Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 09:05
Static task
static1
Behavioral task
behavioral1
Sample
fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exe
Resource
win10v2004-20241007-en
General
-
Target
fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exe
-
Size
685KB
-
MD5
57ec7ad57bc263bf7fa6639544ac19d5
-
SHA1
e1b1b2369394a7c233fa3e7c535e95d7ec97e022
-
SHA256
fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276
-
SHA512
7553c36b6953dd49714192bc3b4b9e0b32f2e623fe20f3056d2eb42080b9d30522002754749fd5b33edc93643a278c33e56b618a8f224ed8ef7ff6361f2c43c3
-
SSDEEP
12288:PMr+y90XFO5r7EOY1RGBG5O9854+I/wbyuDQzG2xXNLL3dsoU5Sr7Yk46jL:py6Fa701sX/GvDcPFmjSrf46X
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr740490.exe healer behavioral1/memory/976-15-0x0000000000250000-0x000000000025A000-memory.dmp healer -
Healer family
-
Processes:
jr740490.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr740490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr740490.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr740490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr740490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr740490.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr740490.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1956-2105-0x00000000029D0000-0x0000000002A02000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1688-2118-0x0000000000490000-0x00000000004C0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr096053.exe family_redline behavioral1/memory/5788-2129-0x0000000000930000-0x000000000095E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku766107.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ku766107.exe -
Executes dropped EXE 5 IoCs
Processes:
ziLS2134.exejr740490.exeku766107.exe1.exelr096053.exepid process 4036 ziLS2134.exe 976 jr740490.exe 1956 ku766107.exe 1688 1.exe 5788 lr096053.exe -
Processes:
jr740490.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr740490.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exeziLS2134.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziLS2134.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5296 1956 WerFault.exe ku766107.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziLS2134.exeku766107.exe1.exelr096053.exefdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziLS2134.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku766107.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr096053.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr740490.exepid process 976 jr740490.exe 976 jr740490.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr740490.exeku766107.exedescription pid process Token: SeDebugPrivilege 976 jr740490.exe Token: SeDebugPrivilege 1956 ku766107.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exeziLS2134.exeku766107.exedescription pid process target process PID 1444 wrote to memory of 4036 1444 fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exe ziLS2134.exe PID 1444 wrote to memory of 4036 1444 fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exe ziLS2134.exe PID 1444 wrote to memory of 4036 1444 fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exe ziLS2134.exe PID 4036 wrote to memory of 976 4036 ziLS2134.exe jr740490.exe PID 4036 wrote to memory of 976 4036 ziLS2134.exe jr740490.exe PID 4036 wrote to memory of 1956 4036 ziLS2134.exe ku766107.exe PID 4036 wrote to memory of 1956 4036 ziLS2134.exe ku766107.exe PID 4036 wrote to memory of 1956 4036 ziLS2134.exe ku766107.exe PID 1956 wrote to memory of 1688 1956 ku766107.exe 1.exe PID 1956 wrote to memory of 1688 1956 ku766107.exe 1.exe PID 1956 wrote to memory of 1688 1956 ku766107.exe 1.exe PID 1444 wrote to memory of 5788 1444 fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exe lr096053.exe PID 1444 wrote to memory of 5788 1444 fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exe lr096053.exe PID 1444 wrote to memory of 5788 1444 fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exe lr096053.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exe"C:\Users\Admin\AppData\Local\Temp\fdee4771c45e840b3250ec197399bb32b9bfd9b42d45af11cb0bc4c5aca69276.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLS2134.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLS2134.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr740490.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr740490.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:976 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku766107.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku766107.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 15404⤵
- Program crash
PID:5296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr096053.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr096053.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5788
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1956 -ip 19561⤵PID:3968
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5d728a4a2a468aea18f3a77aa1794cd79
SHA1a6be10bb86e91812d58d44c38233133117385bbd
SHA256ce15d1ab81896558daa19f82638cdb8744634bd320beaafe501148afedcb8840
SHA512fea810e143fc107ec3bc6e6c27f776e558a8a7ec486194e817ed58f2b581e48a52c5cd6d132c5467517e3025db267a8396dbaa9f66e770c1f04e02f6485a8e3a
-
Filesize
530KB
MD5c24bd9ff547aed61a705a568f6b290ba
SHA1208347e9eaf0e84235f97be88b466ec5ba8395c8
SHA2564d8b534f66e2ba3a21484774d58544cff9565496c43a60b513f5704b962b6b2c
SHA51271da2682ecceb16ee207e79546492d96d9c77c28bce1827455f9001ad5908712d211ed2de8f20dc6ade60989278219e008d10fb8dfbd9db1d893dd5558abc362
-
Filesize
12KB
MD5fc56636fddc5c673739b0cf925673a16
SHA128d53d1d3dd551259d8282ccc77be730e5e606a9
SHA256d5e4e1d81dbf406aa88340e79ff7f26e0025de877349a1e76e4423c78db6172f
SHA512d812af388946cc2cc90afb75877ae5b50586de452e0161556fcb1dee8cd90417616c0a491cfc38fcbc02bd51ca0db16d73146d31dd322a10a5284569d01a537f
-
Filesize
495KB
MD582b0cd5b1eb1d71a070b2ecbfaa50418
SHA142b44e066d085173af5ebffa5e55b2bad7a5d987
SHA256e6ca3f8960401da537e2a5c9c7fdbc13744fe4c9da925ae8e6798cf021cf9f68
SHA51229ea8138b0e7b462bfba3a817a212da7313a5f0b01a25dc054c0b29beb65ae3b8f7b9c8ef3e0c87bc69a26f481903413c1a9d422439fc77468818a1dfb549b46
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0