Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 11:59
Static task
static1
Behavioral task
behavioral1
Sample
065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe
Resource
win10v2004-20241007-en
General
-
Target
065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe
-
Size
652KB
-
MD5
3c3cd50a82be18ae3a544f960926170a
-
SHA1
4d1415c4a8a79545b6b3c7d08a62c0c7174ee3b1
-
SHA256
065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d
-
SHA512
55b07e143bd3a84ca5b20f511fa30671812f4b5fc53ac0605e8e63e3fe92a0ce2f881146f4e1c3943c772bde09b3daa4376c91564a52020c1beb524920339d09
-
SSDEEP
12288:gMr1y90Zob+2SE1ZvXDViMxoMTrZHsikrJoPKi+V9QmjeeSi68r:lyL62Z3b7hZPp5mj7+8r
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr845532.exe healer behavioral1/memory/764-15-0x0000000000410000-0x000000000041A000-memory.dmp healer -
Healer family
-
Processes:
jr845532.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr845532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr845532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr845532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr845532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr845532.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr845532.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2040-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/6924-2118-0x0000000000650000-0x0000000000680000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr228841.exe family_redline behavioral1/memory/2804-2129-0x00000000002F0000-0x000000000031E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku013031.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ku013031.exe -
Executes dropped EXE 5 IoCs
Processes:
ziYV8729.exejr845532.exeku013031.exe1.exelr228841.exepid process 2232 ziYV8729.exe 764 jr845532.exe 2040 ku013031.exe 6924 1.exe 2804 lr228841.exe -
Processes:
jr845532.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr845532.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exeziYV8729.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYV8729.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 7084 2040 WerFault.exe ku013031.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exelr228841.exe065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exeziYV8729.exeku013031.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr228841.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziYV8729.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku013031.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr845532.exepid process 764 jr845532.exe 764 jr845532.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr845532.exeku013031.exedescription pid process Token: SeDebugPrivilege 764 jr845532.exe Token: SeDebugPrivilege 2040 ku013031.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exeziYV8729.exeku013031.exedescription pid process target process PID 3808 wrote to memory of 2232 3808 065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe ziYV8729.exe PID 3808 wrote to memory of 2232 3808 065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe ziYV8729.exe PID 3808 wrote to memory of 2232 3808 065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe ziYV8729.exe PID 2232 wrote to memory of 764 2232 ziYV8729.exe jr845532.exe PID 2232 wrote to memory of 764 2232 ziYV8729.exe jr845532.exe PID 2232 wrote to memory of 2040 2232 ziYV8729.exe ku013031.exe PID 2232 wrote to memory of 2040 2232 ziYV8729.exe ku013031.exe PID 2232 wrote to memory of 2040 2232 ziYV8729.exe ku013031.exe PID 2040 wrote to memory of 6924 2040 ku013031.exe 1.exe PID 2040 wrote to memory of 6924 2040 ku013031.exe 1.exe PID 2040 wrote to memory of 6924 2040 ku013031.exe 1.exe PID 3808 wrote to memory of 2804 3808 065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe lr228841.exe PID 3808 wrote to memory of 2804 3808 065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe lr228841.exe PID 3808 wrote to memory of 2804 3808 065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe lr228841.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe"C:\Users\Admin\AppData\Local\Temp\065e183bff592bc56e651a37100ec34e54d42e493add5e9cc352263f452fbc7d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYV8729.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYV8729.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr845532.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr845532.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku013031.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku013031.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 15044⤵
- Program crash
PID:7084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr228841.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr228841.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2040 -ip 20401⤵PID:7048
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5b21eb49af3bd673bda14238fe5769ed0
SHA13386a16c6529e89d2840a747b40783aa5cc71fcb
SHA256a0fd9564b4f3d6ded931da553fcaa22f862fb92344643faf43922f1bdf647b71
SHA5126a012a759a89699279e66c1b0a06a8b5483ec54530e0138d08af47ca01389b670dfb166cf1edf1acb3481124de55740e1ae27691e4854f7fa9d66960db192c02
-
Filesize
498KB
MD5b278cd150f85988be4145ccbec159721
SHA16516a6bcad511e294a92ccd960bf01fc524f3347
SHA2566c1b7161700d7a7084052df1d3342c0c7ab0517d1df0c8978badc2afeb36633f
SHA512cbeaa3e9e4e83eb3b99cb6d833a40f961c4369e56db486c589a8315b4f3dfc03cae3f5773b9e5ceec82e949bfd19ec1ca4c725bd7c2a5f6e301a338b1c360624
-
Filesize
12KB
MD5be11b6d4ba2aa0ca2b1f189b857563ba
SHA1f9f0ea28a14656e61fd5894b514981f8c0b165c5
SHA256e9212147e70c27c2d168ac3cbd1992a997d4d8b78c749aa774d49f285759db8e
SHA512f5d5149e4f643de3298c6f69da91b9808b5aa6189674c4766a53ca616a92086dbbc7389ca7b340cfd04f4973fd603b3358f5ff5512c277f615b9e3fcc13a397e
-
Filesize
417KB
MD5996c7217e3c7a83ebdcd6cf5f788bd9b
SHA1f61998277e77b731a1c71d42ce76d81fbfcec269
SHA2563cf752afbb99b194b59691bfda092ccc1d6efc86e6805b1cd4b7ea3e60a1901d
SHA5122e763c3deaecc86f16c29442982e4676797b5006bb050c1c7ce928a906027d57c7bb5f28e8f527d31a5d2537dcf17324003e99aa6b2c8d36905c9254ac856198
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0