Analysis
-
max time kernel
148s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 00:31
Static task
static1
Behavioral task
behavioral1
Sample
a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe
Resource
win10v2004-20241007-en
General
-
Target
a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe
-
Size
656KB
-
MD5
b3cebaffc1f73ffdda1078e0efa9217a
-
SHA1
9b278245d5c88fa267da3d72b6175cbeede07daa
-
SHA256
a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4
-
SHA512
cb801a5f47836e34ea9997d955cbbdc371bab5be1b1e10a53bc5a981344d8752dfadae0f9b7dabe87838b632d518dc765e3fb904a73d9e1e898946b6d36cbd83
-
SSDEEP
12288:NMrqy90RdS6EYdyIvz/x0wGSn48Zt44F6PZ+iqR3eO/NPbSyA9d:jyTpYVTx0wDn4A/F6PZ4RDPbSyId
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr241754.exe healer behavioral1/memory/4780-15-0x0000000000410000-0x000000000041A000-memory.dmp healer -
Healer family
-
Processes:
jr241754.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr241754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr241754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr241754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr241754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr241754.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr241754.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2380-2104-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4896-2116-0x0000000000F70000-0x0000000000FA0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746041.exe family_redline behavioral1/memory/3860-2129-0x0000000000020000-0x000000000004E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku380506.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ku380506.exe -
Executes dropped EXE 5 IoCs
Processes:
ziWz5217.exejr241754.exeku380506.exe1.exelr746041.exepid process 3616 ziWz5217.exe 4780 jr241754.exe 2380 ku380506.exe 4896 1.exe 3860 lr746041.exe -
Processes:
jr241754.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr241754.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exeziWz5217.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWz5217.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3440 2380 WerFault.exe ku380506.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exeziWz5217.exeku380506.exe1.exelr746041.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziWz5217.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku380506.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr746041.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr241754.exepid process 4780 jr241754.exe 4780 jr241754.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr241754.exeku380506.exedescription pid process Token: SeDebugPrivilege 4780 jr241754.exe Token: SeDebugPrivilege 2380 ku380506.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exeziWz5217.exeku380506.exedescription pid process target process PID 2348 wrote to memory of 3616 2348 a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe ziWz5217.exe PID 2348 wrote to memory of 3616 2348 a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe ziWz5217.exe PID 2348 wrote to memory of 3616 2348 a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe ziWz5217.exe PID 3616 wrote to memory of 4780 3616 ziWz5217.exe jr241754.exe PID 3616 wrote to memory of 4780 3616 ziWz5217.exe jr241754.exe PID 3616 wrote to memory of 2380 3616 ziWz5217.exe ku380506.exe PID 3616 wrote to memory of 2380 3616 ziWz5217.exe ku380506.exe PID 3616 wrote to memory of 2380 3616 ziWz5217.exe ku380506.exe PID 2380 wrote to memory of 4896 2380 ku380506.exe 1.exe PID 2380 wrote to memory of 4896 2380 ku380506.exe 1.exe PID 2380 wrote to memory of 4896 2380 ku380506.exe 1.exe PID 2348 wrote to memory of 3860 2348 a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe lr746041.exe PID 2348 wrote to memory of 3860 2348 a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe lr746041.exe PID 2348 wrote to memory of 3860 2348 a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe lr746041.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe"C:\Users\Admin\AppData\Local\Temp\a75de942c3bd387290eb7322601dd772f875364542541f4a1b8da74f13661aa4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWz5217.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWz5217.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr241754.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr241754.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku380506.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku380506.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 13684⤵
- Program crash
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746041.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr746041.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2380 -ip 23801⤵PID:3576
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD57d9a519bbb142afb1ddeaca85054c069
SHA1865690d03021179ab95feccf1955064ed1e2fa2e
SHA256d109f7caa91c79426baca9d32e6f14db5b429c70a10fa8e5709db0706512b157
SHA512663cda2da185ac62eeb04d9004f46949d32229ff8daaced0740a53303d0139bd8a789fa0b8e74d3fe697666a558d0785ac7554cbf6c982422358ee5f2167950c
-
Filesize
502KB
MD5d19841258e3aa334f996e5d4d5c6b854
SHA181d1dd24bf375dd7ce2457eee497699f5572b1e4
SHA256d28cbaa57df819ed7db39dbf5a21ef69d7301749199954fc55bbd1a62e6bc848
SHA5120581261180eb384b4ed148a872d6bcadbf5df1d549640457ed0c344a6741afec82ca2d5d23372d98a0fa72bbdbe52da8d61e4183529016d67a51748825568d96
-
Filesize
11KB
MD544cec223ac4401073f6ed3b5215b71c1
SHA166178e73446d4132cbfae037418f7f046c901e31
SHA25691ce5075b4ac3b6eacf73c42012161ab10b240c03e624f2433e7aa6f4dc5d55e
SHA512cd0368f1f1398f260e80922a4f163fa6dda75beb2317753e896bcabdde46d33e4467d54918f15bc484ae488d034a1efb934b31ae1988b857de406bbbc043aefb
-
Filesize
424KB
MD5826dbd9678905b3773f5609a0c51a240
SHA1185a02664839ff4f70b0d49500c2c944ef008e7a
SHA256e92768496434fd38c23e0b3c581499ea8bca541e77f45179a04850abdc7f9d1b
SHA512fe3f2296517c00b05b77f573028f3c38a33e66b3debeb9d33ebaec795c67a271ca467f0c205be4238e6959ca6e301b0b1163ea19200267d5e0c0d0e217312994
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0