Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 00:57
Static task
static1
Behavioral task
behavioral1
Sample
a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exe
Resource
win10v2004-20241007-en
General
-
Target
a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exe
-
Size
655KB
-
MD5
51d48c610b71b0f62e4a84f34e16b54a
-
SHA1
01e920134c34063695a08b9d2a2c476fc40bf6dc
-
SHA256
a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07
-
SHA512
3b5da488439e8bf38bfbfd005051fcea4f782c98d7e2551383e22df95b3fd8731391192565620ad3fc0fa9a0519848d06cce850c1ce5d7f9a4ddf57342b616c8
-
SSDEEP
12288:oMr/y90e8MjB4E0U4d0L16Gzga1Sna83t44SuGZ5xqaz3h/NPQ6S5vINtxY6kvNn:nyB7jBt4dg16Gzgasnae/SuGZaajPQ62
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr416585.exe healer behavioral1/memory/4160-15-0x0000000000E10000-0x0000000000E1A000-memory.dmp healer -
Healer family
-
Processes:
jr416585.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr416585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr416585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr416585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr416585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr416585.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr416585.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1104-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4752-2118-0x0000000000570000-0x00000000005A0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742609.exe family_redline behavioral1/memory/5176-2129-0x00000000004E0000-0x000000000050E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku577665.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation ku577665.exe -
Executes dropped EXE 5 IoCs
Processes:
ziag6780.exejr416585.exeku577665.exe1.exelr742609.exepid process 1632 ziag6780.exe 4160 jr416585.exe 1104 ku577665.exe 4752 1.exe 5176 lr742609.exe -
Processes:
jr416585.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr416585.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exeziag6780.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziag6780.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1272 1104 WerFault.exe ku577665.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exeziag6780.exeku577665.exe1.exelr742609.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziag6780.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku577665.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr742609.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr416585.exepid process 4160 jr416585.exe 4160 jr416585.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr416585.exeku577665.exedescription pid process Token: SeDebugPrivilege 4160 jr416585.exe Token: SeDebugPrivilege 1104 ku577665.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exeziag6780.exeku577665.exedescription pid process target process PID 1556 wrote to memory of 1632 1556 a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exe ziag6780.exe PID 1556 wrote to memory of 1632 1556 a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exe ziag6780.exe PID 1556 wrote to memory of 1632 1556 a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exe ziag6780.exe PID 1632 wrote to memory of 4160 1632 ziag6780.exe jr416585.exe PID 1632 wrote to memory of 4160 1632 ziag6780.exe jr416585.exe PID 1632 wrote to memory of 1104 1632 ziag6780.exe ku577665.exe PID 1632 wrote to memory of 1104 1632 ziag6780.exe ku577665.exe PID 1632 wrote to memory of 1104 1632 ziag6780.exe ku577665.exe PID 1104 wrote to memory of 4752 1104 ku577665.exe 1.exe PID 1104 wrote to memory of 4752 1104 ku577665.exe 1.exe PID 1104 wrote to memory of 4752 1104 ku577665.exe 1.exe PID 1556 wrote to memory of 5176 1556 a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exe lr742609.exe PID 1556 wrote to memory of 5176 1556 a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exe lr742609.exe PID 1556 wrote to memory of 5176 1556 a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exe lr742609.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exe"C:\Users\Admin\AppData\Local\Temp\a5e203e664588177849c185c9467a7a760f709f688b400ad7f1bb02e2172dd07.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziag6780.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziag6780.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr416585.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr416585.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku577665.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku577665.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 14644⤵
- Program crash
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742609.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr742609.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5176
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1104 -ip 11041⤵PID:576
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD56f79f2835024c59ccaeb7106b26949d3
SHA1b6a72838fb04e5d8f0c276a450eb33980946d946
SHA2564989586aa82ddf475716ebcb4b799f892877652b3c4e57f85fb0f616b4b57cb7
SHA51204c2452d0deb4ff79f30d7628a75bc073bfd0b808545718cc17e3c8635c7da851204cf5ad2591466288edea57c8fcc18015103b5e66024317da5a0776f968089
-
Filesize
502KB
MD50e1dd0039f70ed5eac060f489e9d6ac5
SHA147b7c423ca2c20ca53eb41f47aff50c43a180460
SHA256e42d3cb5b134fa7e5a0ac0cf233eda0dce4eeadd9b2f8b2064027cc426866ada
SHA512019540cec719b7bcb4e63565db9bd9149feb726c9c098e38d350b7aa393c7ca9b1cb072582bfccc4ce0e6d8574e80450d0fa90fea8caee67537bedf468c43b62
-
Filesize
11KB
MD5ec91863599d430ad5850b59af117f9d4
SHA1d0ffb97ea2c5d3fad45e15a4a3055cace7e5d286
SHA256f84d980ad769a059b0b1c21114add09e2bc344f277f69b9be8dedc9e2d6cfd8e
SHA51224037d0cd0973d36371ea032ea26c44e2a12249e78b335872f76da5d7b4ec647ac1279d32e116c5ffcd4b38c8db2b3d0196918e3d128ed50bcb3de76a7aaf9fe
-
Filesize
424KB
MD5d5517af37b7df77a3a4e72821dec0f0f
SHA1d92565452849d4cee029a1bfc9f8d9c66562f04e
SHA2564918707baa9acaeb8e0b3e4994efc7ff2f7620b95d9b053a0a29dbf22ce35cc8
SHA512a3927a14e25586642bced56d9d1c30dae8028c3839c8e164921c603535048d670cedf7e2cfedeac5ed4a172bfdad1fd80ee8a89745be79cfe2c36f0f8f063636
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0