Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:57
Static task
static1
Behavioral task
behavioral1
Sample
288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exe
Resource
win10v2004-20241007-en
General
-
Target
288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exe
-
Size
655KB
-
MD5
49293841af4eadb26647ab7e06dc0fd5
-
SHA1
a39dccdce5230d6e7a98eaada4a44e359f136a9b
-
SHA256
288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25
-
SHA512
18074e1185e747de8412091c90b3450b23dfdaea5b599ec308e204dba2dadc2cda642ad3ae4af00acbad98f9d3362bfeffada78c52d57120e41a995a122b81ed
-
SSDEEP
12288:ZMray90gQUZwcDDUxCV/uTWOxP59wsCuswd/wTWhTMZYxcUzubC+qpXy:XyzZxU4d9EP5KJwd/6WhYZYZuYy
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr809182.exe healer behavioral1/memory/1084-15-0x00000000008A0000-0x00000000008AA000-memory.dmp healer -
Healer family
-
Processes:
jr809182.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr809182.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr809182.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr809182.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr809182.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr809182.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr809182.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3356-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1972-2118-0x0000000000D10000-0x0000000000D40000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr944168.exe family_redline behavioral1/memory/5272-2129-0x0000000000F80000-0x0000000000FAE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku095803.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ku095803.exe -
Executes dropped EXE 5 IoCs
Processes:
ziMg0693.exejr809182.exeku095803.exe1.exelr944168.exepid process 836 ziMg0693.exe 1084 jr809182.exe 3356 ku095803.exe 1972 1.exe 5272 lr944168.exe -
Processes:
jr809182.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr809182.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exeziMg0693.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziMg0693.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5148 3356 WerFault.exe ku095803.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exelr944168.exe288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exeziMg0693.exeku095803.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr944168.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziMg0693.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku095803.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr809182.exepid process 1084 jr809182.exe 1084 jr809182.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr809182.exeku095803.exedescription pid process Token: SeDebugPrivilege 1084 jr809182.exe Token: SeDebugPrivilege 3356 ku095803.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exeziMg0693.exeku095803.exedescription pid process target process PID 4152 wrote to memory of 836 4152 288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exe ziMg0693.exe PID 4152 wrote to memory of 836 4152 288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exe ziMg0693.exe PID 4152 wrote to memory of 836 4152 288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exe ziMg0693.exe PID 836 wrote to memory of 1084 836 ziMg0693.exe jr809182.exe PID 836 wrote to memory of 1084 836 ziMg0693.exe jr809182.exe PID 836 wrote to memory of 3356 836 ziMg0693.exe ku095803.exe PID 836 wrote to memory of 3356 836 ziMg0693.exe ku095803.exe PID 836 wrote to memory of 3356 836 ziMg0693.exe ku095803.exe PID 3356 wrote to memory of 1972 3356 ku095803.exe 1.exe PID 3356 wrote to memory of 1972 3356 ku095803.exe 1.exe PID 3356 wrote to memory of 1972 3356 ku095803.exe 1.exe PID 4152 wrote to memory of 5272 4152 288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exe lr944168.exe PID 4152 wrote to memory of 5272 4152 288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exe lr944168.exe PID 4152 wrote to memory of 5272 4152 288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exe lr944168.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exe"C:\Users\Admin\AppData\Local\Temp\288d2b5e259532fae32a643d69e7e75dbb476aed82953d40d9a0d91ce1d9db25.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMg0693.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMg0693.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr809182.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr809182.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku095803.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku095803.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3356 -s 15004⤵
- Program crash
PID:5148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr944168.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr944168.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5272
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3356 -ip 33561⤵PID:3532
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD545f007c93f99297ed17a07dd2301a518
SHA1547bcd31d91c4c364f7486bf974ece47bb1b1971
SHA2562e44dd13eb900482f060bae205d921066429878c1d4855ef5484d3590b22109b
SHA51224adf1fce848f5e651707f31cca276259230c1b3837f6517135b4281807a59f0e5b5e2a27496b120f59634c3c07b322c34b2c3c82d2d9f40b1f98b303684ce33
-
Filesize
501KB
MD5d6bdfcde82afc2abd2f0762b03b67200
SHA14ebae3acc89aa3fd1e7e72d21f10e9e2eee74d50
SHA256c3a4be6a76765f16d94f346e422a6b518ba8dfa56ec6efb552432da1d553e438
SHA5126dbffeba90290c1ff4e96bcc42116a3b71b375804c8c79797c95b5e113d4e825c715e21f03ee7361744711868b2a0689e78cf6bae3269deb19f13e707e8234da
-
Filesize
11KB
MD549e9c492581141e9e5aba8c44fd775ff
SHA1ac599fba382ecbfe6a6daa5234a335521f92a97b
SHA25667cbb8d992346ab0801781e62bc38037a19b5d81ac79193f490aec62af9a0db2
SHA512763182a541f49f4cae0c107f3d22485a9bd8696c629e9ecf39257b9776c5a728231c669c7e894266149902443c59dcf8f418e27cefdf74cbbbbb3c491e6959d6
-
Filesize
424KB
MD5d6be788ce9a46ab76facbde4eb6adeca
SHA1e29bcb9ebd025b0e087d0db65f21e8ba77bbe90f
SHA256196a02b61169606da253979ddbc7c0b8a42a76a42e909dff96d2e8de5e58b82f
SHA512b9d51402c668fac718f406dc3938d8156f6d084c1812aab2b94b16d44ead0e8c6ac0224c609369cf8400905cf444ce56c7348bea25c1f0ffc6b822a8a26b00a1
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0