Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 21:48
Static task
static1
Behavioral task
behavioral1
Sample
350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exe
Resource
win10v2004-20241007-en
General
-
Target
350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exe
-
Size
660KB
-
MD5
702c5bdad3616ae003ac9baa08ae0fe8
-
SHA1
1a885bf679dcd8d5bf29b1864d3f563039f47c20
-
SHA256
350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be
-
SHA512
452a01a1440c49db628312405ec7088896795975933dfc53f62725a12063d2eb8c27db487b24ef3ff58b61fad2c9ee5ae462a8720521947da113686277afe535
-
SSDEEP
12288:nMrMy90acGZ4QInr79bPGkvtpxZ5jBfk9yZuYzi2QlSzckcWZjcmHkyHuN:ryI9QI9lVpxZ5jBvl22QlE7ZPHkye
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr000735.exe healer behavioral1/memory/4764-15-0x0000000000FD0000-0x0000000000FDA000-memory.dmp healer -
Healer family
-
Processes:
jr000735.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr000735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr000735.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr000735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr000735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr000735.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr000735.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1900-2105-0x00000000053F0000-0x0000000005422000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5288-2118-0x0000000000A10000-0x0000000000A40000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr379115.exe family_redline behavioral1/memory/4216-2129-0x0000000000530000-0x000000000055E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku084712.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ku084712.exe -
Executes dropped EXE 5 IoCs
Processes:
ziLG4931.exejr000735.exeku084712.exe1.exelr379115.exepid process 4940 ziLG4931.exe 4764 jr000735.exe 1900 ku084712.exe 5288 1.exe 4216 lr379115.exe -
Processes:
jr000735.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr000735.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exeziLG4931.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziLG4931.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4836 1900 WerFault.exe ku084712.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku084712.exe1.exelr379115.exe350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exeziLG4931.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku084712.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr379115.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziLG4931.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr000735.exepid process 4764 jr000735.exe 4764 jr000735.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr000735.exeku084712.exedescription pid process Token: SeDebugPrivilege 4764 jr000735.exe Token: SeDebugPrivilege 1900 ku084712.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exeziLG4931.exeku084712.exedescription pid process target process PID 4340 wrote to memory of 4940 4340 350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exe ziLG4931.exe PID 4340 wrote to memory of 4940 4340 350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exe ziLG4931.exe PID 4340 wrote to memory of 4940 4340 350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exe ziLG4931.exe PID 4940 wrote to memory of 4764 4940 ziLG4931.exe jr000735.exe PID 4940 wrote to memory of 4764 4940 ziLG4931.exe jr000735.exe PID 4940 wrote to memory of 1900 4940 ziLG4931.exe ku084712.exe PID 4940 wrote to memory of 1900 4940 ziLG4931.exe ku084712.exe PID 4940 wrote to memory of 1900 4940 ziLG4931.exe ku084712.exe PID 1900 wrote to memory of 5288 1900 ku084712.exe 1.exe PID 1900 wrote to memory of 5288 1900 ku084712.exe 1.exe PID 1900 wrote to memory of 5288 1900 ku084712.exe 1.exe PID 4340 wrote to memory of 4216 4340 350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exe lr379115.exe PID 4340 wrote to memory of 4216 4340 350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exe lr379115.exe PID 4340 wrote to memory of 4216 4340 350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exe lr379115.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exe"C:\Users\Admin\AppData\Local\Temp\350de3aae96c64eb3eb852998f56c33c101d812852afd2fe0ac133e9c5b050be.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLG4931.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLG4931.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr000735.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr000735.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku084712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku084712.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 13764⤵
- Program crash
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr379115.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr379115.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1900 -ip 19001⤵PID:2464
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5ad037d49047df4d4844672150cb6e27f
SHA1db445653e20c93cce8f0058db2e7f7cdcbce8300
SHA256f9fdd2b0b2ddc8b6135d9b70f2d38bbcebb517d606cf4ac109c126b8a738d95f
SHA512efb3c792e27280a418aafddbb30bba8d0765539867a6bf15fde89d1a9e3909b823b56e4008d932e1b4f5d22300bdee745d1cf26fc8ee09bacf3fb42c3297baf8
-
Filesize
507KB
MD5302a85c496615076c31e1758640a9afa
SHA15f8b275fe83f70f4adc1ac33645b93f8af56a9d5
SHA25670382d78e1576f745d7e3c78db5bf9932fac10d30b30cb20e4b2484ff9f5a510
SHA512e42523a16fb3e98f4b01ef2720cfd512ef353b8de5afa44a979d2ff01dfd919630e90dcedd0ca99a0bf80918609e34047bd897daf67e09b4ed939d5c078616dd
-
Filesize
11KB
MD5bc10444950d21b26c96dd7cd22bc474a
SHA160ae83f543574228e936173835dd0f7a4e5f477d
SHA25620b37582f208652a564a96fe3e427df330ec6a93782b19ec8dd26e02ea634757
SHA5127614db346d463430d6b7f79bf55a0e39cbbe7fa1c5548b6b4ce4cc670b67cfb1ddbf808dae7cd566d623c9329b734f6d16a18a13811bf77dc678d38f04713cc6
-
Filesize
435KB
MD52f29b93dfb8adb5f353f72fcca0bceb7
SHA1286192b5a4940948d13fe90eaf1e8ff75d4fd017
SHA2560c40a64e568ad5070a58f038cd7541d377059251fb0451e3e6624d9f2e27a4bf
SHA512abb2a155725847bc8426642d409639c07d7b3100fdbac2bac84af21f320ccfc7c62b19f7b68b5fa6c11ed79bb72bb04fc4ef3f2ce41a88005ba71b7bc4c9cd85
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0