Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
3661ef5a90efea60e4b63317cc2217f43710e41dcfc344131d1c0f3af8dcc7a3.exe
Resource
win10v2004-20241007-en
General
-
Target
3661ef5a90efea60e4b63317cc2217f43710e41dcfc344131d1c0f3af8dcc7a3.exe
-
Size
925KB
-
MD5
b5cd0d2cd6dc1c087a84a9f09db3cbae
-
SHA1
92ee3fbcf7fe6777b1c03272416e12b5842228e9
-
SHA256
3661ef5a90efea60e4b63317cc2217f43710e41dcfc344131d1c0f3af8dcc7a3
-
SHA512
4856251ae0f404dc4d94dc8e4df9c31174f5e6df180e7e81c3a5cc928b68b61d9022150f75533e0926a0b10a0e68c666f01d8bc31211c0bcd0e8f90e1e1a3ce5
-
SSDEEP
24576:gypy1t3R32n/q0HuMeUD/lHK0JyHAYwNodk:npythGn/qWuCvyHAYf
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c88-20.dat healer behavioral1/memory/4048-22-0x0000000000AB0000-0x0000000000ABA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it596566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it596566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it596566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it596566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it596566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it596566.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4988-2112-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x0007000000023c8d-2117.dat family_redline behavioral1/memory/436-2125-0x0000000000470000-0x00000000004A0000-memory.dmp family_redline behavioral1/files/0x0007000000023c86-2134.dat family_redline behavioral1/memory/1596-2136-0x0000000000C80000-0x0000000000CAE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation jr167638.exe -
Executes dropped EXE 6 IoCs
pid Process 2044 ziwJ7307.exe 1972 ziQn3495.exe 4048 it596566.exe 4988 jr167638.exe 436 1.exe 1596 kp271627.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it596566.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3661ef5a90efea60e4b63317cc2217f43710e41dcfc344131d1c0f3af8dcc7a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziwJ7307.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziQn3495.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2576 4988 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3661ef5a90efea60e4b63317cc2217f43710e41dcfc344131d1c0f3af8dcc7a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziwJ7307.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziQn3495.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr167638.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp271627.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4048 it596566.exe 4048 it596566.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4048 it596566.exe Token: SeDebugPrivilege 4988 jr167638.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2044 2908 3661ef5a90efea60e4b63317cc2217f43710e41dcfc344131d1c0f3af8dcc7a3.exe 83 PID 2908 wrote to memory of 2044 2908 3661ef5a90efea60e4b63317cc2217f43710e41dcfc344131d1c0f3af8dcc7a3.exe 83 PID 2908 wrote to memory of 2044 2908 3661ef5a90efea60e4b63317cc2217f43710e41dcfc344131d1c0f3af8dcc7a3.exe 83 PID 2044 wrote to memory of 1972 2044 ziwJ7307.exe 84 PID 2044 wrote to memory of 1972 2044 ziwJ7307.exe 84 PID 2044 wrote to memory of 1972 2044 ziwJ7307.exe 84 PID 1972 wrote to memory of 4048 1972 ziQn3495.exe 86 PID 1972 wrote to memory of 4048 1972 ziQn3495.exe 86 PID 1972 wrote to memory of 4988 1972 ziQn3495.exe 99 PID 1972 wrote to memory of 4988 1972 ziQn3495.exe 99 PID 1972 wrote to memory of 4988 1972 ziQn3495.exe 99 PID 4988 wrote to memory of 436 4988 jr167638.exe 104 PID 4988 wrote to memory of 436 4988 jr167638.exe 104 PID 4988 wrote to memory of 436 4988 jr167638.exe 104 PID 2044 wrote to memory of 1596 2044 ziwJ7307.exe 111 PID 2044 wrote to memory of 1596 2044 ziwJ7307.exe 111 PID 2044 wrote to memory of 1596 2044 ziwJ7307.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\3661ef5a90efea60e4b63317cc2217f43710e41dcfc344131d1c0f3af8dcc7a3.exe"C:\Users\Admin\AppData\Local\Temp\3661ef5a90efea60e4b63317cc2217f43710e41dcfc344131d1c0f3af8dcc7a3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwJ7307.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwJ7307.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQn3495.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQn3495.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it596566.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it596566.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr167638.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr167638.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:436
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 14965⤵
- Program crash
PID:2576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp271627.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp271627.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4988 -ip 49881⤵PID:4044
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661KB
MD5a2b71dedbb6e9a59eff56ecc689b40e6
SHA1dc041f5977e80a077199aa9b9ac8f1497388b8d9
SHA2565e79ab98645b43e05d428dca2c05be3da52e5becfb9044bfa00f7399b7142fa1
SHA512dba4d16012c8d9bd984b5770a9c71085fdf7389bdad2123ad2ec4740375c40e9f906504db5bb377cc1c6923e035dded3934fdedb248eb1b513a450c318aaf123
-
Filesize
168KB
MD5ec20bca1f6f3fe753c601f2070e04d0b
SHA1523eff8f5f29ae30215ca09791b81e82f6f22f48
SHA2562827137b28df5f76d8b419fe5ca3b3d1cb25aba5ae1123887db7f6ebeae1a940
SHA512eab93d78fb88efd344940fa81e89e674f0ef2e9565ce93273dd79a598c955b10ea46a185cf001ba0b733676e8e7953e7d5adfebdd5780e0cfd612c285dcf0372
-
Filesize
506KB
MD5c1f261e374899652dad922147c6b0fbe
SHA1464145ee617bac639aa048fe552ac5a7604622f9
SHA25612ef6dd84cc932867e50a30247cd4643993d9e95eebde4cb1c6313afddc308f7
SHA512d7af3ed3a4fd7031ace410663a010763924309f272f58cc2b93e9bce85aa59b06c5a9a8b240511dbdb8fdf715a31ec7437e2c595bd616ae407363bd165642060
-
Filesize
15KB
MD58957e89a71daeda5a21fc533ce2f6e5a
SHA1f947786f1ad889d0f5654a988c3de76438e57059
SHA25638cef55dbfba331cb1dba4d3d14013553bbf878a54436b1ebc9c9bbbd10cc76d
SHA5124f34a5556b75620b5db1f3a730e009c35aee5f7a9e765e80b8c3222a58c5fd06607dd5f54e429835904efe3a3ff4f291edc4642238fe58c4dd0347d41b04c76f
-
Filesize
426KB
MD59237d6e8dc594666c6a1dea9bfaad403
SHA1c8cb497ec3a646a3fb346be0d89634ccc34a24a2
SHA25630b915a9f4972d58cf43e1d6a56061049e5abc9149181282db9ddb21e73df079
SHA512392d6bc2f71cb2df0d3f06d671c5266ba4a4e5e6906941cffb7ca81386e79f8113791f5e9f8a5e6cfc58533e2cc8db53589311e0d62c8110f089f39c7cb1338e
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0