Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 15:48
Static task
static1
Behavioral task
behavioral1
Sample
5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exe
Resource
win10v2004-20241007-en
General
-
Target
5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exe
-
Size
651KB
-
MD5
48797f7394546b055516218a8e4bb226
-
SHA1
baef535c1f1ce2266a5d9117f2c5b7e2ca13ea38
-
SHA256
5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446
-
SHA512
19612edbbd6d2ae325e46600e5fbebb39bd2b2a9bc9de37f16df394eaadd86f5df7b1c8b857ff5595b20badb605365e7856a252dd9e416a59db4985e344b660b
-
SSDEEP
12288:IMr5y90/dVDW2pXE/FB9AI335pgGhv4r8De6rLKTgW:xyEFE39X4G26eS5W
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr946050.exe healer behavioral1/memory/3080-15-0x0000000000F90000-0x0000000000F9A000-memory.dmp healer -
Healer family
-
Processes:
jr946050.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr946050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr946050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr946050.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr946050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr946050.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr946050.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2704-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/6428-2118-0x0000000000150000-0x0000000000180000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr581537.exe family_redline behavioral1/memory/6740-2129-0x0000000000720000-0x000000000074E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku124090.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ku124090.exe -
Executes dropped EXE 5 IoCs
Processes:
ziVo7916.exejr946050.exeku124090.exe1.exelr581537.exepid process 2076 ziVo7916.exe 3080 jr946050.exe 2704 ku124090.exe 6428 1.exe 6740 lr581537.exe -
Processes:
jr946050.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr946050.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziVo7916.exe5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVo7916.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 6344 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6620 2704 WerFault.exe ku124090.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exeziVo7916.exeku124090.exe1.exelr581537.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziVo7916.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku124090.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr581537.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr946050.exepid process 3080 jr946050.exe 3080 jr946050.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr946050.exeku124090.exedescription pid process Token: SeDebugPrivilege 3080 jr946050.exe Token: SeDebugPrivilege 2704 ku124090.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exeziVo7916.exeku124090.exedescription pid process target process PID 4592 wrote to memory of 2076 4592 5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exe ziVo7916.exe PID 4592 wrote to memory of 2076 4592 5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exe ziVo7916.exe PID 4592 wrote to memory of 2076 4592 5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exe ziVo7916.exe PID 2076 wrote to memory of 3080 2076 ziVo7916.exe jr946050.exe PID 2076 wrote to memory of 3080 2076 ziVo7916.exe jr946050.exe PID 2076 wrote to memory of 2704 2076 ziVo7916.exe ku124090.exe PID 2076 wrote to memory of 2704 2076 ziVo7916.exe ku124090.exe PID 2076 wrote to memory of 2704 2076 ziVo7916.exe ku124090.exe PID 2704 wrote to memory of 6428 2704 ku124090.exe 1.exe PID 2704 wrote to memory of 6428 2704 ku124090.exe 1.exe PID 2704 wrote to memory of 6428 2704 ku124090.exe 1.exe PID 4592 wrote to memory of 6740 4592 5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exe lr581537.exe PID 4592 wrote to memory of 6740 4592 5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exe lr581537.exe PID 4592 wrote to memory of 6740 4592 5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exe lr581537.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exe"C:\Users\Admin\AppData\Local\Temp\5c4621466ff6f2fc4e0863581e6e2f3b52253689a82cd7b0dab98bbf510c2446.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVo7916.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVo7916.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr946050.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr946050.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku124090.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku124090.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 13684⤵
- Program crash
PID:6620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr581537.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr581537.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6740
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2704 -ip 27041⤵PID:6532
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:6344
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD54f0c0a1388e82293c0be736e285f5cc1
SHA1089dfc3c2ea758617716fbc29b77e0a503e486f7
SHA256162e496fa1ac754f304adeea90722ab40945839ac10d9da9ec95a7350adfeb5e
SHA512b260916ac83ba7609ac4a092b54a27444db237da2605220628d5ffd76a0b76797e3a8049407b7171e401bdd44450fe0c349357a037d45b6328145e6ed2d75032
-
Filesize
497KB
MD59658ec31d957722e3af30f0c9c94ec0e
SHA13ed64bba2eb93869bdca12e20d51bd10afa792d4
SHA2561e40738f4f6a447bcf24d51cc0afb91fbdd5075d72057d497259dfffd0f6a2da
SHA51280e68c1131cf4aa8e97f5262657eb42c443836e3580b5d0dedbf2fad3efc82e4cfffc7582fe2cb0ec77701aef3ce742547f5d1eeb8cd6cb9216ec0950662b90d
-
Filesize
11KB
MD54a475d99016d2f9ce287cf2bc9f877c5
SHA1f99f9780c425d7376a6c866423887d49b0c31a1a
SHA256c0ad90c91edfcc7a6f71cebc3791413b468d8e287565b80f4711efc81805de8a
SHA512b2e8d17ca4772fb9a924a55baf4e085df781f9992804116794c701ede593d89ca4c06ad700847cbc7cf31ea0675a53b06c546f9c1aea8a369545429413681e59
-
Filesize
415KB
MD5eecd855f5f919856b4ac9675feffe3f8
SHA12f8b022ff9a4060886230c369a85d3222ba8aa68
SHA256d9845777a92a0e56903d19e8a485220b7b16cefd76018af97c5257fb394e8456
SHA5129399c4d067f1b441ed26e8f1aecd3bfd9014428e1cba47b90bfff9f916a7cf03b8ca0f483f1e3c4d5e23c8ab764a521ea2df93b67008e08c6925d314ae326c7c
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0