Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 07:57
Static task
static1
Behavioral task
behavioral1
Sample
c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe
Resource
win10v2004-20241007-en
General
-
Target
c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe
-
Size
661KB
-
MD5
793d1cd35ad047ff8a3f68a2881b9a10
-
SHA1
a3dab5dec715dd2b3201329441b9bc22c82efdd0
-
SHA256
c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50
-
SHA512
0a165f761d5ad3dac54a4217cafba28d7de60ce9f832fb311b03d2a8f2677de7f5d3d212f7b1938539d4370e7fdac091f6ae6c6f9f68864d39d7116fbb80498e
-
SSDEEP
12288:tMrOy90Vgj2J4eUvoAZfjBf4KyY4Yzy2y4SzcvaZyNU:TySqecLZfjBrv22y4EmNU
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr118469.exe healer behavioral1/memory/4000-15-0x0000000000090000-0x000000000009A000-memory.dmp healer -
Healer family
-
Processes:
jr118469.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr118469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr118469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr118469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr118469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr118469.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr118469.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3888-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3284-2118-0x0000000000770000-0x00000000007A0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr118317.exe family_redline behavioral1/memory/5436-2129-0x00000000006A0000-0x00000000006CE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku388025.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku388025.exe -
Executes dropped EXE 5 IoCs
Processes:
zioJ2512.exejr118469.exeku388025.exe1.exelr118317.exepid process 4620 zioJ2512.exe 4000 jr118469.exe 3888 ku388025.exe 3284 1.exe 5436 lr118317.exe -
Processes:
jr118469.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr118469.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exezioJ2512.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zioJ2512.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4544 3888 WerFault.exe ku388025.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exezioJ2512.exeku388025.exe1.exelr118317.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zioJ2512.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku388025.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr118317.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr118469.exepid process 4000 jr118469.exe 4000 jr118469.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr118469.exeku388025.exedescription pid process Token: SeDebugPrivilege 4000 jr118469.exe Token: SeDebugPrivilege 3888 ku388025.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exezioJ2512.exeku388025.exedescription pid process target process PID 2464 wrote to memory of 4620 2464 c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe zioJ2512.exe PID 2464 wrote to memory of 4620 2464 c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe zioJ2512.exe PID 2464 wrote to memory of 4620 2464 c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe zioJ2512.exe PID 4620 wrote to memory of 4000 4620 zioJ2512.exe jr118469.exe PID 4620 wrote to memory of 4000 4620 zioJ2512.exe jr118469.exe PID 4620 wrote to memory of 3888 4620 zioJ2512.exe ku388025.exe PID 4620 wrote to memory of 3888 4620 zioJ2512.exe ku388025.exe PID 4620 wrote to memory of 3888 4620 zioJ2512.exe ku388025.exe PID 3888 wrote to memory of 3284 3888 ku388025.exe 1.exe PID 3888 wrote to memory of 3284 3888 ku388025.exe 1.exe PID 3888 wrote to memory of 3284 3888 ku388025.exe 1.exe PID 2464 wrote to memory of 5436 2464 c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe lr118317.exe PID 2464 wrote to memory of 5436 2464 c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe lr118317.exe PID 2464 wrote to memory of 5436 2464 c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe lr118317.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe"C:\Users\Admin\AppData\Local\Temp\c79d7257b28cbe63477e56f51838c0ad3728e5873ad3f9e9a65969f75b798e50.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioJ2512.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioJ2512.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr118469.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr118469.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku388025.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku388025.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 12084⤵
- Program crash
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr118317.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr118317.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3888 -ip 38881⤵PID:5228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD537be4d0bf281d72f1391c3ed5bfd1c29
SHA13beb273bf3e923fe075c62895c36345793e36a6f
SHA256846118cc79ca68eba7f275eff8e03c33e46290f8843e75c0fed1160937f773e7
SHA512e757c3ddacda543391009434f751e57475f366b3ef6a8893abdb7f9b6fab32775589fc95c897197e534a4199770df237299bdfe4ac0b0fb10565b35c759ad684
-
Filesize
507KB
MD595b52a77fb43c6bc2e369b019fb90897
SHA1f926a4415c4082169279ea2ae0fae707588cb218
SHA2562c71b55b7a78af64455941943d7eba1bb21834e2ab89745e398dd69464daccda
SHA5127474eda91f614e9ae3d8cc4d77279015ba5ff6ada655cfb7a9d3edc727bb16d78132dabe66785ddeb2f074216473c0faaf4c9d5e9007c20acc7b9bc170165b92
-
Filesize
11KB
MD51064c8e873b8ef7b683a5228cbc88b8b
SHA118fd3ab0f542ae640f158b5ac20615c4b1940699
SHA256cad5902d256fd6e9f3a64166925193a0ffbe66db4ec317b38bb76050f3367787
SHA512db04baf087525ab2c23221a977d970ea6c280975c94895d007f676af4ed66b9787c0ab23cf2282046504ef40cf7e936dbd6b57a777f4039ebaf6de17f0fd327d
-
Filesize
435KB
MD5914e0856ab5cdbf42ab9abdcc7fc26c7
SHA1bc33762416b020f4d37c7af5c5c263a647a204e9
SHA256311a07ba57d3e801f36502e417132a57b7e0f29f756cc2f6375f18dbfc0e77de
SHA512be58aaaab8d987384786dad7c0f832adca2fe876072440f40f29282174f82af358b9770e6a2c32b125e5dd5aeb8b60d40c54471ce036d40dc7f94fbb450176b5
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0