Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 20:25
Static task
static1
Behavioral task
behavioral1
Sample
fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exe
Resource
win10v2004-20241007-en
General
-
Target
fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exe
-
Size
651KB
-
MD5
71fb0d37a4870325722c6eee670cadd9
-
SHA1
ba60ff1aa001da1a6e04a6129b3cde4643a0d860
-
SHA256
fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16
-
SHA512
dd04eefede1a157ca28c432161ee3e3462630e00dbe52c1628852fa1be48ab6603d9b46c92e2b8f699e3a527c1ddbec8e7980a92af7f3a67bc2017b9984bbc03
-
SSDEEP
12288:+Mr+y904G8ak+cy2IHy6F7CY91hPoFu383+pgGUq/r8CQE36Kv:gyhG8alWIppPmTGRbQy6G
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr264220.exe healer behavioral1/memory/2492-15-0x0000000000BC0000-0x0000000000BCA000-memory.dmp healer -
Healer family
-
Processes:
jr264220.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr264220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr264220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr264220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr264220.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr264220.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr264220.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4780-2104-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5992-2117-0x0000000000D60000-0x0000000000D90000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742281.exe family_redline behavioral1/memory/2360-2128-0x0000000000730000-0x000000000075E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku196057.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku196057.exe -
Executes dropped EXE 5 IoCs
Processes:
zixb0320.exejr264220.exeku196057.exe1.exelr742281.exepid process 4184 zixb0320.exe 2492 jr264220.exe 4780 ku196057.exe 5992 1.exe 2360 lr742281.exe -
Processes:
jr264220.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr264220.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exezixb0320.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zixb0320.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2980 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4632 4780 WerFault.exe ku196057.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exezixb0320.exeku196057.exe1.exelr742281.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zixb0320.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku196057.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr742281.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr264220.exepid process 2492 jr264220.exe 2492 jr264220.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr264220.exeku196057.exedescription pid process Token: SeDebugPrivilege 2492 jr264220.exe Token: SeDebugPrivilege 4780 ku196057.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exezixb0320.exeku196057.exedescription pid process target process PID 4920 wrote to memory of 4184 4920 fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exe zixb0320.exe PID 4920 wrote to memory of 4184 4920 fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exe zixb0320.exe PID 4920 wrote to memory of 4184 4920 fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exe zixb0320.exe PID 4184 wrote to memory of 2492 4184 zixb0320.exe jr264220.exe PID 4184 wrote to memory of 2492 4184 zixb0320.exe jr264220.exe PID 4184 wrote to memory of 4780 4184 zixb0320.exe ku196057.exe PID 4184 wrote to memory of 4780 4184 zixb0320.exe ku196057.exe PID 4184 wrote to memory of 4780 4184 zixb0320.exe ku196057.exe PID 4780 wrote to memory of 5992 4780 ku196057.exe 1.exe PID 4780 wrote to memory of 5992 4780 ku196057.exe 1.exe PID 4780 wrote to memory of 5992 4780 ku196057.exe 1.exe PID 4920 wrote to memory of 2360 4920 fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exe lr742281.exe PID 4920 wrote to memory of 2360 4920 fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exe lr742281.exe PID 4920 wrote to memory of 2360 4920 fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exe lr742281.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exe"C:\Users\Admin\AppData\Local\Temp\fc6ed45c4fd4e89c3ff2dbea866c702441928b66f0a78007cade33002bef9e16.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixb0320.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixb0320.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr264220.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr264220.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku196057.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku196057.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 14404⤵
- Program crash
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742281.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742281.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4780 -ip 47801⤵PID:3672
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2980
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD52df1834026ca9775a8b1cd2f37a08cf8
SHA108e8c03912a5994e8f1574492b9d77916408746f
SHA2560203d5bc273480cec4dac61a946518cde4b2ba45ac9db8612b346e0d6f8b0f04
SHA512aac36a26daad523efa0bcf845d2ca9cad010316e982150f33ddbfe2f7e51fe1fb7414608ee73d340a3573d54ccddd1bc43741eee5efb99e31a0a42ce84a99f98
-
Filesize
497KB
MD546959a0389f4b7966a166d210a78079a
SHA12b98759cbb4d017cdb1c8fa04b341cc08a1d4530
SHA256980e1735f760406f6eaf2ebcbf3e9e011857cd8db5f6dfb77f102d483de1c61c
SHA51273c66de794dd5dbb90ec7bb6bd9f46de530e2da2ea1676c255e1616ebd4a4a4a98c22aa977f175a86dabfdc06349536cb86e1a508236bcdcfde9b27fae313376
-
Filesize
11KB
MD55a056449d08c1aab6b6edab3b8b96186
SHA1ede42802bbacbfaad07239cfb103a6f8065ffa3a
SHA2560e05a4052a91071df00a80aa173af72cabba89ae3cf3c9453a008509202272cd
SHA5129b316f654038f177cb4d083d6fccc7b6bf4fa0d4c1fc385f39ec09f793118082f3949949ea9b6c8e60b9ac360f547c5bfd643f084e0075aecdb466732182dfa8
-
Filesize
415KB
MD50ed68a610d876b6daa730e689474a873
SHA138f33a09b6d1bbf4581e63f5f44e46df7601ba28
SHA256b1552ec49dd309fe14eb097c644c024d8b04a42c0244a5ed8342af5052096702
SHA5123d7a70019e1a626ed3538088115e40e6b682c551cfefaf49acaf3bbde6130709e5e1bd52bf092cbb73bf02e4ad957c53d56f25a4142a906357a374918b73b1d8
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0