Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 15:09
Static task
static1
Behavioral task
behavioral1
Sample
d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exe
Resource
win10v2004-20241007-en
General
-
Target
d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exe
-
Size
655KB
-
MD5
35ce159fa53aa10a113f1b28bbafc2f3
-
SHA1
c87517ead170e09b3acbfb591c7973689f488aa3
-
SHA256
d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37
-
SHA512
89b1ae9f82559e97438e875ed6a2c81a1cd3459f4fd51d8243a42d1240a25a09f5b926adc9b24c4e10fd25278d75cb3d50fbe195be1c4916a7d7bc01014d7091
-
SSDEEP
12288:1MrRy90gX7ZyD1DVG7/L8GrNCVYCrVTjy9GACu8wdKwTSih/ZUwXBJfRUKsplAX:8yXX4ZIzpoYgdwdK6SiBZUWJfRUKke
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr940283.exe healer behavioral1/memory/2952-15-0x0000000000AC0000-0x0000000000ACA000-memory.dmp healer -
Healer family
-
Processes:
jr940283.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr940283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr940283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr940283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr940283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr940283.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr940283.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4920-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2300-2118-0x0000000000780000-0x00000000007B0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr077693.exe family_redline behavioral1/memory/2260-2129-0x0000000000E20000-0x0000000000E4E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku556176.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ku556176.exe -
Executes dropped EXE 5 IoCs
Processes:
ziyc5201.exejr940283.exeku556176.exe1.exelr077693.exepid process 5104 ziyc5201.exe 2952 jr940283.exe 4920 ku556176.exe 2300 1.exe 2260 lr077693.exe -
Processes:
jr940283.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr940283.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exeziyc5201.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziyc5201.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5716 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3444 4920 WerFault.exe ku556176.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exeziyc5201.exeku556176.exe1.exelr077693.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziyc5201.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku556176.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr077693.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr940283.exepid process 2952 jr940283.exe 2952 jr940283.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr940283.exeku556176.exedescription pid process Token: SeDebugPrivilege 2952 jr940283.exe Token: SeDebugPrivilege 4920 ku556176.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exeziyc5201.exeku556176.exedescription pid process target process PID 3128 wrote to memory of 5104 3128 d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exe ziyc5201.exe PID 3128 wrote to memory of 5104 3128 d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exe ziyc5201.exe PID 3128 wrote to memory of 5104 3128 d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exe ziyc5201.exe PID 5104 wrote to memory of 2952 5104 ziyc5201.exe jr940283.exe PID 5104 wrote to memory of 2952 5104 ziyc5201.exe jr940283.exe PID 5104 wrote to memory of 4920 5104 ziyc5201.exe ku556176.exe PID 5104 wrote to memory of 4920 5104 ziyc5201.exe ku556176.exe PID 5104 wrote to memory of 4920 5104 ziyc5201.exe ku556176.exe PID 4920 wrote to memory of 2300 4920 ku556176.exe 1.exe PID 4920 wrote to memory of 2300 4920 ku556176.exe 1.exe PID 4920 wrote to memory of 2300 4920 ku556176.exe 1.exe PID 3128 wrote to memory of 2260 3128 d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exe lr077693.exe PID 3128 wrote to memory of 2260 3128 d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exe lr077693.exe PID 3128 wrote to memory of 2260 3128 d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exe lr077693.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exe"C:\Users\Admin\AppData\Local\Temp\d87eadfcb21d00b1e846f44e40ceb4f961f4a9ff03f00883c5fd98c9dd92db37.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyc5201.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyc5201.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr940283.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr940283.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku556176.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku556176.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 15244⤵
- Program crash
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr077693.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr077693.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2260
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4920 -ip 49201⤵PID:6016
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5e973880eae03bde7a02c619514760772
SHA12227d7382a514f9cd1da5ff25aa8fa7b86707d28
SHA256e6d6844c2c6a1454d9b14ea2a2774e21846cfebe46d28c5095372d5d4537f478
SHA5127c58a97d265e0eeba92937fc7f42338dffb3e12a2e42d14936df176e340e9b4da59322cb87e93acfd07a42a703d88a7c99d32634037f54e249b725cf812df34c
-
Filesize
501KB
MD5764e3196d12c7dd9a76ff97320b50897
SHA140dbb0eb9f445cbf125e8bcd793dec49c11049df
SHA2564cc92a9160eeb872725bae6336e46b6faf2e70a0a48fabe887c8592bc0db2d75
SHA512281bd67797ff4aea00fd7afb0a8625197c08e55f97ac4352b46d4153acd561c9cec102dce338fbcda8ae89e7801a3fd8211deeda7dea8542ebbc64bd678e3cf6
-
Filesize
11KB
MD52ab87adf90a74bb149218a77401f8e5b
SHA1338bb5d8d8eaebb0e70e5b69fe99fe1672e81d6d
SHA256e3f0680e53442b642030b1abdf3adae95d1e6f6149c928d58f76fd78f08bfa93
SHA5124695837a768dad91f709cf6f423c2f9242cb0d3abf395fdeb1945549d9a90af6f5719f1d20b657437c663c77f8c968710898dfde4a1c65949d7c9015545460d3
-
Filesize
424KB
MD515647d6f5976057b04cee9abf38871b0
SHA126bf1f3f40ecfa4ed4c54f2e1aeba40a8a888f66
SHA2563a2a4f8c236531c077aab36685f01836b7b0e80f3f793eb787e3d2f9c854b80c
SHA5127ffc8b852f18e45f9c994d952094711ec04c4a73000834ab8eee176472060a03822ae3f9e86945d38a76a513c34171955de9a76086dde6bfb71f742985cef4e4
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0