Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exe
Resource
win10v2004-20241007-en
General
-
Target
94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exe
-
Size
651KB
-
MD5
f3a1dac93e7d897c2d5f440dc84f391f
-
SHA1
029262b64999367df4dc8175800ba5f74965b280
-
SHA256
94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292
-
SHA512
d110b686a520b8e436d03961acbfac5b9aad8e432ac64baaabc399d97ffe42a240cd1b5fe2a909f01c9ba4b0f6b562d182c59cc025d002a5c94402af8054a3b5
-
SSDEEP
12288:zMrHy90AcCf4ynaQO6mqC9uuNzLL3sU1GaZEuC24wRaNsVx:oyJ7nassN/L3sqquxXUNI
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr221102.exe healer behavioral1/memory/2960-15-0x00000000007C0000-0x00000000007CA000-memory.dmp healer -
Healer family
-
Processes:
jr221102.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr221102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr221102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr221102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr221102.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr221102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr221102.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3272-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5888-2118-0x0000000000DE0000-0x0000000000E10000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr643320.exe family_redline behavioral1/memory/4324-2129-0x0000000000620000-0x000000000064E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku419380.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ku419380.exe -
Executes dropped EXE 5 IoCs
Processes:
ziEv7031.exejr221102.exeku419380.exe1.exelr643320.exepid process 2956 ziEv7031.exe 2960 jr221102.exe 3272 ku419380.exe 5888 1.exe 4324 lr643320.exe -
Processes:
jr221102.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr221102.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exeziEv7031.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEv7031.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5496 3272 WerFault.exe ku419380.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku419380.exe1.exelr643320.exe94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exeziEv7031.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku419380.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr643320.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziEv7031.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr221102.exepid process 2960 jr221102.exe 2960 jr221102.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr221102.exeku419380.exedescription pid process Token: SeDebugPrivilege 2960 jr221102.exe Token: SeDebugPrivilege 3272 ku419380.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exeziEv7031.exeku419380.exedescription pid process target process PID 2748 wrote to memory of 2956 2748 94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exe ziEv7031.exe PID 2748 wrote to memory of 2956 2748 94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exe ziEv7031.exe PID 2748 wrote to memory of 2956 2748 94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exe ziEv7031.exe PID 2956 wrote to memory of 2960 2956 ziEv7031.exe jr221102.exe PID 2956 wrote to memory of 2960 2956 ziEv7031.exe jr221102.exe PID 2956 wrote to memory of 3272 2956 ziEv7031.exe ku419380.exe PID 2956 wrote to memory of 3272 2956 ziEv7031.exe ku419380.exe PID 2956 wrote to memory of 3272 2956 ziEv7031.exe ku419380.exe PID 3272 wrote to memory of 5888 3272 ku419380.exe 1.exe PID 3272 wrote to memory of 5888 3272 ku419380.exe 1.exe PID 3272 wrote to memory of 5888 3272 ku419380.exe 1.exe PID 2748 wrote to memory of 4324 2748 94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exe lr643320.exe PID 2748 wrote to memory of 4324 2748 94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exe lr643320.exe PID 2748 wrote to memory of 4324 2748 94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exe lr643320.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exe"C:\Users\Admin\AppData\Local\Temp\94cc11261e9d858bc264d10179f3d8b2eef9c5f47e8bcd21aae91c5dfb981292.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEv7031.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEv7031.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr221102.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr221102.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku419380.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku419380.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 13804⤵
- Program crash
PID:5496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr643320.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr643320.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4324
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3272 -ip 32721⤵PID:2088
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD574cca797724d0b5b80ab1efff780981f
SHA17dc62509b4b455b11b7911848ef8c1e4f40647a8
SHA25609493e6d502eb8716e4d52b7df2e3eae02f28e91f443bfd037aee6c13eba0a4b
SHA5122bdde0c71fb6d0902fbb86e94e3dc7b1a31567798e9d11413bf584b384a60d2b275959c1321d8c529f1f069c66fb770f65fbdfd8ce4f50c1228fc695db147af4
-
Filesize
496KB
MD5d6cce7b903304dd21b9c5002e5bf8c51
SHA12791e7883e8c4b64b0f88176bc6959688e7e6846
SHA25609cfb3feb7f21263a22730ba0a7c72d91998bcc15ef735bab5bba561c2589fd4
SHA51299891e8ae6780147d53a607361d51c244c32bb627b108b3fed19aee835c68c063bac3853eb47b49c8a6b21124b7e7e2fc78c4919fb2f007e19d9462fe2c459b7
-
Filesize
12KB
MD5c35830f469263dba3b8cec8575589f54
SHA131eff0df981c595630eac2eaa827b170abe8733d
SHA25697c01ac6c3f2875b222e71bfa0fe1ad210f0e70946ba45993c4ae34666c0e2fb
SHA5123ff3c545f6278184e7795286e6752714f03633871718038ae627afe0730a95f1b922aaf987f42b4586b6fd9a63591422f14844009e5c4ecfa651fe9f1cfd8a79
-
Filesize
414KB
MD5e718055b3836ba755037ad71b14f24b7
SHA1af9771811e5166e44a683979acf50a7f52165001
SHA2561d7aa655e4e8c5b0c90a5be63355ceebcdc58a00d73ebef72ed7e3cb37b6bd6d
SHA5129484e80e8d7a4bddcf8852208c018baf6211fb4bbfe6415209f19c10c5d0c13166463d86b41e9cd8da0708cd8ab2e5d847c1b5067c0ae64cbdfdadfacbea4160
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0