Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 11:01
Static task
static1
Behavioral task
behavioral1
Sample
39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exe
Resource
win10v2004-20241007-en
General
-
Target
39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exe
-
Size
661KB
-
MD5
6457c87b4b5f4f1d9dc59d13ecf60ad5
-
SHA1
f5cd5db670e6dca7938e27e88a1a3a15bb049904
-
SHA256
39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93
-
SHA512
14780e319e3c0a13592912453fe7d31ac626b3a8a4a8cba2c3701575432a7889b3d6737a0c35cdcefec4619ebc2b2635b7614ba759a0667c8db5b85d903762e7
-
SSDEEP
12288:uMrSy906QhTpyjeFhci2v8fu6Z6jBf8by6GYzn2biSzcsq6FA2h683UJKBDlQ:oyxQ6KFhBfu6Z6jBuNb2biEGcA83UJey
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr517318.exe healer behavioral1/memory/4248-15-0x0000000000410000-0x000000000041A000-memory.dmp healer -
Healer family
-
Processes:
jr517318.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr517318.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr517318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr517318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr517318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr517318.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr517318.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3104-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5576-2118-0x0000000000F90000-0x0000000000FC0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr297433.exe family_redline behavioral1/memory/4836-2129-0x0000000000440000-0x000000000046E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku589154.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ku589154.exe -
Executes dropped EXE 5 IoCs
Processes:
ziAM6556.exejr517318.exeku589154.exe1.exelr297433.exepid process 4860 ziAM6556.exe 4248 jr517318.exe 3104 ku589154.exe 5576 1.exe 4836 lr297433.exe -
Processes:
jr517318.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr517318.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exeziAM6556.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAM6556.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6028 3104 WerFault.exe ku589154.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exeziAM6556.exeku589154.exe1.exelr297433.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziAM6556.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku589154.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr297433.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr517318.exepid process 4248 jr517318.exe 4248 jr517318.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr517318.exeku589154.exedescription pid process Token: SeDebugPrivilege 4248 jr517318.exe Token: SeDebugPrivilege 3104 ku589154.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exeziAM6556.exeku589154.exedescription pid process target process PID 1744 wrote to memory of 4860 1744 39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exe ziAM6556.exe PID 1744 wrote to memory of 4860 1744 39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exe ziAM6556.exe PID 1744 wrote to memory of 4860 1744 39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exe ziAM6556.exe PID 4860 wrote to memory of 4248 4860 ziAM6556.exe jr517318.exe PID 4860 wrote to memory of 4248 4860 ziAM6556.exe jr517318.exe PID 4860 wrote to memory of 3104 4860 ziAM6556.exe ku589154.exe PID 4860 wrote to memory of 3104 4860 ziAM6556.exe ku589154.exe PID 4860 wrote to memory of 3104 4860 ziAM6556.exe ku589154.exe PID 3104 wrote to memory of 5576 3104 ku589154.exe 1.exe PID 3104 wrote to memory of 5576 3104 ku589154.exe 1.exe PID 3104 wrote to memory of 5576 3104 ku589154.exe 1.exe PID 1744 wrote to memory of 4836 1744 39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exe lr297433.exe PID 1744 wrote to memory of 4836 1744 39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exe lr297433.exe PID 1744 wrote to memory of 4836 1744 39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exe lr297433.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exe"C:\Users\Admin\AppData\Local\Temp\39653a1cc2b56cd7730f583d451c84216f5d08f2d8885a942f9efd31df4b2b93.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAM6556.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAM6556.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr517318.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr517318.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku589154.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku589154.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5576 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3104 -s 12844⤵
- Program crash
PID:6028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr297433.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr297433.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4836
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3104 -ip 31041⤵PID:5384
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD57962536a7d8b796818ad8b5e72483f36
SHA16365053b23074c811705f4a61f39119c3866dfe7
SHA25612bdbeb42b3163a05052dbd3ae0b3b22f36caefae8b3ae0c243525417e960fb1
SHA512c79effbd612e48b68801778cc71497ed4e18b517383df894dc78ac031e9c098214928738d585f39abb94ac4ca11938801c16813110a41123873e695a0ff142df
-
Filesize
507KB
MD5375d0ee3a520d8ecde208f39f6f362c7
SHA103330090fadf37d1ed6afa6598f6a18fc50bcb9b
SHA2568e0960bfe2430fd45b9249578a4a8f774dc464de9379659caa0a84945b9fa0ed
SHA51249d095c61b39a1a1a79cb37b66c91c83e1682a10976e4d24899433fe2c0ed1065410707e1468b566287c9b7725f1efa861617d67120c11696aba927fe1fed599
-
Filesize
11KB
MD51c9e7d9df6cff1a6214da992f7c86f0d
SHA18d10f7d647e1c91c09e624c1a633ef01b7b35082
SHA2569138317a0f6af5aaabaf8c624e9540f06c66b1d20a20a7e428b49e94f51b9e1e
SHA512fd7a22ebb2ba13d351b0645ee362a4b470be14ced711c28ce96cda914b0a426c3552759ac18ed5d2a98a629a5975ef570c1dfb300686db2a2e8c94dcb856ad97
-
Filesize
435KB
MD5d820ca1d788d524a5092eac107832c1e
SHA16df2c073722e1814453e6ac28eda098479387891
SHA2564cdfed86e943897d16af9ab135e03a359dc6f722ebc3a08c3c5727ff1c7aa823
SHA512ea538dd3f53646a0ed6477795a3190beb72da71e06bf5e2644b84050285c23fccb36af6613a808705e7998183b95ad11aa0ca683d921ddb19f666179f4b25429
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0