Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 11:28
Static task
static1
Behavioral task
behavioral1
Sample
7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exe
Resource
win10v2004-20241007-en
General
-
Target
7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exe
-
Size
651KB
-
MD5
9a63c3084c7a70e97619ca768a21f26d
-
SHA1
da019f185ebd7904f1cbc33db534c3b41fe9e2ee
-
SHA256
7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b
-
SHA512
5bf5edded98bde06b23f2626d509dd4bef2a5a1136c250bb9360143b2ae73a8be6dacaa9d325295ad71d506d774b44cf41ca8061d4c5e86df45c8d359073351d
-
SSDEEP
12288:OMrRy906R/3MRy7zQcWgJ7dzCt38UbhXO+uH9/dcn+MP0+E:/y73zYcv5d2t38eVuTvkE
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr454031.exe healer behavioral1/memory/3548-14-0x0000000000370000-0x000000000037A000-memory.dmp healer -
Healer family
-
Processes:
jr454031.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr454031.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr454031.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr454031.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr454031.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr454031.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr454031.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2108-2104-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5704-2117-0x0000000000D80000-0x0000000000DB0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr688333.exe family_redline behavioral1/memory/6064-2128-0x00000000002C0000-0x00000000002EE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku918387.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ku918387.exe -
Executes dropped EXE 5 IoCs
Processes:
ziId4202.exejr454031.exeku918387.exe1.exelr688333.exepid process 4604 ziId4202.exe 3548 jr454031.exe 2108 ku918387.exe 5704 1.exe 6064 lr688333.exe -
Processes:
jr454031.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr454031.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exeziId4202.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziId4202.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5944 2108 WerFault.exe ku918387.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exeziId4202.exeku918387.exe1.exelr688333.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziId4202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku918387.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr688333.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr454031.exepid process 3548 jr454031.exe 3548 jr454031.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr454031.exeku918387.exedescription pid process Token: SeDebugPrivilege 3548 jr454031.exe Token: SeDebugPrivilege 2108 ku918387.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exeziId4202.exeku918387.exedescription pid process target process PID 2264 wrote to memory of 4604 2264 7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exe ziId4202.exe PID 2264 wrote to memory of 4604 2264 7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exe ziId4202.exe PID 2264 wrote to memory of 4604 2264 7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exe ziId4202.exe PID 4604 wrote to memory of 3548 4604 ziId4202.exe jr454031.exe PID 4604 wrote to memory of 3548 4604 ziId4202.exe jr454031.exe PID 4604 wrote to memory of 2108 4604 ziId4202.exe ku918387.exe PID 4604 wrote to memory of 2108 4604 ziId4202.exe ku918387.exe PID 4604 wrote to memory of 2108 4604 ziId4202.exe ku918387.exe PID 2108 wrote to memory of 5704 2108 ku918387.exe 1.exe PID 2108 wrote to memory of 5704 2108 ku918387.exe 1.exe PID 2108 wrote to memory of 5704 2108 ku918387.exe 1.exe PID 2264 wrote to memory of 6064 2264 7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exe lr688333.exe PID 2264 wrote to memory of 6064 2264 7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exe lr688333.exe PID 2264 wrote to memory of 6064 2264 7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exe lr688333.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exe"C:\Users\Admin\AppData\Local\Temp\7e7cc0a34510907267aabba1d2894fe8da8cac06376e162522aa3c3dc151342b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziId4202.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziId4202.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr454031.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr454031.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918387.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918387.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2108 -s 11564⤵
- Program crash
PID:5944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr688333.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr688333.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2108 -ip 21081⤵PID:5872
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD572f7f7cbd5aefb87401a763949adeaf5
SHA1de47128b6dd5af0efa5bb3b0782b1964bcced3bc
SHA256f6a7262f3d62588d0ffd4b7350044427e8b40b510bdf4067ef0bdd6232a6aacc
SHA512b06a2601747e0d27b9362356862c1876735297ff0658fd47f4b0db465222518391eb0fc6f36c673bb95de6b803ab3f85349856354b0f3dc3513e3261d367b8ca
-
Filesize
496KB
MD5463802aa1ff93dada757e41f3aa72aed
SHA1acb6e448bdce72acdd06098cbbfcd3b900828a01
SHA256058e100c29a94c762ef0c2a2f0a0d7489d61a83a7d9078f5a89d056243838d83
SHA512222df19fd1e71faf464c1468bfdcc5bd27b8552b4089a7c3d76f415f0963012d43b7d444d657b174f7d8fbcb02cff8975f7061d99a30108519033156a0b03db4
-
Filesize
11KB
MD5e6748ab66fec2427d1856c4e5fa779b9
SHA120f6886a077f11fdf63e1f999841bd87cba5c65b
SHA2563379c165a3da4905c33bde9880b687cdc1da9b992e7741e89705499a52fb30ef
SHA512ab1f05c0b287cb1b9b765523862343b2c48d9769ea8fe6dd9468cf1c2aa253741b17a0b74a3c836dfc03a559745be5b55e5aa3bfe0378661ea21aec59fb8b8ac
-
Filesize
414KB
MD50052a5aaa808bdb70b9fb947d8876704
SHA17be83b88205fa249eb5f0e50c7b546db2d8be7f4
SHA2565cb759e230b12f5ac772977a9a194c96bea76950697b07889092b4e1da25b7a5
SHA5123cdbf6e4382e84d74d5badaff637be92574bf628455d9128e7767c87b024c0d838e585945e79ea81edc61dccf257e2ea167d271d913f3be46f89aa1cf2410f77
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0