Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 17:31
Static task
static1
Behavioral task
behavioral1
Sample
12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exe
Resource
win10v2004-20241007-en
General
-
Target
12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exe
-
Size
652KB
-
MD5
0d84fe1bdd833e58f8f5cafb107a9106
-
SHA1
1fb25c4f5cb3b12bf418843386e1a26916cec37e
-
SHA256
12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb
-
SHA512
783f74906508a9767adaf2172876cc0aecb3703be606064722ac38670f92c76f55f0bdddd724b3a120ddbb9105ba37c7087acc7842f6f9778e0c901da202ba06
-
SSDEEP
12288:wMrky901Qwz+MM7Zvb4LTAo6T/Si7irrJaPsAGVYEo2NEl+wU:EybwJM7ZTzBPrUo2qlK
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr083294.exe healer behavioral1/memory/992-15-0x0000000000540000-0x000000000054A000-memory.dmp healer -
Healer family
-
Processes:
jr083294.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr083294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr083294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr083294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr083294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr083294.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr083294.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3232-2104-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5136-2117-0x0000000000920000-0x0000000000950000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr571757.exe family_redline behavioral1/memory/3864-2128-0x0000000000440000-0x000000000046E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku896853.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ku896853.exe -
Executes dropped EXE 5 IoCs
Processes:
ziWj8194.exejr083294.exeku896853.exe1.exelr571757.exepid process 2556 ziWj8194.exe 992 jr083294.exe 3232 ku896853.exe 5136 1.exe 3864 lr571757.exe -
Processes:
jr083294.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr083294.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exeziWj8194.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWj8194.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3796 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4932 3232 WerFault.exe ku896853.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exelr571757.exe12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exeziWj8194.exeku896853.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr571757.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziWj8194.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku896853.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr083294.exepid process 992 jr083294.exe 992 jr083294.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr083294.exeku896853.exedescription pid process Token: SeDebugPrivilege 992 jr083294.exe Token: SeDebugPrivilege 3232 ku896853.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exeziWj8194.exeku896853.exedescription pid process target process PID 2724 wrote to memory of 2556 2724 12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exe ziWj8194.exe PID 2724 wrote to memory of 2556 2724 12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exe ziWj8194.exe PID 2724 wrote to memory of 2556 2724 12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exe ziWj8194.exe PID 2556 wrote to memory of 992 2556 ziWj8194.exe jr083294.exe PID 2556 wrote to memory of 992 2556 ziWj8194.exe jr083294.exe PID 2556 wrote to memory of 3232 2556 ziWj8194.exe ku896853.exe PID 2556 wrote to memory of 3232 2556 ziWj8194.exe ku896853.exe PID 2556 wrote to memory of 3232 2556 ziWj8194.exe ku896853.exe PID 3232 wrote to memory of 5136 3232 ku896853.exe 1.exe PID 3232 wrote to memory of 5136 3232 ku896853.exe 1.exe PID 3232 wrote to memory of 5136 3232 ku896853.exe 1.exe PID 2724 wrote to memory of 3864 2724 12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exe lr571757.exe PID 2724 wrote to memory of 3864 2724 12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exe lr571757.exe PID 2724 wrote to memory of 3864 2724 12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exe lr571757.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exe"C:\Users\Admin\AppData\Local\Temp\12c01679662ec6ef40ee9ec01758265fe22134590fe2a8b9494b2d93f48b12cb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWj8194.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWj8194.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr083294.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr083294.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:992 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku896853.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku896853.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 14884⤵
- Program crash
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr571757.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr571757.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3232 -ip 32321⤵PID:4984
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3796
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD55734a6cfa4bead5ec1dd3b0a41a455ad
SHA1bc22a491d4fd754095252499168f42205492e651
SHA256f799fcab12624a505e128a53de8d48bae6d9280d522928f846183385b552478f
SHA512307406218a42343a1d92bd562aec0cf773ffdcc8a974a65c4121671a8f070654495287eb508664fb02e36efe0f365bb47d275c30bff192829cceae0a9aeaf010
-
Filesize
498KB
MD527d90af3fc6983aa0e164277411f81ff
SHA1284d26ee17b0fb4e37d72014ee1839c064781739
SHA2561df1654a000ad58bfa66b4f47abf4f5d43feaf08185afe8c96b57dd31f825701
SHA512fa2e0661a853c749c865f0d7f0ad477a4e2577e29cc0173a032b22ffe42658bac959098bbdc4f23adebf15450968298ddebd4b04d2fb602024b6098a2762a495
-
Filesize
12KB
MD573891dc711f04920514c333c6ef126f0
SHA1ce4f06df3d8c06046e6a159822905eb084333be3
SHA2567008cc102b2ee2426d2e880fa8a9e8fcdc549d1f08c9b945d9a8a713cb648235
SHA51208a316c80d5429cbc9df38b6e45076e405844b6df469be43d0c216fb448af94153fc0a9ff26ea76798d2504b2f684cf7f5835e748022f4c2ce4329558ee9e78b
-
Filesize
417KB
MD5e9802e0020fbab6b55a9ceca62d2d8d3
SHA1f698bfd98d3938ef77a76ca4e740509fa9e286b5
SHA2566b81866380d9d915733b74541d052555455f2c6f8bfabb4847a32bcb30a04633
SHA51279ee6c47415035bec3e037169d1d04c292e6ba923c6fa895b8e4c5c3ad3995ff0e975b888d3e60c8db03471651b19f83e3b643b525f71b3d22f0edfdeaf854d5
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0