Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 18:39
Static task
static1
Behavioral task
behavioral1
Sample
7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exe
Resource
win10v2004-20241007-en
General
-
Target
7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exe
-
Size
651KB
-
MD5
ff0db5e94c8ad84fa8d1096cf152c294
-
SHA1
2e0988a7a3601b64af4b4ace2b82347c09aa465f
-
SHA256
7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611
-
SHA512
62ea8f8404fa0bd124031e8e8cf9676efa7b5bdcf45d692f24c32269c8b4b0ee65a50f30171f093cd55526c59c67c3e3231c91928ce833847c5ba6baea68e850
-
SSDEEP
12288:QMr0y90tf0aJsvXr3Blp7/KAu9aKCszsp3vUVvXKCutoPhYsnacb:0yyf0pBf7u9aKCsop3vuHugYsz
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr429829.exe healer behavioral1/memory/4812-15-0x0000000000510000-0x000000000051A000-memory.dmp healer -
Healer family
-
Processes:
jr429829.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr429829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr429829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr429829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr429829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr429829.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr429829.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/5008-2105-0x0000000005530000-0x0000000005562000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1516-2118-0x0000000000610000-0x0000000000640000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr355357.exe family_redline behavioral1/memory/5852-2129-0x0000000000A80000-0x0000000000AAE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku584460.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ku584460.exe -
Executes dropped EXE 5 IoCs
Processes:
ziSf7361.exejr429829.exeku584460.exe1.exelr355357.exepid process 3676 ziSf7361.exe 4812 jr429829.exe 5008 ku584460.exe 1516 1.exe 5852 lr355357.exe -
Processes:
jr429829.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr429829.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziSf7361.exe7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziSf7361.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5740 5008 WerFault.exe ku584460.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exeziSf7361.exeku584460.exe1.exelr355357.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziSf7361.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku584460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr355357.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr429829.exepid process 4812 jr429829.exe 4812 jr429829.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr429829.exeku584460.exedescription pid process Token: SeDebugPrivilege 4812 jr429829.exe Token: SeDebugPrivilege 5008 ku584460.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exeziSf7361.exeku584460.exedescription pid process target process PID 8 wrote to memory of 3676 8 7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exe ziSf7361.exe PID 8 wrote to memory of 3676 8 7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exe ziSf7361.exe PID 8 wrote to memory of 3676 8 7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exe ziSf7361.exe PID 3676 wrote to memory of 4812 3676 ziSf7361.exe jr429829.exe PID 3676 wrote to memory of 4812 3676 ziSf7361.exe jr429829.exe PID 3676 wrote to memory of 5008 3676 ziSf7361.exe ku584460.exe PID 3676 wrote to memory of 5008 3676 ziSf7361.exe ku584460.exe PID 3676 wrote to memory of 5008 3676 ziSf7361.exe ku584460.exe PID 5008 wrote to memory of 1516 5008 ku584460.exe 1.exe PID 5008 wrote to memory of 1516 5008 ku584460.exe 1.exe PID 5008 wrote to memory of 1516 5008 ku584460.exe 1.exe PID 8 wrote to memory of 5852 8 7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exe lr355357.exe PID 8 wrote to memory of 5852 8 7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exe lr355357.exe PID 8 wrote to memory of 5852 8 7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exe lr355357.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exe"C:\Users\Admin\AppData\Local\Temp\7b178e5987dd1091361b167177c89af42727cbbd7ad456cd85e28f8e2d3e6611.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSf7361.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSf7361.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr429829.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr429829.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku584460.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku584460.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 13844⤵
- Program crash
PID:5740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr355357.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr355357.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5852
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5008 -ip 50081⤵PID:5696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD55878c20bc3f9e0796fc8ae1fc7fc9805
SHA1bd3d8b374aa8178cde9e4468ac94f9d78d00cceb
SHA25648acf382889096b9995b38560d6afed7f5ec1491f5f6cf80aa6edf9da5fc96a0
SHA512055821527c2c731180723d34f019d99290532d9c2edaa52050d74da0566c35bc6b9af7787fa8861317981cd8cf243a17c97a39992003d2c7f89836f9a8b2fd44
-
Filesize
496KB
MD562a2a3cb079d758d48e7e1a15030a2ce
SHA15bdb3bf4888c72572497420f6c2ef4a42e2f169d
SHA256af5459adb7941ee4b590c46d3852bf9332f5fa37b2028954b753a09bc0305565
SHA5123e7cd189a11978d596f6303fc176d0240bd228d6769f2b8c53a46285c3b8caa222217579fa8177543329baa421f7f2a84782ff4321dee2e03c55ea313b401b5d
-
Filesize
11KB
MD5b3e29bbec2642d4a6159da83b12b8535
SHA180f47c0383c6281287cdefaf05e1b18e07625861
SHA2560fabb677e066e5c5dc45517ac13ab6da1c439e0e32cfab06eec7af6936a4a06e
SHA512ccbe1f0e796c66de541abbe962f37f5a06903b8eaa8c269913535a2e1ccb55d7fbaa8d0a01ebdf85aa9613ad50e6fd898d1d879501469ab7852607302f0ee931
-
Filesize
414KB
MD50fbaea73440d1fa35b5ba8b740cb745e
SHA16108173b94839be790ff88576308fb8d75ffea02
SHA2563b80077b63f42c688fc956eeeb78c52ca4c506442072ac5d4e89154ce736cc16
SHA512a6e0da7d1bb35f3328d894809e85258fcba4c9c4b9490705609dd3cb557a61f4b04257b0a5cb0fe661971067d42cef0808bc7fa2a9bab6f7ae923f54b87a5ede
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0