Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 12:34
Static task
static1
Behavioral task
behavioral1
Sample
3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exe
Resource
win10v2004-20241007-en
General
-
Target
3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exe
-
Size
653KB
-
MD5
5f27bfb816e2ec3eeccd1e6ec7c1b612
-
SHA1
18233da4d305d1473d0345456c3008cdc8a4e6c0
-
SHA256
3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d
-
SHA512
617c7be96330f909481c2523a4dc13555076748a2e0e7f8250b6c0e2ae5d2155c7b7330fa52c7e76a4ed41affd53df30b545f3fadd213fb9096463c689636825
-
SSDEEP
12288:MMrdy90myZprljU1kCER9nUpp1yc+Sb7B47FpmjZ3luzPxniz0:RyM1M1yc+SbujmlOPxd
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr707477.exe healer behavioral1/memory/2968-15-0x0000000000540000-0x000000000054A000-memory.dmp healer -
Healer family
-
Processes:
jr707477.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr707477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr707477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr707477.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr707477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr707477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr707477.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1180-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/456-2118-0x0000000000380000-0x00000000003B0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr396363.exe family_redline behavioral1/memory/5296-2129-0x0000000000AD0000-0x0000000000AFE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku590311.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ku590311.exe -
Executes dropped EXE 5 IoCs
Processes:
zims0542.exejr707477.exeku590311.exe1.exelr396363.exepid process 3236 zims0542.exe 2968 jr707477.exe 1180 ku590311.exe 456 1.exe 5296 lr396363.exe -
Processes:
jr707477.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr707477.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exezims0542.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zims0542.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4188 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5156 1180 WerFault.exe ku590311.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exezims0542.exeku590311.exe1.exelr396363.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zims0542.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku590311.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr396363.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr707477.exepid process 2968 jr707477.exe 2968 jr707477.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr707477.exeku590311.exedescription pid process Token: SeDebugPrivilege 2968 jr707477.exe Token: SeDebugPrivilege 1180 ku590311.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exezims0542.exeku590311.exedescription pid process target process PID 3512 wrote to memory of 3236 3512 3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exe zims0542.exe PID 3512 wrote to memory of 3236 3512 3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exe zims0542.exe PID 3512 wrote to memory of 3236 3512 3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exe zims0542.exe PID 3236 wrote to memory of 2968 3236 zims0542.exe jr707477.exe PID 3236 wrote to memory of 2968 3236 zims0542.exe jr707477.exe PID 3236 wrote to memory of 1180 3236 zims0542.exe ku590311.exe PID 3236 wrote to memory of 1180 3236 zims0542.exe ku590311.exe PID 3236 wrote to memory of 1180 3236 zims0542.exe ku590311.exe PID 1180 wrote to memory of 456 1180 ku590311.exe 1.exe PID 1180 wrote to memory of 456 1180 ku590311.exe 1.exe PID 1180 wrote to memory of 456 1180 ku590311.exe 1.exe PID 3512 wrote to memory of 5296 3512 3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exe lr396363.exe PID 3512 wrote to memory of 5296 3512 3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exe lr396363.exe PID 3512 wrote to memory of 5296 3512 3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exe lr396363.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exe"C:\Users\Admin\AppData\Local\Temp\3bcd2439a4df395d6dc21c009964df3054683805a97ccda3ebea41029402d68d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zims0542.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zims0542.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr707477.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr707477.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku590311.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku590311.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 14404⤵
- Program crash
PID:5156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr396363.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr396363.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1180 -ip 11801⤵PID:1880
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4188
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD52c318db4e9bac1430777d33c8cbf22e1
SHA1aebad61ad3bb083f4145fcdc451bc721009576c6
SHA256932179210659c7f8535ef812c89073da541a6a23720c6da594ce660f15b33072
SHA5126a7308cc856e023082572af2b18da27c4169920381b7dd2f31143f4b962f8533a4115537c10bc606ca40a64fe5b1ff04addf25c245d8a4f1813be2c19e4b7bf1
-
Filesize
496KB
MD5e94261dfda1c29fb1cb03508e72f63ba
SHA1ce2ae1163b0df5789e9dd00a2a068e802439d28f
SHA25688a0f03198a24f84dce6761dc2403ba42d963c9851606fa82031714e915a9999
SHA512de9500c94e6038cbf1b573dd341eb72dc4aac45b7871cab328fe6b667b665f55ca6b95cad5ce2f4e69aa09e74f321879f2fb82ffa420aeec58b66142e350903f
-
Filesize
11KB
MD566a9fc93c883eb734bfc6c4ad0adbff5
SHA1be33ed53788a0edd411a06384c70e8a53227b38b
SHA2565bdac1e4f625e8dad1a619753ca82fe459572923a1c9eaedfcc6b17c5c95a242
SHA512727451d95da16289125d5b640ba1204be2d2ca5624d3abc0d975356c1b25a4cbc0e9b8d31d406f1bc1bf3b31eaf4f3581a831372cbc82cc79057a1a3f688f162
-
Filesize
414KB
MD53108cc07c3fd60fb0302d87344ec0ebc
SHA1cedda76fee6032da82d537064c636d41cd22ac63
SHA256bf03d17f4d81efb5e91e7d2f742c3b6c1dfaf0865a82c2f1bd790d92f1c6215c
SHA51210d8e3ff264898e7d4e3817313ac564dad0eac5b590bc620993644c20db783045c0b44d4223b29714cf88411e37e4d1e01110bd74b00a80ea1c30b357a392edd
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0