Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 15:21
Static task
static1
Behavioral task
behavioral1
Sample
a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exe
Resource
win10v2004-20241007-en
General
-
Target
a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exe
-
Size
653KB
-
MD5
c2c03e289039a8281bfa65297e104abe
-
SHA1
13a26fbb113a397853644922f6455fb86564c8c9
-
SHA256
a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e
-
SHA512
32d98b6c4871506babd718a4afdd61cfbd99a3a9ad31913747916737401683437c584ce91c3716ac0098f4d70ffc4cb4cf1475fbce2c4d5d538c5eab0561be23
-
SSDEEP
12288:uMrvy90Pn40WAvAjEV0kE4Z1bu9LKj0zYU3eU67ESruBC/ca/9:RyYZIjWRV1bu9LKj0EU3ev7u09
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr499215.exe healer behavioral1/memory/3332-14-0x0000000000DD0000-0x0000000000DDA000-memory.dmp healer -
Healer family
-
Processes:
jr499215.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr499215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr499215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr499215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr499215.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr499215.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr499215.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3320-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1784-2118-0x0000000000D70000-0x0000000000DA0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr356149.exe family_redline behavioral1/memory/5668-2129-0x00000000001E0000-0x000000000020E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku065557.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ku065557.exe -
Executes dropped EXE 5 IoCs
Processes:
ziQQ5953.exejr499215.exeku065557.exe1.exelr356149.exepid process 220 ziQQ5953.exe 3332 jr499215.exe 3320 ku065557.exe 1784 1.exe 5668 lr356149.exe -
Processes:
jr499215.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr499215.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exeziQQ5953.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziQQ5953.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5368 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4180 3320 WerFault.exe ku065557.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziQQ5953.exeku065557.exe1.exelr356149.exea16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziQQ5953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku065557.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr356149.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr499215.exepid process 3332 jr499215.exe 3332 jr499215.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr499215.exeku065557.exedescription pid process Token: SeDebugPrivilege 3332 jr499215.exe Token: SeDebugPrivilege 3320 ku065557.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exeziQQ5953.exeku065557.exedescription pid process target process PID 812 wrote to memory of 220 812 a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exe ziQQ5953.exe PID 812 wrote to memory of 220 812 a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exe ziQQ5953.exe PID 812 wrote to memory of 220 812 a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exe ziQQ5953.exe PID 220 wrote to memory of 3332 220 ziQQ5953.exe jr499215.exe PID 220 wrote to memory of 3332 220 ziQQ5953.exe jr499215.exe PID 220 wrote to memory of 3320 220 ziQQ5953.exe ku065557.exe PID 220 wrote to memory of 3320 220 ziQQ5953.exe ku065557.exe PID 220 wrote to memory of 3320 220 ziQQ5953.exe ku065557.exe PID 3320 wrote to memory of 1784 3320 ku065557.exe 1.exe PID 3320 wrote to memory of 1784 3320 ku065557.exe 1.exe PID 3320 wrote to memory of 1784 3320 ku065557.exe 1.exe PID 812 wrote to memory of 5668 812 a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exe lr356149.exe PID 812 wrote to memory of 5668 812 a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exe lr356149.exe PID 812 wrote to memory of 5668 812 a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exe lr356149.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exe"C:\Users\Admin\AppData\Local\Temp\a16e5f01b3470cf077b6c8e4f792f40fb31e431c4470a0cd87499655319c3b1e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQQ5953.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQQ5953.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr499215.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr499215.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku065557.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku065557.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 13724⤵
- Program crash
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr356149.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr356149.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5668
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3320 -ip 33201⤵PID:644
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5368
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5db6bd29b7eec09bf8a0e21fbd471ad8b
SHA1a100ae4569bb2873dac3b4ed5c399a27c0058f0f
SHA2564cdb66f1f13f2319bb6794ff32796af8a9bedac7f8120c2a11cd7093e5c06984
SHA512faab69033437be392991642efa5d9717aa397ab7c65d8c4f91f46e7e22afc376d9cace297bb85e3a6f2724c98dbfcf66e46f1d65f305e907670e015be1399370
-
Filesize
496KB
MD57d19fa3cb33f2aeb0c6e8779a5ba820f
SHA1bcd10731d9cd20108d3c421632d88d4f98a43bbf
SHA256db85eef1aafb856f4c0f8e4994efd6f76883fa15998428a43b7ae1a1f47a20ea
SHA51213b0a51135aa1db1f77761962e554602abb2079b3b8827efcbb65152fd466a1a824740f29121350b2b89f74670a70c965a76100df8554cd16c556f139629cbbf
-
Filesize
11KB
MD503d99a10a2d20ffe85485fed5f1aff4d
SHA1f6893aa60086a1a1dc82992a5d645c2dc2bcaa0c
SHA256660083f6070bf213487c079a04b8fa1ca9f0161572ceaebba9ab2f8550da2178
SHA5123b57dbbfd71c479953140e32f1a579cfd2972eac435c3203636100afbbe2cadf462fb0176728ab0be6a9d10f93e94c4c4622a572f2575874d1decbca2b4b26c2
-
Filesize
414KB
MD540af917d3fcd459d642ba796a9dfec4f
SHA1affdb09e7e6ec3c59170030474fa2e4a364f2790
SHA2564f774f097bfc64f40c2b39015ea19a15beb8a39cd4f6ccb57ba37385da0e6aa3
SHA5121f004b57a7f292e83b92b6616a27e170376039f54a1fdb7dfbcbd51facbaf9189febd8c928d74a4b647c47fc5390704e5e34b85f3de6e371c61f8bff37011f0b
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0