Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 21:05
Static task
static1
Behavioral task
behavioral1
Sample
d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exe
Resource
win10v2004-20241007-en
General
-
Target
d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exe
-
Size
660KB
-
MD5
b79bea7587e456f0465a048ec696d1f2
-
SHA1
8fcb5b2c510778593c4b9cec47f8fcb44b5f6b34
-
SHA256
d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2
-
SHA512
2503d30701d6f19876e3d9d9e3a8c7181ede098ee384987c1bd784b584e2fd2c521afe4828aa040153dfc568c8354cad0cefb5c2bc705441afa2eef5b54eb6c4
-
SSDEEP
12288:OMrmy90hyjtvUiBG2hErmOvNZ79jBf9bydZYzU2zKSzc6AuEQsn8oUmXW:kyWsRUi0YOFZhjBMyA2zKEGcskcW
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr588035.exe healer behavioral1/memory/4508-15-0x0000000000480000-0x000000000048A000-memory.dmp healer -
Healer family
-
Processes:
jr588035.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr588035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr588035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr588035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr588035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr588035.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr588035.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/5024-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/624-2118-0x00000000007C0000-0x00000000007F0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr596120.exe family_redline behavioral1/memory/2628-2129-0x0000000000C80000-0x0000000000CAE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku062133.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ku062133.exe -
Executes dropped EXE 5 IoCs
Processes:
ziEC4892.exejr588035.exeku062133.exe1.exelr596120.exepid process 1996 ziEC4892.exe 4508 jr588035.exe 5024 ku062133.exe 624 1.exe 2628 lr596120.exe -
Processes:
jr588035.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr588035.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exeziEC4892.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEC4892.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3948 5024 WerFault.exe ku062133.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku062133.exe1.exelr596120.exed142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exeziEC4892.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku062133.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr596120.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziEC4892.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr588035.exepid process 4508 jr588035.exe 4508 jr588035.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr588035.exeku062133.exedescription pid process Token: SeDebugPrivilege 4508 jr588035.exe Token: SeDebugPrivilege 5024 ku062133.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exeziEC4892.exeku062133.exedescription pid process target process PID 100 wrote to memory of 1996 100 d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exe ziEC4892.exe PID 100 wrote to memory of 1996 100 d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exe ziEC4892.exe PID 100 wrote to memory of 1996 100 d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exe ziEC4892.exe PID 1996 wrote to memory of 4508 1996 ziEC4892.exe jr588035.exe PID 1996 wrote to memory of 4508 1996 ziEC4892.exe jr588035.exe PID 1996 wrote to memory of 5024 1996 ziEC4892.exe ku062133.exe PID 1996 wrote to memory of 5024 1996 ziEC4892.exe ku062133.exe PID 1996 wrote to memory of 5024 1996 ziEC4892.exe ku062133.exe PID 5024 wrote to memory of 624 5024 ku062133.exe 1.exe PID 5024 wrote to memory of 624 5024 ku062133.exe 1.exe PID 5024 wrote to memory of 624 5024 ku062133.exe 1.exe PID 100 wrote to memory of 2628 100 d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exe lr596120.exe PID 100 wrote to memory of 2628 100 d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exe lr596120.exe PID 100 wrote to memory of 2628 100 d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exe lr596120.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exe"C:\Users\Admin\AppData\Local\Temp\d142597063d92c410ee45a0bd38d73c4ea3f88b45acac304760c39b6243d5cc2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEC4892.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEC4892.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr588035.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr588035.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku062133.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku062133.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 13684⤵
- Program crash
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr596120.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr596120.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2628
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5024 -ip 50241⤵PID:2116
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD579707e2c26d4a70c8eceebaa1b19ba7c
SHA10743c3be0149fb893fb18097d3f0c15247df7bf3
SHA2564bee589ddf43ccbf744e421905e67f422860b583dcce47cf047bf09489e4e5bc
SHA51207bfed388497145d3fae7d67cf36cbd0d4fef5cb8823b7fce0a7d385806d83e00e6bdbcc1dc0585a4c6efdbd4652baa65a8492be05b926ef52c825ddb65578ae
-
Filesize
507KB
MD5396f3ca19b50d5ec97fbe0661ea2f6d6
SHA17e43d6eafa19bc9de957d87fe962781dbd24096b
SHA2566888a6ac2b5e77a7c3c00364ae311408ae166f09d7bd4ced0d0f8ac7b9fbd448
SHA51268cf972cc074e60eda58356d95510fef379f223f818948db49e7390a5987e12bb66b49bfc7f88db06229efd58b8d7bf1f7a229f442bb2367f87fc5c501fb750d
-
Filesize
11KB
MD5bcb8f3176d57bd8736316ff7a3ea491c
SHA16dd586e769c8d8db0231bfc4c2b385bac997915d
SHA256ef05562f52d85481e5e0c01216e5679b5c3dc050608e54a0465c1624c0b5c836
SHA5121615b0cf05af68063d9d10add1d4c9d9d0c9d390811db887b76c26670dd5971efd57cdeaf4e37f16180a9884f54dca1d51e2a133e9b20da97e774c3a250ac311
-
Filesize
435KB
MD513faff51bbcc059fdc89a09edef2afe6
SHA1c65506e9384fa6f6884cbb2fd238e96fd6f71aca
SHA25685d25c5c7f8459426efdd87068ebbdef5529af96da95e3568e7581424e8435a2
SHA5126c7bfe6696399ab5a918a8af2efc68f31ab7ec1846563a748535aa625b8dd70990a7998f302826a26d03c1b8195e4fa61e4bf03c9bf5f03127292f43b6ee0759
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0