Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 23:00
Static task
static1
Behavioral task
behavioral1
Sample
824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exe
Resource
win10v2004-20241007-en
General
-
Target
824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exe
-
Size
652KB
-
MD5
551e3ff29b3a8a903da82a09d7819def
-
SHA1
f9586e7659b3bb55e0e7b41c008591cc9f015f80
-
SHA256
824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2
-
SHA512
559488103192701bc169e2f8df4c5f6b69ed7da21eb19793817b3924dc27be3c506c0e5ad5791dafaa01226e3b6306e41917d8a5738c2c676a277277c09697a4
-
SSDEEP
12288:fMr9y90KRd315oqodEwo+TGJBiWryfPHM+Vx1FhnfBQGQn:my53XGLPs0F0Zn
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr763315.exe healer behavioral1/memory/2396-15-0x0000000000AA0000-0x0000000000AAA000-memory.dmp healer -
Healer family
-
Processes:
jr763315.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr763315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr763315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr763315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr763315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr763315.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr763315.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4960-2105-0x0000000005530000-0x0000000005562000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5840-2118-0x0000000000490000-0x00000000004C0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr273681.exe family_redline behavioral1/memory/3292-2129-0x0000000000D40000-0x0000000000D6E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku423745.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ku423745.exe -
Executes dropped EXE 5 IoCs
Processes:
ziXz2156.exejr763315.exeku423745.exe1.exelr273681.exepid process 4464 ziXz2156.exe 2396 jr763315.exe 4960 ku423745.exe 5840 1.exe 3292 lr273681.exe -
Processes:
jr763315.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr763315.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exeziXz2156.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziXz2156.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6040 4960 WerFault.exe ku423745.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exeziXz2156.exeku423745.exe1.exelr273681.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziXz2156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku423745.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr273681.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr763315.exepid process 2396 jr763315.exe 2396 jr763315.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr763315.exeku423745.exedescription pid process Token: SeDebugPrivilege 2396 jr763315.exe Token: SeDebugPrivilege 4960 ku423745.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exeziXz2156.exeku423745.exedescription pid process target process PID 4104 wrote to memory of 4464 4104 824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exe ziXz2156.exe PID 4104 wrote to memory of 4464 4104 824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exe ziXz2156.exe PID 4104 wrote to memory of 4464 4104 824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exe ziXz2156.exe PID 4464 wrote to memory of 2396 4464 ziXz2156.exe jr763315.exe PID 4464 wrote to memory of 2396 4464 ziXz2156.exe jr763315.exe PID 4464 wrote to memory of 4960 4464 ziXz2156.exe ku423745.exe PID 4464 wrote to memory of 4960 4464 ziXz2156.exe ku423745.exe PID 4464 wrote to memory of 4960 4464 ziXz2156.exe ku423745.exe PID 4960 wrote to memory of 5840 4960 ku423745.exe 1.exe PID 4960 wrote to memory of 5840 4960 ku423745.exe 1.exe PID 4960 wrote to memory of 5840 4960 ku423745.exe 1.exe PID 4104 wrote to memory of 3292 4104 824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exe lr273681.exe PID 4104 wrote to memory of 3292 4104 824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exe lr273681.exe PID 4104 wrote to memory of 3292 4104 824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exe lr273681.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exe"C:\Users\Admin\AppData\Local\Temp\824b6c5f2aa9b8c714330f7ed8f3537c4e02cbbe09a55f5ae24e9fc0cc04eab2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXz2156.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXz2156.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr763315.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr763315.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku423745.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku423745.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 12124⤵
- Program crash
PID:6040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr273681.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr273681.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4960 -ip 49601⤵PID:5992
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5ba3f00004cfe1164b02c3863779c4268
SHA153ad3f021aa83440dc7cc10ac5fb863c1479c729
SHA256bc8f31cc9850bc55a324403026a8cda5cdc0d31256ff2d745620611235b7df91
SHA5125ff78a93a1aca77d6c1b3ee38d10afde3bc521f78aadea0954163d1c262c59edbb31cc5c952b36264dadb08703542e862dde19318f7047459cf944ecb546ec13
-
Filesize
498KB
MD5498236c6adc42d2adefddc0bced1a97c
SHA143e442322260b2af0942e0d96c6615ecceaa7b56
SHA25641a0a2073e1a06ecc03c706cc33d4cfcd0263ada7ac1b1d64b999e094ba76111
SHA512d5fe5853e9712083c3b4580122ea4a3b44a952bb997f3e60a24fd17dfb330fc3fc2f564d40f70aa9f2b9bce7d6c0393f5481b7faa37329e35d7fab2a673c6e08
-
Filesize
12KB
MD52d07720b3851869833800d165c95579a
SHA1cfc54f244e1e96cd5f66631c1f5672a09bfcde68
SHA256e312063f05c3a2d09e39e88f3e58ad0ea5ff10d83c4028d2eb6b449bcbde3621
SHA512061f50f5ed64058141e969a736dd3959ae9088dbb5c7882371a3d2a7ffb8c678e1b406bc5a9f044248f7f855430bbe2c22c9551dc67451bc032d254860f83080
-
Filesize
417KB
MD5c5a5fc0665485b0db44833591709bc63
SHA1b51e7e448e73996d58b7001a988b340c6168227e
SHA256c518ba43a3ecb4035ae83f68707dc7d911d8cde902570aa21e3efb537544c92c
SHA512ed29f972ca1021acbf885fa508b1274cc48805e97f73c17e42ef4eb5bd635541868351fbf0db29f6ed1a21ad7b4af327c17d79ddabdd7d7bbe5988469b683745
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0