Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exe
Resource
win10v2004-20241007-en
General
-
Target
d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exe
-
Size
684KB
-
MD5
4597ffac9d5efd123385e9bf0ea1d2db
-
SHA1
f9cf3bdf728d1db885bb8d1a6df3e4000f157eef
-
SHA256
d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736
-
SHA512
825a22a61f7ebd34b889b26cf9eb5e2a19fff385c2da536b08f9cf83acaf1ced5209507750e2161364c357b357f89118d2fe3d3e72101743ba290b24deae9c3d
-
SSDEEP
12288:BMr0y90xdtgB++yNegO2col9F75d99545IzwbyRDQixZxNNii/xEO92wDJzsfZAx:VySzg4Ovol9FSWG4DHxi9O92wDJgBAx
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr584941.exe healer behavioral1/memory/4912-15-0x0000000000620000-0x000000000062A000-memory.dmp healer -
Healer family
-
Processes:
jr584941.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr584941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr584941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr584941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr584941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr584941.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr584941.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4084-2105-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5644-2118-0x0000000000150000-0x0000000000180000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr753263.exe family_redline behavioral1/memory/6928-2129-0x0000000000770000-0x000000000079E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku624097.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ku624097.exe -
Executes dropped EXE 5 IoCs
Processes:
ziYB1587.exejr584941.exeku624097.exe1.exelr753263.exepid process 4808 ziYB1587.exe 4912 jr584941.exe 4084 ku624097.exe 5644 1.exe 6928 lr753263.exe -
Processes:
jr584941.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr584941.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exeziYB1587.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYB1587.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6768 4084 WerFault.exe ku624097.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exeziYB1587.exeku624097.exe1.exelr753263.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziYB1587.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku624097.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr753263.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr584941.exepid process 4912 jr584941.exe 4912 jr584941.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr584941.exeku624097.exedescription pid process Token: SeDebugPrivilege 4912 jr584941.exe Token: SeDebugPrivilege 4084 ku624097.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exeziYB1587.exeku624097.exedescription pid process target process PID 2480 wrote to memory of 4808 2480 d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exe ziYB1587.exe PID 2480 wrote to memory of 4808 2480 d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exe ziYB1587.exe PID 2480 wrote to memory of 4808 2480 d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exe ziYB1587.exe PID 4808 wrote to memory of 4912 4808 ziYB1587.exe jr584941.exe PID 4808 wrote to memory of 4912 4808 ziYB1587.exe jr584941.exe PID 4808 wrote to memory of 4084 4808 ziYB1587.exe ku624097.exe PID 4808 wrote to memory of 4084 4808 ziYB1587.exe ku624097.exe PID 4808 wrote to memory of 4084 4808 ziYB1587.exe ku624097.exe PID 4084 wrote to memory of 5644 4084 ku624097.exe 1.exe PID 4084 wrote to memory of 5644 4084 ku624097.exe 1.exe PID 4084 wrote to memory of 5644 4084 ku624097.exe 1.exe PID 2480 wrote to memory of 6928 2480 d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exe lr753263.exe PID 2480 wrote to memory of 6928 2480 d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exe lr753263.exe PID 2480 wrote to memory of 6928 2480 d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exe lr753263.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exe"C:\Users\Admin\AppData\Local\Temp\d94619cf8b80d433cf39fb280bb77a338c7a0858f0b9f13c861ed8547ec16736.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYB1587.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYB1587.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr584941.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr584941.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku624097.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku624097.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 13804⤵
- Program crash
PID:6768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr753263.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr753263.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4084 -ip 40841⤵PID:6712
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5e6bd6902d0b9447fd64dbd4afbb54838
SHA1cc0c46698c6c83683426789cee649162d4ad93ad
SHA25617ae4808fc99212dc897d9cdb53a018019e9db8c905507882222a96cb5f56b88
SHA512a5339091352e0a35830581c65ce791ef4862823c60ff48ac4542245d78cbf76b8800174a63ba47e8b21c18299f2ea247309e7ac17ef2d36d0164915c4cda917a
-
Filesize
530KB
MD5ab048b775faa0111c4ea594457059d13
SHA1a2f1d8b45b3500c9b6baba119e430e3e316b92fb
SHA2560d7302d62fdab681553a25720401c17e577c6a1083a5a090e50addbef7d2811e
SHA512ee1e8e13094fd7bdbe388a7ac1fed706ab36fd382c96d71944ae8a5201502d5ee130b1d8b522e317926ff6bb36eb8e9bdfb2d62501a04633575602ed6f91b952
-
Filesize
12KB
MD569fdad9c01c3f1e21c349f893643083c
SHA17512fa93cc5754b419a8454a62c3d00bbc8e52ba
SHA25689d6f75ade14d55cd377c080da29bc9426f3afdba5e642ea20216663fa94e5b5
SHA5127caf46de5e72244635a7b20835c8c74e296e6932bf8827e6791055088a61f0448dc71b937968945d5f66311248ba5b0b68e1448d6bc460a1fc64bb5b7482d795
-
Filesize
495KB
MD5537f8023a6e92f424ce8d674451b2ec5
SHA161ed92d973c4b212d6037a3a6743a08bb0de4aa5
SHA256a9f54a8122b25d0c21b4b060641013b98c29e501acf241c7b8c371eceff454de
SHA512526a5571d074e28455cec0d616c0b764a61f36926774a0502a902b52149bb48919ab951460ed4d4aebc223d04fb810c206ea07d75a1be8e4cef07a1dce715c89
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0