Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 23:00
Static task
static1
Behavioral task
behavioral1
Sample
799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exe
Resource
win10v2004-20241007-en
General
-
Target
799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exe
-
Size
652KB
-
MD5
055495c04d477ce63ed5931ee1e023cf
-
SHA1
d38d5a8cdd9614bf46c420b7127a053b81887842
-
SHA256
799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2
-
SHA512
06abcaad1941ceaa8f3f7b835ae5be9e92ce8b385dc62612e9a35f74c7f6ce3af3bfc80b614d3043b6c8f71bbeaab2829e3c87637461e016d5fc4eba2ba234bd
-
SSDEEP
12288:fMrny90NGFPxUdMOPeu/TKyh6iIrXIPnd5Vokut6Eolc+:MyHtLpmRPd9utIlP
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr452295.exe healer behavioral1/memory/5084-15-0x0000000000540000-0x000000000054A000-memory.dmp healer -
Healer family
-
Processes:
jr452295.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr452295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr452295.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr452295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr452295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr452295.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr452295.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4236-2105-0x0000000004B70000-0x0000000004BA2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4024-2118-0x0000000000900000-0x0000000000930000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr700791.exe family_redline behavioral1/memory/5880-2129-0x0000000000A60000-0x0000000000A8E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku483180.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ku483180.exe -
Executes dropped EXE 5 IoCs
Processes:
ziWD7285.exejr452295.exeku483180.exe1.exelr700791.exepid process 4612 ziWD7285.exe 5084 jr452295.exe 4236 ku483180.exe 4024 1.exe 5880 lr700791.exe -
Processes:
jr452295.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr452295.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exeziWD7285.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWD7285.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6224 4236 WerFault.exe ku483180.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exelr700791.exe799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exeziWD7285.exeku483180.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr700791.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziWD7285.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku483180.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr452295.exepid process 5084 jr452295.exe 5084 jr452295.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr452295.exeku483180.exedescription pid process Token: SeDebugPrivilege 5084 jr452295.exe Token: SeDebugPrivilege 4236 ku483180.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exeziWD7285.exeku483180.exedescription pid process target process PID 3356 wrote to memory of 4612 3356 799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exe ziWD7285.exe PID 3356 wrote to memory of 4612 3356 799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exe ziWD7285.exe PID 3356 wrote to memory of 4612 3356 799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exe ziWD7285.exe PID 4612 wrote to memory of 5084 4612 ziWD7285.exe jr452295.exe PID 4612 wrote to memory of 5084 4612 ziWD7285.exe jr452295.exe PID 4612 wrote to memory of 4236 4612 ziWD7285.exe ku483180.exe PID 4612 wrote to memory of 4236 4612 ziWD7285.exe ku483180.exe PID 4612 wrote to memory of 4236 4612 ziWD7285.exe ku483180.exe PID 4236 wrote to memory of 4024 4236 ku483180.exe 1.exe PID 4236 wrote to memory of 4024 4236 ku483180.exe 1.exe PID 4236 wrote to memory of 4024 4236 ku483180.exe 1.exe PID 3356 wrote to memory of 5880 3356 799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exe lr700791.exe PID 3356 wrote to memory of 5880 3356 799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exe lr700791.exe PID 3356 wrote to memory of 5880 3356 799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exe lr700791.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exe"C:\Users\Admin\AppData\Local\Temp\799fdda9fa4eed477a99bcdc713e10470c0470b5c0e8c99a28f16c5d89eb34a2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWD7285.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWD7285.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr452295.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr452295.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku483180.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku483180.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4024 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 13844⤵
- Program crash
PID:6224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr700791.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr700791.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5880
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4236 -ip 42361⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD56a4d9966335532757e3d9efb4327ae39
SHA11165d664e6c194f61d9c09cfed3f5c96472b6c3b
SHA2564b632508664ff8953766aba38ae7709f3e78577872aadf32cc0c72ba95659a58
SHA512b1cd52c6118782f3f28ddf36bab20eef9de1529446048273daa7127e4900e4ae3d97b87887568fb5f5e0b4da0c111daaca0d558a9a67cabd0983d1289f356a99
-
Filesize
498KB
MD543f5ab22f3e6396c1907e43a845877de
SHA1c5bbf76dcf1b541920c4f77b73cc51ff2d20d9e4
SHA256cb6ba9fe28c361d369f7882ca854840823e252716bbdd0ba38869d83afcae036
SHA5125f7c66b5b6871fe90d9b215856a0b815cd49b6dea63266dab25975c1a531634b6a4fe265c32da3c1bae248ccc4f2e1aab68cc03a0b916a779fff942aabe58754
-
Filesize
12KB
MD579ef16898eeb292ebef34611504bf248
SHA150c67e8cb8c970b72d4289fb0b65915e3e2739be
SHA2564920f82b3a9751bcf49ed2e5ea826772ab411c8c8fdfe937bfc809a7dcfb2ab8
SHA51209d5063e2bd41d0d3fe482d1def36032580c8e869de8d2fb25c05b92995c36002e768a1f2f8037a5babae33eb0b7c043ba13f56b6991024a550f07b93521dbc7
-
Filesize
417KB
MD5d3bd24919edbd89ebefda18d6e97c630
SHA16782d862de993671bb67bee5fbf76008bda6fe41
SHA2568bdcfa83522b99b434fc1baf9e5115c03c5675bcc0ddd97ceec1135b315f046f
SHA512d99f15091a1e9ec2bc3e3788cc934b6daab1cb6b0aa74400cf754d2a227a1c3ce0f7d99ec10e7e7eb655c9709186f01ad1a62e3d578da2e259affb889d546b97
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0