Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 10:48
Static task
static1
Behavioral task
behavioral1
Sample
ae291ae2497c7d4f82cf1095b2e503414fb73e1f56591bce8a3c4ac811c900c9.exe
Resource
win10v2004-20241007-en
General
-
Target
ae291ae2497c7d4f82cf1095b2e503414fb73e1f56591bce8a3c4ac811c900c9.exe
-
Size
1.0MB
-
MD5
c3406e40f06290a695a2529d4e38802a
-
SHA1
3d8238cfd9de90903036c833b747b22639b38037
-
SHA256
ae291ae2497c7d4f82cf1095b2e503414fb73e1f56591bce8a3c4ac811c900c9
-
SHA512
717a1e608bffc71292bf3ac8cf4125afe6ca43d37b61b2faeb182e5f8794b3acdc7eff0b40b748b4103485e912670cb8e408b6d99849b48217fee130e894fd10
-
SSDEEP
24576:ZygaV4+f3CAAVFPNE26B+ECJXyfvVXQvUEKQnw7:MgEB3CAAzNEgpQ3VXQUsnw
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it997519.exe healer behavioral1/memory/2164-22-0x0000000000010000-0x000000000001A000-memory.dmp healer -
Healer family
-
Processes:
it997519.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it997519.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it997519.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it997519.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it997519.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it997519.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it997519.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2908-2174-0x0000000002B10000-0x0000000002B42000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/952-2187-0x0000000000F00000-0x0000000000F2E000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp633924.exe family_redline behavioral1/memory/5840-2198-0x0000000000DD0000-0x0000000000E00000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr391972.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation jr391972.exe -
Executes dropped EXE 6 IoCs
Processes:
ziga7958.exezijX0259.exeit997519.exejr391972.exe1.exekp633924.exepid process 700 ziga7958.exe 5116 zijX0259.exe 2164 it997519.exe 2908 jr391972.exe 952 1.exe 5840 kp633924.exe -
Processes:
it997519.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it997519.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
ziga7958.exezijX0259.exeae291ae2497c7d4f82cf1095b2e503414fb73e1f56591bce8a3c4ac811c900c9.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziga7958.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zijX0259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ae291ae2497c7d4f82cf1095b2e503414fb73e1f56591bce8a3c4ac811c900c9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5736 2908 WerFault.exe jr391972.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exekp633924.exeae291ae2497c7d4f82cf1095b2e503414fb73e1f56591bce8a3c4ac811c900c9.exeziga7958.exezijX0259.exejr391972.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp633924.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae291ae2497c7d4f82cf1095b2e503414fb73e1f56591bce8a3c4ac811c900c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziga7958.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zijX0259.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr391972.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
it997519.exepid process 2164 it997519.exe 2164 it997519.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
it997519.exejr391972.exedescription pid process Token: SeDebugPrivilege 2164 it997519.exe Token: SeDebugPrivilege 2908 jr391972.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
ae291ae2497c7d4f82cf1095b2e503414fb73e1f56591bce8a3c4ac811c900c9.exeziga7958.exezijX0259.exejr391972.exedescription pid process target process PID 1156 wrote to memory of 700 1156 ae291ae2497c7d4f82cf1095b2e503414fb73e1f56591bce8a3c4ac811c900c9.exe ziga7958.exe PID 1156 wrote to memory of 700 1156 ae291ae2497c7d4f82cf1095b2e503414fb73e1f56591bce8a3c4ac811c900c9.exe ziga7958.exe PID 1156 wrote to memory of 700 1156 ae291ae2497c7d4f82cf1095b2e503414fb73e1f56591bce8a3c4ac811c900c9.exe ziga7958.exe PID 700 wrote to memory of 5116 700 ziga7958.exe zijX0259.exe PID 700 wrote to memory of 5116 700 ziga7958.exe zijX0259.exe PID 700 wrote to memory of 5116 700 ziga7958.exe zijX0259.exe PID 5116 wrote to memory of 2164 5116 zijX0259.exe it997519.exe PID 5116 wrote to memory of 2164 5116 zijX0259.exe it997519.exe PID 5116 wrote to memory of 2908 5116 zijX0259.exe jr391972.exe PID 5116 wrote to memory of 2908 5116 zijX0259.exe jr391972.exe PID 5116 wrote to memory of 2908 5116 zijX0259.exe jr391972.exe PID 2908 wrote to memory of 952 2908 jr391972.exe 1.exe PID 2908 wrote to memory of 952 2908 jr391972.exe 1.exe PID 2908 wrote to memory of 952 2908 jr391972.exe 1.exe PID 700 wrote to memory of 5840 700 ziga7958.exe kp633924.exe PID 700 wrote to memory of 5840 700 ziga7958.exe kp633924.exe PID 700 wrote to memory of 5840 700 ziga7958.exe kp633924.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae291ae2497c7d4f82cf1095b2e503414fb73e1f56591bce8a3c4ac811c900c9.exe"C:\Users\Admin\AppData\Local\Temp\ae291ae2497c7d4f82cf1095b2e503414fb73e1f56591bce8a3c4ac811c900c9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziga7958.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziga7958.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zijX0259.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zijX0259.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it997519.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it997519.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr391972.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr391972.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 13845⤵
- Program crash
PID:5736 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp633924.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp633924.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2908 -ip 29081⤵PID:2092
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
714KB
MD58cd51707a46f657fc85f08addb970ea5
SHA10b4ca19379f4b61a61479f60fcb05dfed941cbdc
SHA256da1eb191d1a9c39dd960807cc9f0d08f47811a108925540836a945962325c043
SHA512fc00153a0b5b9c3e49a55b9f42fd94aefe50a7426583fc0039efbb15148d344e9e20e6aa08e6b9002179a8ff175f626a4d9f5d2eb61c7ab3dbf78a4d4499bfe9
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
560KB
MD5a722470f2b195cc142515b292940f5d4
SHA14e9b72a0033e9629588be11eb86ce67721d81649
SHA2569742b2b9fef17b129a2f7bd98d3e4b1831daaeb6d8c6670be126477b1e44d3eb
SHA5125050034f59bd81c176e0bcf44248c8e9265a0f5da0decd180f081c591d946a3135ba2507d0d4e4425e9525fc3b3a32f196eb31a0ad80c3a32380e74effcf3aa2
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
588KB
MD5752a6c5bce5ef75fc9919d4a6bc79bd1
SHA11c17d3ca56b058549ec5ccb514dc7d94af0f7dd8
SHA25691ee15e013b2b2d18bd649cc6882f5981f39db37c2dd2f54aadee26bf53bb603
SHA51237126762417edd7431631c44d3fc72d50d8a7a67a67c624ce302dcf961d9a8b82f21e9e4795766020dfdeebea4186e54d05b667243ef913acf9895d19469e125
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1