Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:44
Static task
static1
Behavioral task
behavioral1
Sample
3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe
Resource
win10v2004-20241007-en
General
-
Target
3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe
-
Size
652KB
-
MD5
2015658e2c14f39fecdda32b59925c51
-
SHA1
262795609ba6b226435e68500b7630a1d6bc3c29
-
SHA256
3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a
-
SHA512
c693a4309f4a1636aae50c097d15259372516ab22a9ed11ee441819408a1aa625e32959135bfb06b71ed4167f4fa9c0cea14da409507b3e41d0508600ef11728
-
SSDEEP
12288:6Mrhy90xmFC3ubkSIga2KotTBNJiornNP7nNV7eK6vah:bymubGglZLPrCK6vah
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486253.exe healer behavioral1/memory/184-15-0x0000000000390000-0x000000000039A000-memory.dmp healer -
Healer family
-
Processes:
jr486253.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr486253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr486253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr486253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr486253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr486253.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr486253.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1248-2105-0x0000000004CB0000-0x0000000004CE2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3180-2118-0x0000000000010000-0x0000000000040000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr314476.exe family_redline behavioral1/memory/4304-2129-0x0000000000660000-0x000000000068E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku855033.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku855033.exe -
Executes dropped EXE 5 IoCs
Processes:
zimo2763.exejr486253.exeku855033.exe1.exelr314476.exepid process 4576 zimo2763.exe 184 jr486253.exe 1248 ku855033.exe 3180 1.exe 4304 lr314476.exe -
Processes:
jr486253.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr486253.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exezimo2763.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zimo2763.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4504 1248 WerFault.exe ku855033.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exezimo2763.exeku855033.exe1.exelr314476.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zimo2763.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku855033.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr314476.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr486253.exepid process 184 jr486253.exe 184 jr486253.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr486253.exeku855033.exedescription pid process Token: SeDebugPrivilege 184 jr486253.exe Token: SeDebugPrivilege 1248 ku855033.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exezimo2763.exeku855033.exedescription pid process target process PID 2860 wrote to memory of 4576 2860 3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe zimo2763.exe PID 2860 wrote to memory of 4576 2860 3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe zimo2763.exe PID 2860 wrote to memory of 4576 2860 3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe zimo2763.exe PID 4576 wrote to memory of 184 4576 zimo2763.exe jr486253.exe PID 4576 wrote to memory of 184 4576 zimo2763.exe jr486253.exe PID 4576 wrote to memory of 1248 4576 zimo2763.exe ku855033.exe PID 4576 wrote to memory of 1248 4576 zimo2763.exe ku855033.exe PID 4576 wrote to memory of 1248 4576 zimo2763.exe ku855033.exe PID 1248 wrote to memory of 3180 1248 ku855033.exe 1.exe PID 1248 wrote to memory of 3180 1248 ku855033.exe 1.exe PID 1248 wrote to memory of 3180 1248 ku855033.exe 1.exe PID 2860 wrote to memory of 4304 2860 3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe lr314476.exe PID 2860 wrote to memory of 4304 2860 3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe lr314476.exe PID 2860 wrote to memory of 4304 2860 3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe lr314476.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe"C:\Users\Admin\AppData\Local\Temp\3dbd56cd475960dfa542e519818be5145c322b8376ebfba9b016256bc29f056a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimo2763.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimo2763.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486253.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486253.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku855033.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku855033.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 12164⤵
- Program crash
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr314476.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr314476.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4304
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1248 -ip 12481⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5a7f03da2ea3edd4a3f5069b76c5aa18a
SHA15f7708954d7c76a4f51baf3974e25d46196b3b6a
SHA25663b4e5b522a71813d21a5cf9abfd17f0e79683f37e64e1c09cb77487b1430718
SHA51267b76643755d9ab4f9b08ef162d8d45734ce9f420f12271a6f72a40c1e849ff3fcd2fbb04b5447ad5033c75c07fa64821bc844329c988ace12befc977edefb84
-
Filesize
498KB
MD5b696f74e005ac5f982a5b1c36bb69f67
SHA12e056ee14b4944a0117995bad10ffcedfe1e2f09
SHA256be9ab75290eb5e62fcbe9b2d654c671e57d06b19ac36ed6a0cf4f30bd35157a1
SHA5123706c888a19c78a0abd7c22cd3f96f21e2e3d28a19aa720a41304c39ab1a764f222bbee9060c5ab8fb2cce50c9c041aa50fd38ddc42af4137c8dea2162b01b79
-
Filesize
12KB
MD5380cf683b6ce839b6007431668e8842d
SHA1666e989816462e16b6171e1ab8e6a746503a1501
SHA256247bf21a7312bb2f96150bf5cbc296aad794dff6d647a0aabe0e3b9c7146880d
SHA5121c2e68f7a193f15907d21bf4187c6be041134211d96ca067a80a4c8ec008c0cd6315459ca59f0eaa1062f3ebcc71eeb98e7bedf06d576c79b4f537ee3f45b2dc
-
Filesize
417KB
MD56009ebec2b63136edfd5cbf1d87e0ca3
SHA1987d6bb7b979e1d42506ba58813416b0319cac86
SHA2561cecd3579ddbbec9a6b2cf202f78a6f650ec777af32bacdfd18f944baf36fbf5
SHA5127fb2131e07dffacf0ff6b15e8f2c24948d36883840d9c1f4501a5913190a654d7320ba0ac67ced964b7f8bceee82db4c062909f3baafd82af9602a61d82c42ec
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0