Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:45
Static task
static1
Behavioral task
behavioral1
Sample
dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exe
Resource
win10v2004-20241007-en
General
-
Target
dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exe
-
Size
651KB
-
MD5
92afbd7eda07720d2cc5553806b98f5a
-
SHA1
8147863625e1bd793e5c85e2d137db687a88246d
-
SHA256
dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a
-
SHA512
20085a97bd320b6736de00232f1a955f87309a425654a71eb4b04fc801c99423f6ee0634901dace730f497bdba17eb76014558bce28f6e8763d7c6fb077a8b04
-
SSDEEP
12288:MMrXy90uNMdVh6siQRUMnpUfu9aKXBzWO3qUyRuC1uvS/zo:TyeH6sXuPu9aKXBiO3qRvuvS/c
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr200665.exe healer behavioral1/memory/4964-15-0x0000000000FA0000-0x0000000000FAA000-memory.dmp healer -
Healer family
-
Processes:
jr200665.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr200665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr200665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr200665.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr200665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr200665.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr200665.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2452-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5656-2118-0x0000000000730000-0x0000000000760000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr541564.exe family_redline behavioral1/memory/3480-2129-0x0000000000CD0000-0x0000000000CFE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku408313.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku408313.exe -
Executes dropped EXE 5 IoCs
Processes:
ziTB5529.exejr200665.exeku408313.exe1.exelr541564.exepid process 3448 ziTB5529.exe 4964 jr200665.exe 2452 ku408313.exe 5656 1.exe 3480 lr541564.exe -
Processes:
jr200665.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr200665.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exeziTB5529.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziTB5529.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6036 2452 WerFault.exe ku408313.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
lr541564.exedfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exeziTB5529.exeku408313.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr541564.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziTB5529.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku408313.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr200665.exepid process 4964 jr200665.exe 4964 jr200665.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr200665.exeku408313.exedescription pid process Token: SeDebugPrivilege 4964 jr200665.exe Token: SeDebugPrivilege 2452 ku408313.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exeziTB5529.exeku408313.exedescription pid process target process PID 4452 wrote to memory of 3448 4452 dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exe ziTB5529.exe PID 4452 wrote to memory of 3448 4452 dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exe ziTB5529.exe PID 4452 wrote to memory of 3448 4452 dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exe ziTB5529.exe PID 3448 wrote to memory of 4964 3448 ziTB5529.exe jr200665.exe PID 3448 wrote to memory of 4964 3448 ziTB5529.exe jr200665.exe PID 3448 wrote to memory of 2452 3448 ziTB5529.exe ku408313.exe PID 3448 wrote to memory of 2452 3448 ziTB5529.exe ku408313.exe PID 3448 wrote to memory of 2452 3448 ziTB5529.exe ku408313.exe PID 2452 wrote to memory of 5656 2452 ku408313.exe 1.exe PID 2452 wrote to memory of 5656 2452 ku408313.exe 1.exe PID 2452 wrote to memory of 5656 2452 ku408313.exe 1.exe PID 4452 wrote to memory of 3480 4452 dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exe lr541564.exe PID 4452 wrote to memory of 3480 4452 dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exe lr541564.exe PID 4452 wrote to memory of 3480 4452 dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exe lr541564.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exe"C:\Users\Admin\AppData\Local\Temp\dfcb92312dca8941c2e96bee96c60c7b82d4a02ed823eda7ef60f4ac4db78d2a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTB5529.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTB5529.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr200665.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr200665.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku408313.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku408313.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 13804⤵
- Program crash
PID:6036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr541564.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr541564.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2452 -ip 24521⤵PID:5944
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5d41fad25d767c8b5fd7e4e8376ba5404
SHA1b40a28786e0b1a598ea3bed290ca93b7b6dc52e0
SHA25693974fc52ae388f0e42300c143cfae17861856564f2022a7dcfee9cc49f42b49
SHA512d2c4af7212374300cf7a770365ff0b49e3f04d3e292da20054f64d7caa3f2ee438d8bfb6f9144b76ccebb3b167a23b5646f9ffa902474e595d919017d62362a8
-
Filesize
496KB
MD59763eb79f2c3b6ccddc1964895d43079
SHA19323d429d6b93dd208df92faba68127e53d55c92
SHA2562ca5ead9c2205e439f5a95fd080d0815ffbb608ff88a64eccddb45e651bbc7d8
SHA512a1cc6d90d9e4ac7fbebe8e6b482cdf1b02fe86059f189b78077556e003ec22340c83c69b95bccc4118d1918ab5f2334fed129fe9e3d11ba570a51dd9f776e377
-
Filesize
12KB
MD52ec4640232b1848ae68845f48a57f912
SHA1f104382796c69ca74f3c3305774819a738fc672f
SHA256a73dee9964005b1f37bf42680cb70acad7355ca2d481e0f4dd39036b870dd22e
SHA512db88d8f58550872a2a57bd2ae09900661ca92805f209652dc039f659a696da2b38e57f56fdf5922f50d968f4eada29361ef34fdf5b656c92867058f053a5be26
-
Filesize
414KB
MD5a04c75613f6ffc471bcea5ea1a6aa23f
SHA1bd28775457dd7a119c5f699a42b21b8030618471
SHA256c673a8e2b0124f864ad7e246660a52a394acf6a0de55ff4484a4a15634980fcc
SHA512b19383eac347c0bde798faf38a2bd3d465438a2c2e648afd7b4f22fc58d243e0c07104a1361de1e1001dd77744a9b739957e7c89e922dfac8581b0238ea908d4
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0