Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exe
Resource
win10v2004-20241007-en
General
-
Target
29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exe
-
Size
652KB
-
MD5
fd18a08d5200b508e4c7fa9cbef4517c
-
SHA1
4080a48da78d1e4fb714fbb9d0ade4cce969eb20
-
SHA256
29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1
-
SHA512
d59e61ca343274daf444a89dae0e7d779c3e791a7d401b9d4f817eb8feb97d832c118e703e883856e06be81e2b5682c3e037292301ff49bb69f87e9d70b2350c
-
SSDEEP
12288:SMrLy90gf5hIxLJU5hGoMTbKHiWr12PsdEVlK3ZFb08PE4:Zy0ohCpPOV3ZFbX
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr904170.exe healer behavioral1/memory/2056-15-0x0000000000590000-0x000000000059A000-memory.dmp healer -
Healer family
-
Processes:
jr904170.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr904170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr904170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr904170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr904170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr904170.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr904170.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/3600-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2920-2118-0x0000000000C70000-0x0000000000CA0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr166712.exe family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku575342.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku575342.exe -
Executes dropped EXE 5 IoCs
Processes:
ziVg3461.exejr904170.exeku575342.exe1.exelr166712.exepid process 4776 ziVg3461.exe 2056 jr904170.exe 3600 ku575342.exe 2920 1.exe 2080 lr166712.exe -
Processes:
jr904170.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr904170.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziVg3461.exe29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVg3461.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4932 3600 WerFault.exe ku575342.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exeziVg3461.exeku575342.exe1.exelr166712.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziVg3461.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku575342.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr166712.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr904170.exepid process 2056 jr904170.exe 2056 jr904170.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr904170.exeku575342.exedescription pid process Token: SeDebugPrivilege 2056 jr904170.exe Token: SeDebugPrivilege 3600 ku575342.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exeziVg3461.exeku575342.exedescription pid process target process PID 3692 wrote to memory of 4776 3692 29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exe ziVg3461.exe PID 3692 wrote to memory of 4776 3692 29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exe ziVg3461.exe PID 3692 wrote to memory of 4776 3692 29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exe ziVg3461.exe PID 4776 wrote to memory of 2056 4776 ziVg3461.exe jr904170.exe PID 4776 wrote to memory of 2056 4776 ziVg3461.exe jr904170.exe PID 4776 wrote to memory of 3600 4776 ziVg3461.exe ku575342.exe PID 4776 wrote to memory of 3600 4776 ziVg3461.exe ku575342.exe PID 4776 wrote to memory of 3600 4776 ziVg3461.exe ku575342.exe PID 3600 wrote to memory of 2920 3600 ku575342.exe 1.exe PID 3600 wrote to memory of 2920 3600 ku575342.exe 1.exe PID 3600 wrote to memory of 2920 3600 ku575342.exe 1.exe PID 3692 wrote to memory of 2080 3692 29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exe lr166712.exe PID 3692 wrote to memory of 2080 3692 29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exe lr166712.exe PID 3692 wrote to memory of 2080 3692 29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exe lr166712.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exe"C:\Users\Admin\AppData\Local\Temp\29e5198b9dad52a30af5f5f92ca24beec47731a3b215c40f29ffc3343e030dc1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVg3461.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVg3461.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr904170.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr904170.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku575342.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku575342.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3600 -s 13684⤵
- Program crash
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr166712.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr166712.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3600 -ip 36001⤵PID:6136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5583c0b06d507a3f8bae0cb4bb1582367
SHA18ae2a60da0d7550c89d4f11e07f87d05e35c1aad
SHA2567b5bd9ed6c2f867799ceb1e820f59932a67842f540b05071ad8a00e3e3fa8384
SHA512bf5ff548bcc55b9223cc8cad2738a6d09890afe645093c5120fb83f00a7b7285df2acfacbda76820acde9e9dda39cd4cb36bcf28e8fdcfd153cc911cf46ecb66
-
Filesize
498KB
MD5b56a4351e624c1499862bb2f0b74ab6f
SHA15443d2271d64b32c0383a5991f5a06750a995be9
SHA2568cd685867299d41ddffeaacbe008a526e50ce3b72988a13502a20b1999159975
SHA5127a6ad8917b1988a2423b1b3122040f810aea6f9eb7ecf1eab7b60b3692a20ccb206f82e64b4aa22641701fcb693e19172f75beace30c584bd281c5bac437806c
-
Filesize
12KB
MD512062a4266340877d8b94187263814c4
SHA18d3bdebf5d133365b3c290a234219385c1853ab6
SHA25688187dac637c43663fcb06e89552f34546ebbd114d98b35d30bda62cde94b49b
SHA51205f2123228e7f57af5f47d51efcf7fcadbbe6dd3de7e9fc82bf47bf47d63bf105d9b98d1c164b17c1608e5fb3ebc236ef0a44131355adfa2281cca124b41474c
-
Filesize
417KB
MD5cab6a1ce520677cdbb2fc76072b9e597
SHA1341f65d8925f3b283945725d96df7c33d9df1c3f
SHA256aa009bb29869f1e80c47cd8d7e6517440af5dc7519ea38058c3068b7d0c16cbd
SHA512bda41dc502bc831da9a6a1d409c0129177a01f3384f6cbca1c46a94e49d510b0be08d5b12f228c48f5fc66ca971759e4020a83a0dd7d43b6497dd8ea667f67d5
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0