Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 15:23
Static task
static1
Behavioral task
behavioral1
Sample
b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exe
Resource
win10v2004-20241007-en
General
-
Target
b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exe
-
Size
684KB
-
MD5
66ccb6290b9517973a2536c6a63ce55d
-
SHA1
13e2c69cd15e558bb1ee6823d17ae0413e492f70
-
SHA256
b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada
-
SHA512
21003194adaad3cc6c6e2e8dfe905455f076d5c31bb861c5c78b037274b5f3085f2ed9fc9c41bfd3ecee273a9e5f326657a49d23f449b0382ab6b8a7542030bc
-
SSDEEP
12288:+MrVy90UkTFR2AlY3i9k90ye1nj4L27FYSG12LrSQ7f15yEfwJ1OXnqS:3yghxnk90yl2GluXf15y0jXnb
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr441762.exe healer behavioral1/memory/4380-15-0x0000000000D30000-0x0000000000D3A000-memory.dmp healer -
Healer family
-
Processes:
jr441762.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr441762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr441762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr441762.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr441762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr441762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr441762.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2604-2105-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/6348-2118-0x00000000001D0000-0x0000000000200000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr249128.exe family_redline behavioral1/memory/6816-2129-0x0000000000750000-0x000000000077E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku760359.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ku760359.exe -
Executes dropped EXE 5 IoCs
Processes:
ziHj6914.exejr441762.exeku760359.exe1.exelr249128.exepid process 756 ziHj6914.exe 4380 jr441762.exe 2604 ku760359.exe 6348 1.exe 6816 lr249128.exe -
Processes:
jr441762.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr441762.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziHj6914.exeb5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziHj6914.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6612 2604 WerFault.exe ku760359.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziHj6914.exeku760359.exe1.exelr249128.exeb5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziHj6914.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku760359.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr249128.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr441762.exepid process 4380 jr441762.exe 4380 jr441762.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr441762.exeku760359.exedescription pid process Token: SeDebugPrivilege 4380 jr441762.exe Token: SeDebugPrivilege 2604 ku760359.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exeziHj6914.exeku760359.exedescription pid process target process PID 3584 wrote to memory of 756 3584 b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exe ziHj6914.exe PID 3584 wrote to memory of 756 3584 b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exe ziHj6914.exe PID 3584 wrote to memory of 756 3584 b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exe ziHj6914.exe PID 756 wrote to memory of 4380 756 ziHj6914.exe jr441762.exe PID 756 wrote to memory of 4380 756 ziHj6914.exe jr441762.exe PID 756 wrote to memory of 2604 756 ziHj6914.exe ku760359.exe PID 756 wrote to memory of 2604 756 ziHj6914.exe ku760359.exe PID 756 wrote to memory of 2604 756 ziHj6914.exe ku760359.exe PID 2604 wrote to memory of 6348 2604 ku760359.exe 1.exe PID 2604 wrote to memory of 6348 2604 ku760359.exe 1.exe PID 2604 wrote to memory of 6348 2604 ku760359.exe 1.exe PID 3584 wrote to memory of 6816 3584 b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exe lr249128.exe PID 3584 wrote to memory of 6816 3584 b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exe lr249128.exe PID 3584 wrote to memory of 6816 3584 b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exe lr249128.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exe"C:\Users\Admin\AppData\Local\Temp\b5fa545437628da988c0acaf2812778deb03356a0d60096920b5aad7f11fbada.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHj6914.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHj6914.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr441762.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr441762.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku760359.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku760359.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 11764⤵
- Program crash
PID:6612 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr249128.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr249128.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6816
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2604 -ip 26041⤵PID:6548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5c473c04e0a9b580e7ade77f0cf07a670
SHA11ab5a052f4b4729ca8c8e8433e963ae90519dfb0
SHA256b0613827b045785e96c535c6ddd99fa8e04f93b73dd3220587f17884ec31469a
SHA512d5df723d2c69c20fd32834b1233ea1e84f14d471c156ae0450cc1c330d3f5bbcd89fc022147756627ea98fce4d6e16afb179458b90d0a9554942e120e9faedf0
-
Filesize
530KB
MD5cf8c96513753595e188e0aed4953c610
SHA17380e7c18a509a9ae513b4fc06dfc627928c7f93
SHA256d3b7e789dd40ff8457574e68d188bf3e90606057ed8992dbf739da795fb6cd57
SHA512200fcfb234ebe56d769d83f7ea4a4c3bbad1825b51db0c5de031ca1d3bdf3f1334d7f34c2d693f5437921728705066c29f61b137d0d813f0823f729e216d1d1b
-
Filesize
12KB
MD5ad75ca6ec8b6a9087ed85a88c0e04fea
SHA18e2a78c537bf1d8fd0d487837bd0baf9bbefe1d8
SHA2565b101583de60ad2876b768b8254ee40a792b649487fba6fcc2f3bbeb96d520eb
SHA51253b984c7605f4baf323849a50b7c7fe312161eb88eb10f0bb92a3e817b839c03bbb32e723daa8cfefdb6ff94ce9753b79eff67aeb77cc325a6cbb86204908823
-
Filesize
495KB
MD5750207b822afb581b0c1adef5099cfd2
SHA19358add7abfd23d55e93f655a050a0c360177498
SHA2562474bcd1774f17cc4f918cd7753da851f4cd17b9ad77a17e8dcdcf64b8663151
SHA5125308a583b698974cd109d21e315f30030dd636a3f4b9bf982e2a9364c8f5fbd701723d3930e6bbec52356c7829543c201092bc6e56c80dec6610d8eaa65e79f0
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0