Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 09:10
Static task
static1
Behavioral task
behavioral1
Sample
7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exe
Resource
win10v2004-20241007-en
General
-
Target
7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exe
-
Size
655KB
-
MD5
b3a55f06c06e42a856a1e9290abc2478
-
SHA1
6f4f54b56f90e9f5522e698ba0dcaa3615c6b2b9
-
SHA256
7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057
-
SHA512
0f1524f46a7e8231eb3202bc7595b34c1e16fa896490870b6b303db898a2fb08652704a3aec6d71d1b2cc85d5f77584a7d3bbde8723e4825692e8e86b6dee26e
-
SSDEEP
12288:2Mr/y90y9qXQ3ixHLUbmrEOcTIScDcZqMRurem:5yBSxH+XxTI7YUrL
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr711898.exe healer behavioral1/memory/5048-15-0x0000000000FC0000-0x0000000000FCA000-memory.dmp healer -
Healer family
-
Processes:
jr711898.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr711898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr711898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr711898.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr711898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr711898.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr711898.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/5076-2105-0x0000000005570000-0x00000000055A2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4992-2118-0x0000000000070000-0x00000000000A0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr789050.exe family_redline behavioral1/memory/5220-2129-0x0000000000E20000-0x0000000000E4E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku916776.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ku916776.exe -
Executes dropped EXE 5 IoCs
Processes:
zibM3796.exejr711898.exeku916776.exe1.exelr789050.exepid process 3844 zibM3796.exe 5048 jr711898.exe 5076 ku916776.exe 4992 1.exe 5220 lr789050.exe -
Processes:
jr711898.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr711898.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exezibM3796.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zibM3796.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6044 5076 WerFault.exe ku916776.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exelr789050.exe7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exezibM3796.exeku916776.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr789050.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zibM3796.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku916776.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr711898.exepid process 5048 jr711898.exe 5048 jr711898.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr711898.exeku916776.exedescription pid process Token: SeDebugPrivilege 5048 jr711898.exe Token: SeDebugPrivilege 5076 ku916776.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exezibM3796.exeku916776.exedescription pid process target process PID 3376 wrote to memory of 3844 3376 7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exe zibM3796.exe PID 3376 wrote to memory of 3844 3376 7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exe zibM3796.exe PID 3376 wrote to memory of 3844 3376 7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exe zibM3796.exe PID 3844 wrote to memory of 5048 3844 zibM3796.exe jr711898.exe PID 3844 wrote to memory of 5048 3844 zibM3796.exe jr711898.exe PID 3844 wrote to memory of 5076 3844 zibM3796.exe ku916776.exe PID 3844 wrote to memory of 5076 3844 zibM3796.exe ku916776.exe PID 3844 wrote to memory of 5076 3844 zibM3796.exe ku916776.exe PID 5076 wrote to memory of 4992 5076 ku916776.exe 1.exe PID 5076 wrote to memory of 4992 5076 ku916776.exe 1.exe PID 5076 wrote to memory of 4992 5076 ku916776.exe 1.exe PID 3376 wrote to memory of 5220 3376 7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exe lr789050.exe PID 3376 wrote to memory of 5220 3376 7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exe lr789050.exe PID 3376 wrote to memory of 5220 3376 7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exe lr789050.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exe"C:\Users\Admin\AppData\Local\Temp\7796b0ef9dde02a4c6732135c858ad21323c4d282416049b3380a82c9e94e057.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibM3796.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibM3796.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr711898.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr711898.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku916776.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku916776.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 13804⤵
- Program crash
PID:6044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr789050.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr789050.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5076 -ip 50761⤵PID:5856
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5e6b773a6db02c55a54bde49f4d667aa9
SHA15d2c6061b5644534b32248b3d051c826689697a4
SHA256eea89e42c1e641de75f1bd49d110a0694db6f6446232bb7d20a31ed5f6f81108
SHA5128975d5f50d3a5369928e7603d14f268f726d28f443af427c19add716f16de437a686deb8774e3ccf13e5244c0867a33abe671848ee9701a73e1efb006949eff8
-
Filesize
501KB
MD5338156d8159eb864344cfa96eab74f7f
SHA15b954c4240f4f1c3a5e41e39b13ba2349c77b279
SHA25655d7291d87831579174b81a019faf9c03c363601ac5082faf03e1d1f8d87bc5f
SHA512cf3fe6e7f6714ed04551c7d858f43f0dfc5f41fcc154f6059385ac0ccfcb5d95051049eb4b9ca70aac1a4eab8fdfef47f985468df21aac61bc4362c31f2b2b97
-
Filesize
11KB
MD5db880bd51eddd881f8d451ea5ab34138
SHA10d9b6db84da30017658c152bd5edee88aa9482bb
SHA2568f5e93ebc4b7d0d799607aa74b072ef4d9d0911f0e16cc3c004afc005bd070c5
SHA512814dd075e594810b8c2b589686d97339cea200f82482d0b9a1a9d4477b30233218d814046c216fc503a3d99d0775484ed58a7b09f9ec2059e85eb82f58a87d98
-
Filesize
424KB
MD5792b81dc1b5935b6c3f66fb2ccd0333a
SHA1b721bdf5b171f435587ab7b157a6606ceb01b552
SHA256710ce233d479704cfa9ab9ff9edc0262f9825d88e44b52afe0c8da7161f68c2c
SHA5120aadaec3bb96df0fba84740f1a4c3f0aebbec2c207cdcd29d472f47ca926c6af09a099528da77ac027345d770153b56b2756f7be7a9d633189f62af4dfde18b8
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0