Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 00:38
Static task
static1
Behavioral task
behavioral1
Sample
a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exe
Resource
win10v2004-20241007-en
General
-
Target
a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exe
-
Size
651KB
-
MD5
c19c49e8cd01fe15e1c0cff83338d001
-
SHA1
f4ed7262ce233c34801efe785a9db33a57d05f62
-
SHA256
a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57
-
SHA512
f2915b9af3c230b5bb49bb8c3eb33f8ef601cdc923b3277f8c5964948d388419672741e98e996023600a8615c745d76e5129b93ff67227c528ceedfc6b22b602
-
SSDEEP
12288:xMr/y90W39/GLrCTlzhFQzfn3uULxQ/4u5ig51bIk:iyV39/aylznQDn3uIHu5J1Ik
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr399165.exe healer behavioral1/memory/4876-15-0x0000000000C20000-0x0000000000C2A000-memory.dmp healer -
Healer family
-
Processes:
jr399165.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr399165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr399165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr399165.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr399165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr399165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr399165.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4524-2105-0x0000000004E20000-0x0000000004E52000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/380-2118-0x0000000000CB0000-0x0000000000CE0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr194723.exe family_redline behavioral1/memory/5448-2129-0x0000000000E80000-0x0000000000EAE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku832135.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ku832135.exe -
Executes dropped EXE 5 IoCs
Processes:
ziNy4703.exejr399165.exeku832135.exe1.exelr194723.exepid process 3480 ziNy4703.exe 4876 jr399165.exe 4524 ku832135.exe 380 1.exe 5448 lr194723.exe -
Processes:
jr399165.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr399165.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exeziNy4703.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziNy4703.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 232 4524 WerFault.exe ku832135.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
lr194723.exea1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exeziNy4703.exeku832135.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr194723.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziNy4703.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku832135.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr399165.exepid process 4876 jr399165.exe 4876 jr399165.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr399165.exeku832135.exedescription pid process Token: SeDebugPrivilege 4876 jr399165.exe Token: SeDebugPrivilege 4524 ku832135.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exeziNy4703.exeku832135.exedescription pid process target process PID 4796 wrote to memory of 3480 4796 a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exe ziNy4703.exe PID 4796 wrote to memory of 3480 4796 a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exe ziNy4703.exe PID 4796 wrote to memory of 3480 4796 a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exe ziNy4703.exe PID 3480 wrote to memory of 4876 3480 ziNy4703.exe jr399165.exe PID 3480 wrote to memory of 4876 3480 ziNy4703.exe jr399165.exe PID 3480 wrote to memory of 4524 3480 ziNy4703.exe ku832135.exe PID 3480 wrote to memory of 4524 3480 ziNy4703.exe ku832135.exe PID 3480 wrote to memory of 4524 3480 ziNy4703.exe ku832135.exe PID 4524 wrote to memory of 380 4524 ku832135.exe 1.exe PID 4524 wrote to memory of 380 4524 ku832135.exe 1.exe PID 4524 wrote to memory of 380 4524 ku832135.exe 1.exe PID 4796 wrote to memory of 5448 4796 a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exe lr194723.exe PID 4796 wrote to memory of 5448 4796 a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exe lr194723.exe PID 4796 wrote to memory of 5448 4796 a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exe lr194723.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exe"C:\Users\Admin\AppData\Local\Temp\a1e0dfdbcee639d10edb811b12e3a6b9368e2985767614f174c10cb4f52f5f57.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNy4703.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNy4703.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr399165.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr399165.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku832135.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku832135.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4524 -s 13684⤵
- Program crash
PID:232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr194723.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr194723.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5448
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4524 -ip 45241⤵PID:2724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5ada8f1648339cfe0d15f5c06d2060e9b
SHA1b57a1db90c0d7f28b951f5e745696ec1607c5f68
SHA25677d837cd3be3a6a639feb16c4fb5e2f9a9d02de7d3c3443fc7f1324938033d17
SHA5126043ccccb87eab47fedf08d121c07f22a67b32b95d4b3f1469277a67fe0db2cf6827043a32f341f7041bb0b79bd2168157e4191e0986f0742f992adfdeedd0b4
-
Filesize
496KB
MD52a3b5a21471150c753f865499f102ece
SHA1d7494c3fee09c4889158e8dc30d99101c5944f63
SHA256b4da34476493666fc45591d324c4add6935513041c10accd4654ab27cfdd8405
SHA51292cb6051531889fe262ceeaa312734caebfd263be4433d43ef58dc62483936faa2ca61dae23832029060bc5abd72efccd95a0873c55b9fbbe7e4aa6e3ec6261d
-
Filesize
12KB
MD5c232f230cffc654632a17cd355cca86c
SHA15c6338d3b43552dda856b927010c7b393a04950c
SHA256d9b1ad3233a4130dd897a8fedb83f9083115ac40a9d2497b73d2d169a38ca11f
SHA512ef1a1c6b60b2d961728ff9c1ec4c28f81d55388f846eb8610bc7a6fb7d3b557c393fbfa8d9f87ebc337c4bfe64ea6c1d1a2fa25604c5ba1b371ed8514089d7f1
-
Filesize
414KB
MD5f945480a33cde8ec0bc21e6c21fdc7be
SHA10baf1c9a8939664abfe4cfc2b31770b604e9563a
SHA2564dbc5ba2985a5f9bec82025ad40324d90c30ec46925d8673c596c59f28fa66c8
SHA512ffebd963f98d0694ac549dfc616438f0cded8ab439b380e3d06c9c61ed88f6a65b283b3831b11a3359cbbe03e6f80920cd8cb87a11d650da53c8963e8ffd6536
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0