Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe
Resource
win10v2004-20241007-en
General
-
Target
06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe
-
Size
650KB
-
MD5
c8133683f1d0795b420f3b296c226626
-
SHA1
1e3c9a53b7392870b1e56f21abdaae4748d61ed2
-
SHA256
06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1
-
SHA512
1a2dd2915db03019d5d9ef95147bcc641c8d9ca6ac02db07f1ab03a50939223b7a7f7e7ff55c66fa1b6e570fbb25864dc44da27846e687eeb9eb905cb8f0b04f
-
SSDEEP
12288:KMrXy90aFKV/fmsmHmn9psgzMs+WG7Nv7xFmbZoldv8CxLAZGT:dypMdfVmmnHs0Ms+WGxDmNaUC+0
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr317609.exe healer behavioral1/memory/3516-14-0x0000000000850000-0x000000000085A000-memory.dmp healer -
Healer family
-
Processes:
jr317609.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr317609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr317609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr317609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr317609.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr317609.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr317609.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1964-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2180-2118-0x0000000000BA0000-0x0000000000BD0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr023535.exe family_redline behavioral1/memory/5228-2129-0x00000000002B0000-0x00000000002DE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku325481.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ku325481.exe -
Executes dropped EXE 5 IoCs
Processes:
ziuS3991.exejr317609.exeku325481.exe1.exelr023535.exepid process 4624 ziuS3991.exe 3516 jr317609.exe 1964 ku325481.exe 2180 1.exe 5228 lr023535.exe -
Processes:
jr317609.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr317609.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exeziuS3991.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziuS3991.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5356 1964 WerFault.exe ku325481.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exeziuS3991.exeku325481.exe1.exelr023535.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziuS3991.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku325481.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr023535.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr317609.exepid process 3516 jr317609.exe 3516 jr317609.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr317609.exeku325481.exedescription pid process Token: SeDebugPrivilege 3516 jr317609.exe Token: SeDebugPrivilege 1964 ku325481.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exeziuS3991.exeku325481.exedescription pid process target process PID 3504 wrote to memory of 4624 3504 06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe ziuS3991.exe PID 3504 wrote to memory of 4624 3504 06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe ziuS3991.exe PID 3504 wrote to memory of 4624 3504 06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe ziuS3991.exe PID 4624 wrote to memory of 3516 4624 ziuS3991.exe jr317609.exe PID 4624 wrote to memory of 3516 4624 ziuS3991.exe jr317609.exe PID 4624 wrote to memory of 1964 4624 ziuS3991.exe ku325481.exe PID 4624 wrote to memory of 1964 4624 ziuS3991.exe ku325481.exe PID 4624 wrote to memory of 1964 4624 ziuS3991.exe ku325481.exe PID 1964 wrote to memory of 2180 1964 ku325481.exe 1.exe PID 1964 wrote to memory of 2180 1964 ku325481.exe 1.exe PID 1964 wrote to memory of 2180 1964 ku325481.exe 1.exe PID 3504 wrote to memory of 5228 3504 06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe lr023535.exe PID 3504 wrote to memory of 5228 3504 06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe lr023535.exe PID 3504 wrote to memory of 5228 3504 06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe lr023535.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe"C:\Users\Admin\AppData\Local\Temp\06fb07db70ed4fb143cf2a0c48d5f7b412bf0c11ebdc4fbf07cb0c843bdae3a1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuS3991.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuS3991.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr317609.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr317609.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku325481.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku325481.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 15164⤵
- Program crash
PID:5356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr023535.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr023535.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1964 -ip 19641⤵PID:4544
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD561d9793c61e8b9dfa084d8053bdd97b3
SHA15ed697f1eaaccd4142060f4b457ac73fc08b3b5f
SHA256f519b2a6a2216b74f3ae7abbccc0fecb0a2908d9fd6542e80523a352c424efe4
SHA5120a141e6d9f6f2ea02832e411041cf1187b42f97efd9f848fa0a8e4ae1048ae206d5a66104604ff5dc14997d8d5a521d07f60b33bdb9539b7433250910c1e042f
-
Filesize
496KB
MD588a7a7ce3fc62c3015f1fc0d103fa278
SHA1d1b65b4b960a730d4b7e4288d3d4cc8ff9c3670b
SHA256e6230fb24f6998967ec9cba0acbf5e7870729c4084eaa92a0f233f5c7f432925
SHA51224e719ca806a7a1f1fd73e06532034ee07d3ceeba86e01e8b8ca9eee3442f8e798364006a76e450a51801c8580544702e59cdf826f17b486cc0f2f8b623d59a7
-
Filesize
11KB
MD5320b859c451a65d39cb84013e726cc10
SHA19c5cc544a8a2bcb0d86724bcc9e977fd9b204323
SHA2569f613630374a9f458c7a1217a79dbb5edb59bb6e23d9d3586f8e89ec575e7179
SHA51288949a070bb21cf0c3de9dbdf2f9f197ea101d1d37210819c0ab438d3453e794d1626aa21d97108a75f6d7ed0944939f81b1a5d9338bd8eb79caf0fba5846538
-
Filesize
414KB
MD5e1d3a5d4560eadf1b1166da92b81a744
SHA1c76d7ed5f577db9dc3ea767eb7734e394bdd1e1b
SHA25639f206cc6bd43bf3a0bbf27b3d840f306bf58b70097963faffa82598eed5fbe9
SHA5128998e85bfb8fcc63056a502edf51755b800a2af15f3d4952a15774130e642845c96f2977e474c3e49ab3e527a272668f7a0ae6d4ba0b50d9efffe81cb55c0f66
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0