Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 09:02
Static task
static1
Behavioral task
behavioral1
Sample
7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exe
Resource
win10v2004-20241007-en
General
-
Target
7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exe
-
Size
650KB
-
MD5
48d39fcb8437f51a593b494930c17b45
-
SHA1
ef57f4886eba439508e203b5a7878343349a493a
-
SHA256
7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a
-
SHA512
77c5b6613e4e2ec03d988ece983350f94898891771bb4498a76487aeb63af19011a7ec8072aa0009e9fb8f38e66bebe8fdbf2a34570cd019c408c52c2514ebd1
-
SSDEEP
12288:VMrty90h7UOYf8sLXMG1zau3rU/TGEGulXL4BIM/:MyUNYftYG1Ou3rG0uFL4WM/
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr706540.exe healer behavioral1/memory/3112-15-0x0000000000B20000-0x0000000000B2A000-memory.dmp healer -
Healer family
-
Processes:
jr706540.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr706540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr706540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr706540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr706540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr706540.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr706540.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4772-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/212-2118-0x0000000000620000-0x0000000000650000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr473324.exe family_redline behavioral1/memory/3568-2129-0x00000000008F0000-0x000000000091E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku281927.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku281927.exe -
Executes dropped EXE 5 IoCs
Processes:
ziTL5717.exejr706540.exeku281927.exe1.exelr473324.exepid process 3692 ziTL5717.exe 3112 jr706540.exe 4772 ku281927.exe 212 1.exe 3568 lr473324.exe -
Processes:
jr706540.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr706540.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exeziTL5717.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziTL5717.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5260 4772 WerFault.exe ku281927.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
lr473324.exe7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exeziTL5717.exeku281927.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr473324.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziTL5717.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku281927.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr706540.exepid process 3112 jr706540.exe 3112 jr706540.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr706540.exeku281927.exedescription pid process Token: SeDebugPrivilege 3112 jr706540.exe Token: SeDebugPrivilege 4772 ku281927.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exeziTL5717.exeku281927.exedescription pid process target process PID 2800 wrote to memory of 3692 2800 7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exe ziTL5717.exe PID 2800 wrote to memory of 3692 2800 7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exe ziTL5717.exe PID 2800 wrote to memory of 3692 2800 7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exe ziTL5717.exe PID 3692 wrote to memory of 3112 3692 ziTL5717.exe jr706540.exe PID 3692 wrote to memory of 3112 3692 ziTL5717.exe jr706540.exe PID 3692 wrote to memory of 4772 3692 ziTL5717.exe ku281927.exe PID 3692 wrote to memory of 4772 3692 ziTL5717.exe ku281927.exe PID 3692 wrote to memory of 4772 3692 ziTL5717.exe ku281927.exe PID 4772 wrote to memory of 212 4772 ku281927.exe 1.exe PID 4772 wrote to memory of 212 4772 ku281927.exe 1.exe PID 4772 wrote to memory of 212 4772 ku281927.exe 1.exe PID 2800 wrote to memory of 3568 2800 7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exe lr473324.exe PID 2800 wrote to memory of 3568 2800 7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exe lr473324.exe PID 2800 wrote to memory of 3568 2800 7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exe lr473324.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exe"C:\Users\Admin\AppData\Local\Temp\7c2f49b7ffc1d7310cf598e39ab0d79ec16e4ff67e7a048d34f259c7424c723a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTL5717.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTL5717.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr706540.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr706540.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku281927.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku281927.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:212 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 13764⤵
- Program crash
PID:5260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr473324.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr473324.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4772 -ip 47721⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5409db219a71ed80f6e7cbeb7aa818326
SHA10c641b2d4ab013fb35e9655e6dd18ff0420bc505
SHA256483b64dba1884e14c7dc482cc29c7de6b2158760fdc0cf147574a7865055a5e9
SHA512bdda6553664baa4fc554bcf7593211fb8faccb0563447935e61156d7c94213824a6ad4ba9c7b965dd60cd52b7d0a8580112e5ab31fe9bff6a632f59684b61076
-
Filesize
496KB
MD54904265def010380cbb694d2e0bd3d01
SHA1ca9c22085aa9db40f16c8a550741da3d7ce2029a
SHA256ad1ec45b8763d19bc4e2e9bd54dde22d4350464234014300ec7971f4583d026c
SHA512354952cb73521ec60a336a22ad6ee5de51ee1465f3dec05125b068510d1b679f360165bf8ce9fcac9cfa010765e2b76b11e2e5afd9ff952c5ecbb9af03fcfd4a
-
Filesize
12KB
MD5632f796b507281c72ff8971a87ee7853
SHA14dfc4967c8f568249db816a2285d7a3c1782c246
SHA256b5f63828d65a1323422bb6c977c149ae578eafb58df6787149064b91d69ea720
SHA51228f89dc50ff60934e234af3e2e8681e666ec3c67af371b9576c200ba79c9ae027d5c300b41655f3c4373047092f2fcbf73d026e59feadccf3bc3f9dd6a990709
-
Filesize
414KB
MD5aa68f56497414acde2005df63acc3e7a
SHA1aed993cef42069d57e909c2ee4fd7b8fb1a6d88f
SHA256f04a11badcf6f26b1fab80462392a5e16183d6f35c9238f521fd6889e4e37cae
SHA5126ec55bc1e6bd5f6fd9cf91086c71c54d250b260d6f61ef89bd084adc28406700d2feb187d66d6bed0e3faaa1ad7ef88e2d6e58c65182389c8f76ecf48dd7bb14
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0