Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exe
Resource
win10v2004-20241007-en
General
-
Target
ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exe
-
Size
652KB
-
MD5
e3ddc289a9def0882a4c7bb11ce64f96
-
SHA1
87a13420dddb9a39f8ac9e463b94a286a35d9a68
-
SHA256
ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e
-
SHA512
657c3975c6443f01b5e328a76eff25c4c4af198d5ed8346dfd9f14ed05398c8be2cc512dad78f67d03e32e812a437add2f1785ea6ac8c2664f82b54a5dd65dd3
-
SSDEEP
12288:4MrDy905jVwnTjjnbgoBTcZSidrrrP2uAVXCxrxEzb:byaVoPTgPTfxG
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr017063.exe healer behavioral1/memory/536-14-0x0000000000B00000-0x0000000000B0A000-memory.dmp healer -
Healer family
-
Processes:
jr017063.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr017063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr017063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr017063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr017063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr017063.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr017063.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1792-2104-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4604-2117-0x0000000000210000-0x0000000000240000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr811770.exe family_redline behavioral1/memory/5804-2128-0x00000000003C0000-0x00000000003EE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku191442.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku191442.exe -
Executes dropped EXE 5 IoCs
Processes:
zipm7435.exejr017063.exeku191442.exe1.exelr811770.exepid process 3112 zipm7435.exe 536 jr017063.exe 1792 ku191442.exe 4604 1.exe 5804 lr811770.exe -
Processes:
jr017063.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr017063.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exezipm7435.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipm7435.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3504 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5632 1792 WerFault.exe ku191442.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exezipm7435.exeku191442.exe1.exelr811770.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zipm7435.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku191442.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr811770.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr017063.exepid process 536 jr017063.exe 536 jr017063.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr017063.exeku191442.exedescription pid process Token: SeDebugPrivilege 536 jr017063.exe Token: SeDebugPrivilege 1792 ku191442.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exezipm7435.exeku191442.exedescription pid process target process PID 3068 wrote to memory of 3112 3068 ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exe zipm7435.exe PID 3068 wrote to memory of 3112 3068 ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exe zipm7435.exe PID 3068 wrote to memory of 3112 3068 ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exe zipm7435.exe PID 3112 wrote to memory of 536 3112 zipm7435.exe jr017063.exe PID 3112 wrote to memory of 536 3112 zipm7435.exe jr017063.exe PID 3112 wrote to memory of 1792 3112 zipm7435.exe ku191442.exe PID 3112 wrote to memory of 1792 3112 zipm7435.exe ku191442.exe PID 3112 wrote to memory of 1792 3112 zipm7435.exe ku191442.exe PID 1792 wrote to memory of 4604 1792 ku191442.exe 1.exe PID 1792 wrote to memory of 4604 1792 ku191442.exe 1.exe PID 1792 wrote to memory of 4604 1792 ku191442.exe 1.exe PID 3068 wrote to memory of 5804 3068 ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exe lr811770.exe PID 3068 wrote to memory of 5804 3068 ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exe lr811770.exe PID 3068 wrote to memory of 5804 3068 ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exe lr811770.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exe"C:\Users\Admin\AppData\Local\Temp\ebc9b53251b9db639f2bba03a266980d0f2058f3d74b8d6f53c2e00c6466ab3e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipm7435.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipm7435.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr017063.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr017063.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku191442.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku191442.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 15164⤵
- Program crash
PID:5632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr811770.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr811770.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1792 -ip 17921⤵PID:5468
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3504
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5549ac239b0c462b29be9fb2ebdf9385f
SHA1388d9d97fba24295fb1a9a0a4e8540ffdb1eac7a
SHA256270cae08f94e6d6622e69b39030fd67747cd225938300310fed0d464f3527def
SHA5126b63e556243678cc2509d3489cd9f7bd782514009de232170bbd216a67c37f2847cbe3c2f36bcfc39dcff0b3ae2ae8065b46394b3eaf5f4ad5792f4adc1886a4
-
Filesize
498KB
MD5e7ef01128250dbcab1976063082e8cb2
SHA100ea58065c2a10cc48181c5256236ff5a8737f81
SHA2567bf28ca700aa2dfc9522bb3e412c1e889456e02649584ea174feb60abae928dd
SHA51231f7547e24b2df20e0e20baded1e6bb43042eebe3857038d1625a31db95d2622772cb51178986addc041319cd265dd1b2233741fa6845bccf740114f0fcb82d4
-
Filesize
12KB
MD5c59e4b4ef0338ed3f4eb6c2e38de0cc8
SHA14ab83edb120a6be86d6a08c952ebe97bfd76ea81
SHA25673640aee351548a3b8e3397ce2f8eb3e6b0b8a9d2c777528912d0940cbd14c58
SHA5127a56dadf000e678822887fbad6d736a3b39c3b21aac5f165178bee20caa18fe552551c6cbf74c104bd1fda42941a24159a596ea37e70a78ffa6ac933a73b4447
-
Filesize
417KB
MD5aa5c68db4e7802f371a364e90d45c2f7
SHA1d3677eee545411ff87a9c34cc44e765bac3d2afc
SHA256415ed79c4c42257b430f221509cf610a08f3ec0281b68780a00e9e4fa044b8a3
SHA5123906bdae1fcd68d42028ff34b9da0f571327792bd3b7857fcf9c13039c8a97fd72856021402ff8b5371b7fffe6061bae2d677728acc69dcdbd4fcf75af687d96
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0