Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:33
Static task
static1
Behavioral task
behavioral1
Sample
f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exe
Resource
win10v2004-20241007-en
General
-
Target
f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exe
-
Size
685KB
-
MD5
1c6709a5f679baf28220133ad8a1b0e7
-
SHA1
9d6abcc6f0f0868bcaeeafce1c33dca4c5286344
-
SHA256
f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066
-
SHA512
233145fd4a68f571eccbc4b30724410b22b7bc3b95883a0ef861e2fd823250a84c3f1a742084ba4865509447003977538f7b2e7b9f197b5ceda75726f47413c8
-
SSDEEP
12288:4Mr4y90BGIZ/rGnBCVXyY72JnRSxj6FrSuIRMlYm3q1BC5:Ay8GVCVXy02veWwRMXj
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr592644.exe healer behavioral1/memory/5036-15-0x0000000000440000-0x000000000044A000-memory.dmp healer -
Healer family
-
Processes:
jr592644.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr592644.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr592644.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr592644.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr592644.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr592644.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr592644.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2364-2105-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5628-2118-0x0000000000510000-0x0000000000540000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr398350.exe family_redline behavioral1/memory/1164-2129-0x0000000000DA0000-0x0000000000DCE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku816651.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ku816651.exe -
Executes dropped EXE 5 IoCs
Processes:
zirc2163.exejr592644.exeku816651.exe1.exelr398350.exepid process 2264 zirc2163.exe 5036 jr592644.exe 2364 ku816651.exe 5628 1.exe 1164 lr398350.exe -
Processes:
jr592644.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr592644.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
zirc2163.exef8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zirc2163.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6012 2364 WerFault.exe ku816651.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exezirc2163.exeku816651.exe1.exelr398350.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zirc2163.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku816651.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr398350.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr592644.exepid process 5036 jr592644.exe 5036 jr592644.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr592644.exeku816651.exedescription pid process Token: SeDebugPrivilege 5036 jr592644.exe Token: SeDebugPrivilege 2364 ku816651.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exezirc2163.exeku816651.exedescription pid process target process PID 2360 wrote to memory of 2264 2360 f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exe zirc2163.exe PID 2360 wrote to memory of 2264 2360 f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exe zirc2163.exe PID 2360 wrote to memory of 2264 2360 f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exe zirc2163.exe PID 2264 wrote to memory of 5036 2264 zirc2163.exe jr592644.exe PID 2264 wrote to memory of 5036 2264 zirc2163.exe jr592644.exe PID 2264 wrote to memory of 2364 2264 zirc2163.exe ku816651.exe PID 2264 wrote to memory of 2364 2264 zirc2163.exe ku816651.exe PID 2264 wrote to memory of 2364 2264 zirc2163.exe ku816651.exe PID 2364 wrote to memory of 5628 2364 ku816651.exe 1.exe PID 2364 wrote to memory of 5628 2364 ku816651.exe 1.exe PID 2364 wrote to memory of 5628 2364 ku816651.exe 1.exe PID 2360 wrote to memory of 1164 2360 f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exe lr398350.exe PID 2360 wrote to memory of 1164 2360 f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exe lr398350.exe PID 2360 wrote to memory of 1164 2360 f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exe lr398350.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exe"C:\Users\Admin\AppData\Local\Temp\f8802c0ade7e1d914961111f7390331f61c947bf3a206e8de286ceac7841e066.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirc2163.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirc2163.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr592644.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr592644.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku816651.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku816651.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 15164⤵
- Program crash
PID:6012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr398350.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr398350.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1164
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2364 -ip 23641⤵PID:5892
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD52749c86bb00891fcc92e8d7a4d94854a
SHA14a17edde12a2abbbb7da1ebbd556bdcba5d6a776
SHA256d5424aea0006abf771b903e04057c1b24c25ffb1a5a6593cd5695f0dc9178afc
SHA512f548e727d6ddc5c9cd26d9ebaf2b2ae30932f52bc9e41a90d1c8a6648cc415926430535b88dfe07f4c4c79c93c1d5f090a7bf4387f5958a6b2bfcfcceb589a74
-
Filesize
531KB
MD55874034c45ba2a908270220b732324cb
SHA17ea1ff1985852d758b8080b2002e58973e11c968
SHA25653f8db772e842b1fd842ad4c5a6694e8ef117e8c4beefac90e6d24377619b500
SHA512d8e56321948b3a07901747d7ae608899b4b448377b30c8262270c043ffd0006c597c3ac7b618336339d3948538ee34d50dbe9b5845ba7980194935b207b759f8
-
Filesize
12KB
MD59a52e0cd4bbb26ddbf4776c52bbad1b4
SHA1f85cbbdb854aa8e1db8940e7e8eb2a42731d68fd
SHA256daef1e12f0d48cbb069cc8cdb8bf2f3f67281501fd2a1102a5c1f43c350ed2e1
SHA51257b5e45bc7bcc7f12be28dc2800b81faaba9d22cd49182a7836084798b45218820ab121aeec2c100289a3fd5bc1ca55632f2511f54480b0d8f2e55ad7b02be10
-
Filesize
495KB
MD5c4c7cb8eac010966a4102e3cb93fdee1
SHA1c663a33672898c084c13177482dd84426a813e34
SHA256ad9125b680dffd0ac4cdb419cf26dc421c1e95cd40e6a1ce40f6f5c7518fce74
SHA512e7b7a97dbdaae009c7751a61ba99c1945d6f43615c182215358ca854164d4caba48821f1298bda5663cced9f8d1cd881301df77a27674aa78044e11940b848c8
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0