Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 11:24
Static task
static1
Behavioral task
behavioral1
Sample
a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exe
Resource
win10v2004-20241007-en
General
-
Target
a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exe
-
Size
650KB
-
MD5
2a6bc8e97e6e37976a1b7cca76bddf08
-
SHA1
bd657cfbbbd05c594b4022722fddad02f9041f8c
-
SHA256
a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52
-
SHA512
8db5d34260837787359bad0d4020f3fae2889170908a48a0ab934b685a98cbdeb6d316e1100f36cdd457b2f9745ceb655c4c8131ba99029503171c3a37bd82a9
-
SSDEEP
12288:7Mrjy90Y1my5KiyRKSp62R9nhpp+kq+e97u77BVm3Zrlwv8K9MdVt3b1rP+:AyOAKRwSo8+kq+e94rmJ+UK9MxF+
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr669385.exe healer behavioral1/memory/1944-15-0x0000000000620000-0x000000000062A000-memory.dmp healer -
Healer family
-
Processes:
jr669385.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr669385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr669385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr669385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr669385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr669385.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr669385.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1488-2105-0x0000000004E10000-0x0000000004E42000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4516-2118-0x00000000007E0000-0x0000000000810000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr834622.exe family_redline behavioral1/memory/5316-2129-0x0000000000B30000-0x0000000000B5E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku868793.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ku868793.exe -
Executes dropped EXE 5 IoCs
Processes:
ziXX8140.exejr669385.exeku868793.exe1.exelr834622.exepid process 1108 ziXX8140.exe 1944 jr669385.exe 1488 ku868793.exe 4516 1.exe 5316 lr834622.exe -
Processes:
jr669385.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr669385.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exeziXX8140.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziXX8140.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4496 1488 WerFault.exe ku868793.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
lr834622.exea0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exeziXX8140.exeku868793.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr834622.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziXX8140.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku868793.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr669385.exepid process 1944 jr669385.exe 1944 jr669385.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr669385.exeku868793.exedescription pid process Token: SeDebugPrivilege 1944 jr669385.exe Token: SeDebugPrivilege 1488 ku868793.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exeziXX8140.exeku868793.exedescription pid process target process PID 4944 wrote to memory of 1108 4944 a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exe ziXX8140.exe PID 4944 wrote to memory of 1108 4944 a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exe ziXX8140.exe PID 4944 wrote to memory of 1108 4944 a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exe ziXX8140.exe PID 1108 wrote to memory of 1944 1108 ziXX8140.exe jr669385.exe PID 1108 wrote to memory of 1944 1108 ziXX8140.exe jr669385.exe PID 1108 wrote to memory of 1488 1108 ziXX8140.exe ku868793.exe PID 1108 wrote to memory of 1488 1108 ziXX8140.exe ku868793.exe PID 1108 wrote to memory of 1488 1108 ziXX8140.exe ku868793.exe PID 1488 wrote to memory of 4516 1488 ku868793.exe 1.exe PID 1488 wrote to memory of 4516 1488 ku868793.exe 1.exe PID 1488 wrote to memory of 4516 1488 ku868793.exe 1.exe PID 4944 wrote to memory of 5316 4944 a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exe lr834622.exe PID 4944 wrote to memory of 5316 4944 a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exe lr834622.exe PID 4944 wrote to memory of 5316 4944 a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exe lr834622.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exe"C:\Users\Admin\AppData\Local\Temp\a0bae6a14dcf5571d8d9f16d27827fdfd56925c74c35e141d4e5225403232b52.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXX8140.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXX8140.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr669385.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr669385.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku868793.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku868793.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1488 -s 13844⤵
- Program crash
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr834622.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr834622.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1488 -ip 14881⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a92a2f75410adfbb66bee1cb23c9cd35
SHA1f5cfc186e87328a7489ec1de0b3ffdea2a32825f
SHA256bf04719ebb6b644fe72e8ede79eff0edffae0aed0903d4cc5a11c3f16025238a
SHA5125b4d4ef86490dbd3dcebf642fb6a9496bcd87d3a355488d779a979cafabf585f3c6b36c51e355bdbafd485b4c0a435b8a12826b9574d236226eed463e37dedf3
-
Filesize
496KB
MD59d7437e6d0a1e9ba5682c44f58ffdfe7
SHA188a3e05bd50fd321afbf8695b474b81fd7e3eb2a
SHA25654202fbb9732d9d8ede8fee6dac126f5318c199b54b1ae91a4acfa7686b226ec
SHA512f4cdd588c26489271ba02c26ed038d42f5f03d0da59d50862fff23e6a0e5efb4ce06405486503186576bf44b569796dc604579d1e33462d120e712fef287d0d1
-
Filesize
11KB
MD5c1ff8564f84dd52872f813fa244586ae
SHA13d63a44b92ce9c60259ec55470badeefef7655b2
SHA256755b410e66e33f5c07de52150c0eb9bd0e165a5cc3830bc83945bcf00dbed91c
SHA512ebbb1b3a67bb4efb2555cfaf19d46a4816bd7c326c2ad56c4f45921d234d483afc010cc26f54891732a5654e5a2587671317443baa565e276a4e34f830e0836f
-
Filesize
414KB
MD511a1e19d668c4f580a67726b06817551
SHA1dd4ca43107b9bc3dff902315a75a8760011530fd
SHA256ea218ec246d13cde3c50fcd2dee88c994f3647980cd9b9f8f3a5f0d5a3172ee2
SHA5120a7eeb7e4c8b56095124580b0ba0c16eb0542957e1fd3e926c6596f3c0e9d19bd6879ab8c71e7e53ec9992c2f18a6e5e5132ee6eeb77d11c8a05e79c85879840
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0