Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:55
Static task
static1
Behavioral task
behavioral1
Sample
9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exe
Resource
win10v2004-20241007-en
General
-
Target
9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exe
-
Size
652KB
-
MD5
e2e085e94072b6c48741c164c32ada69
-
SHA1
f528f7502b343914a4b005eef1272009d8d6008b
-
SHA256
9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7
-
SHA512
b97a9ae3031765950fab469356b2b8ed39702fb281564e93c4b30236d7b5caf0a745e8369d09cdb11f2fe2ecb9e776db84c59dfecbd8ff9f072ee03fe854b876
-
SSDEEP
12288:HMr5y90/SoOG12Fwc2jooT0WNGiWriYPSqrV4R2xKBbR:ayNoyFkHaPrER
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr208662.exe healer behavioral1/memory/184-15-0x0000000000800000-0x000000000080A000-memory.dmp healer -
Healer family
-
Processes:
jr208662.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr208662.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr208662.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr208662.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr208662.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr208662.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr208662.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4864-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5740-2118-0x0000000000230000-0x0000000000260000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr510564.exe family_redline behavioral1/memory/3528-2129-0x0000000000310000-0x000000000033E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku647936.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku647936.exe -
Executes dropped EXE 5 IoCs
Processes:
ziRm1421.exejr208662.exeku647936.exe1.exelr510564.exepid process 452 ziRm1421.exe 184 jr208662.exe 4864 ku647936.exe 5740 1.exe 3528 lr510564.exe -
Processes:
jr208662.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr208662.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziRm1421.exe9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziRm1421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3620 4864 WerFault.exe ku647936.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exeziRm1421.exeku647936.exe1.exelr510564.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziRm1421.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku647936.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr510564.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr208662.exepid process 184 jr208662.exe 184 jr208662.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr208662.exeku647936.exedescription pid process Token: SeDebugPrivilege 184 jr208662.exe Token: SeDebugPrivilege 4864 ku647936.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exeziRm1421.exeku647936.exedescription pid process target process PID 4636 wrote to memory of 452 4636 9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exe ziRm1421.exe PID 4636 wrote to memory of 452 4636 9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exe ziRm1421.exe PID 4636 wrote to memory of 452 4636 9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exe ziRm1421.exe PID 452 wrote to memory of 184 452 ziRm1421.exe jr208662.exe PID 452 wrote to memory of 184 452 ziRm1421.exe jr208662.exe PID 452 wrote to memory of 4864 452 ziRm1421.exe ku647936.exe PID 452 wrote to memory of 4864 452 ziRm1421.exe ku647936.exe PID 452 wrote to memory of 4864 452 ziRm1421.exe ku647936.exe PID 4864 wrote to memory of 5740 4864 ku647936.exe 1.exe PID 4864 wrote to memory of 5740 4864 ku647936.exe 1.exe PID 4864 wrote to memory of 5740 4864 ku647936.exe 1.exe PID 4636 wrote to memory of 3528 4636 9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exe lr510564.exe PID 4636 wrote to memory of 3528 4636 9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exe lr510564.exe PID 4636 wrote to memory of 3528 4636 9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exe lr510564.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exe"C:\Users\Admin\AppData\Local\Temp\9059905fc0b09c4131495cb70cb8298973bfa35084e3c8064adc86d7269fe2b7.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRm1421.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRm1421.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr208662.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr208662.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku647936.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku647936.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 15604⤵
- Program crash
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr510564.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr510564.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3528
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4864 -ip 48641⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD59b2e4c2344ba64bffd3d2c6f4707926b
SHA174b15a4d4d0c769b23760f49e8c2047a2a6a7cb0
SHA256374258980efab47f0d5e9f33de98662f3e98cf7271e33c3881a666a66b8fd247
SHA512e37a400702ce3e11b8b5f5d990a9a5800c33f635ee79012329aee0578573f7222b61c80fba5fb4b461f6c383b952e4ca62ef48b08f3c3febac73bcf3914cb2ff
-
Filesize
498KB
MD5706300330f0454c16c33fd716c61e325
SHA1fb0486bba970e836eaa6f4e4025db9469db37b00
SHA256143c7a83150fd69408625e4b8ec253ee9af6783d37b8720ba1f9aadadd846935
SHA512115ae74c10596fd4ad9d6fff9a98ff5ffb18035a5817d1ed5dd45f78a8d6e36a515478a7f4d1f7c7f3f208e3bed2afc38ddbbd0a6d8f7b032c9f75aa23e8ab82
-
Filesize
12KB
MD56662ba1134c72ccf34df866bfd295a59
SHA15ce4955ea528eef7eb3d00676a80f10b04cd2f6b
SHA256f8917938655b1e02eff23007f81c00c18ad0a2802fd1ce537996b9a3bd256dad
SHA512aa2e664773b57996e447c3108ba262f4d871b7ca1ab55b95da08288704b475e61396c4fab59681fc18cca0263697e83bbcdc6e1a5fb39bcb9a835b61acacd906
-
Filesize
417KB
MD5aee26019006ac5fd57656322e4819990
SHA1a33d0a690f8ce1f7fcd7be21eb5cd7c98b67aa77
SHA2567e39b1bd4d08149b9fe2886e0c46f9b0dec6c65fcf2d262d6990007cdbab4dc6
SHA51267454841393cc51f560f13c7c5fcfa638f85a86ef1fde859374427c0d23f9c99a3a8405efcde160dae522f35736badf4d4a00c2b123e8e97b0e75b6467b53a9a
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0