621b797dd3b17db7ac039475e85200f4eb042e94c81a88050431b8c650612455571f5d61dfc1caa0a24cb5051c087592960eec1bedf14e
-
SSDEEP
12288:GMrty902eHTaRf9A7fdJoQTUi9tiGrZIP+QYV4kIYmj7:LyReHuRfidXMPlqIX
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr327883.exe healer behavioral1/memory/4760-15-0x0000000000060000-0x000000000006A000-memory.dmp healer -
Healer family
-
Processes:
jr327883.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr327883.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr327883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr327883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr327883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr327883.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr327883.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1540-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5500-2118-0x00000000009C0000-0x00000000009F0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr867357.exe family_redline behavioral1/memory/6020-2129-0x0000000000E80000-0x0000000000EAE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku781942.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ku781942.exe -
Executes dropped EXE 5 IoCs
Processes:
zizR2278.exejr327883.exeku781942.exe1.exelr867357.exepid process 2976 zizR2278.exe 4760 jr327883.exe 1540 ku781942.exe 5500 1.exe 6020 lr867357.exe -
Processes:
jr327883.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr327883.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exezizR2278.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zizR2278.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5788 1540 WerFault.exe ku781942.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exezizR2278.exeku781942.exe1.exelr867357.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zizR2278.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku781942.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr867357.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr327883.exepid process 4760 jr327883.exe 4760 jr327883.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr327883.exeku781942.exedescription pid process Token: SeDebugPrivilege 4760 jr327883.exe Token: SeDebugPrivilege 1540 ku781942.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exezizR2278.exeku781942.exedescription pid process target process PID 432 wrote to memory of 2976 432 7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exe zizR2278.exe PID 432 wrote to memory of 2976 432 7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exe zizR2278.exe PID 432 wrote to memory of 2976 432 7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exe zizR2278.exe PID 2976 wrote to memory of 4760 2976 zizR2278.exe jr327883.exe PID 2976 wrote to memory of 4760 2976 zizR2278.exe jr327883.exe PID 2976 wrote to memory of 1540 2976 zizR2278.exe ku781942.exe PID 2976 wrote to memory of 1540 2976 zizR2278.exe ku781942.exe PID 2976 wrote to memory of 1540 2976 zizR2278.exe ku781942.exe PID 1540 wrote to memory of 5500 1540 ku781942.exe 1.exe PID 1540 wrote to memory of 5500 1540 ku781942.exe 1.exe PID 1540 wrote to memory of 5500 1540 ku781942.exe 1.exe PID 432 wrote to memory of 6020 432 7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exe lr867357.exe PID 432 wrote to memory of 6020 432 7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exe lr867357.exe PID 432 wrote to memory of 6020 432 7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exe lr867357.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exe"C:\Users\Admin\AppData\Local\Temp\7fadf9c14a00038d6eb6df1008734b4dd4c1389c431dccc920cd0bc6964eea13.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizR2278.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizR2278.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr327883.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr327883.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku781942.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku781942.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5500 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 13804⤵
- Program crash
PID:5788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr867357.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr867357.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6020
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1540 -ip 15401⤵PID:5840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD512e2201c80202361709a64e4a0e6b588
SHA1c6bee9506006282b3a4e318e430bbc20d2c9282a
SHA25603ce3d2291a5f9510d2a0f174e93f89f3c32cc3ab93a6ef9bcdf1f3ceb873c49
SHA5127881f6e0f9c4e79db8461feb0a7bbaa0c9cd9206790756476caecbf7e2850cf288b8bc6fbfcce5ac81341f79fdf0d342dd32a60b77827c71cd1f1d1b9de92491
-
Filesize
498KB
MD53442695883ba2a7b75cb4d601529c91a
SHA11becf00a72dd7b036b0e59c4091f4da197347377
SHA2561fe05541b6218633b60011e8caa8a09f53ac6e628dca38a48aff9e7bcf3e5f5b
SHA512276fe712181ba73e23912d3e1c30b7b9454f7170ccdb4f38295c181a33dae5e4847ab1c51ed77742d6c42b7f7bfc2105a927f98d4f5f1a8fb9f80ee18e4994de
-
Filesize
12KB
MD5bc2b03b58f3c79416a89645ef264fe4b
SHA1458386baa1ef65749068a7461d04447f06cc154a
SHA2560d5fddccc7a9f1abb539e0a9d44d1afde859d26dcfc67410213590cd291e4ba0
SHA51218d8a9321f5e45d99d9f24af392ba6a2085369ef609160bc34d8efffb90f8c49df93b45646e33b0cd95d36ccf714c4b4bd070f924c3ba6e464dc714d2b5d6b03
-
Filesize
417KB
MD58aac38691fd60cf59bf8529c5fec1072
SHA1c1edab6f3460a5fbdc7add26ace6a40b8f1eca56
SHA2561027591b0b3a12c3bfb5ee0879b658ab0647b3e2f48622b2a5cf19b2daffc2a5
SHA51290d8172bb4485e94e4e3077651ac2a3edd76c64cf22eb71936ce3b32cbfb2f237fe28cfcd505249d5faeeb5e573936311ad02b956612d5162ba286ed1fa436af
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0