Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exe
Resource
win10v2004-20241007-en
General
-
Target
b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exe
-
Size
661KB
-
MD5
4181d667649f00e34658d5d1830a23f4
-
SHA1
7995a3aa53098c32ca93c55889b4c34c323fe745
-
SHA256
b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3
-
SHA512
16c3d427f4c340959cf44a5cad545ad814b9794c29ca70f91feb302bd39431a41a1b7741186865fbd4ccb596f5827d42d28ef824b285708d6b01765eea426307
-
SSDEEP
12288:HMrqy906Aafmjj/ZEcxeYScB9TZLjBfyDy7KYzj2XhSzc2/EBvzLGaB5p:9ybKj/aEVSs9TZLjBNJv2XhEtsvvGO
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr144690.exe healer behavioral1/memory/1732-15-0x0000000000FA0000-0x0000000000FAA000-memory.dmp healer -
Healer family
-
Processes:
jr144690.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr144690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr144690.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr144690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr144690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr144690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr144690.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4676-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1328-2118-0x00000000002F0000-0x0000000000320000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr735887.exe family_redline behavioral1/memory/468-2129-0x0000000000DA0000-0x0000000000DCE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku014433.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ku014433.exe -
Executes dropped EXE 5 IoCs
Processes:
zijQ2453.exejr144690.exeku014433.exe1.exelr735887.exepid process 3128 zijQ2453.exe 1732 jr144690.exe 4676 ku014433.exe 1328 1.exe 468 lr735887.exe -
Processes:
jr144690.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr144690.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exezijQ2453.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zijQ2453.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3924 4676 WerFault.exe ku014433.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exezijQ2453.exeku014433.exe1.exelr735887.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zijQ2453.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku014433.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr735887.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr144690.exepid process 1732 jr144690.exe 1732 jr144690.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr144690.exeku014433.exedescription pid process Token: SeDebugPrivilege 1732 jr144690.exe Token: SeDebugPrivilege 4676 ku014433.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exezijQ2453.exeku014433.exedescription pid process target process PID 2644 wrote to memory of 3128 2644 b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exe zijQ2453.exe PID 2644 wrote to memory of 3128 2644 b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exe zijQ2453.exe PID 2644 wrote to memory of 3128 2644 b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exe zijQ2453.exe PID 3128 wrote to memory of 1732 3128 zijQ2453.exe jr144690.exe PID 3128 wrote to memory of 1732 3128 zijQ2453.exe jr144690.exe PID 3128 wrote to memory of 4676 3128 zijQ2453.exe ku014433.exe PID 3128 wrote to memory of 4676 3128 zijQ2453.exe ku014433.exe PID 3128 wrote to memory of 4676 3128 zijQ2453.exe ku014433.exe PID 4676 wrote to memory of 1328 4676 ku014433.exe 1.exe PID 4676 wrote to memory of 1328 4676 ku014433.exe 1.exe PID 4676 wrote to memory of 1328 4676 ku014433.exe 1.exe PID 2644 wrote to memory of 468 2644 b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exe lr735887.exe PID 2644 wrote to memory of 468 2644 b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exe lr735887.exe PID 2644 wrote to memory of 468 2644 b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exe lr735887.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exe"C:\Users\Admin\AppData\Local\Temp\b4dfb7e75a60adb544d49f6efd8f3cbdb700497b2cfad2540fe16dad8d4e91b3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zijQ2453.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zijQ2453.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr144690.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr144690.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku014433.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku014433.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 13764⤵
- Program crash
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr735887.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr735887.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4676 -ip 46761⤵PID:3256
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5e647e1ec6f0cfcce12b77f720bda54f4
SHA166ddb104b48aabcda5b1952e01fcf150f4c6d990
SHA256e72edecec2382c98ec80c403c0bf7839ef96b77942dcee1e08023ae80ee8ede0
SHA512076b17307f8b1fdb23337284952a34b23623840250566e9ea02c794d47b42cee3be654fa36d5882ab171f22fcf77ea2ca42bd08d16631714697d6f5ae07c7bf3
-
Filesize
507KB
MD5cad14592fe47ecd1881b34ddd9565c72
SHA14c44b06aaf5d2b71936e0162869bbf9fdfd03fb0
SHA2564005a41bd17e7c675aa2d4864bea48f8e7c01f57279b35214206680689d1d10e
SHA512bc1457fd78022449a32f9442f4cfc5c84d02b3435541ed6edb3c942e93ce243f557f1a3299b7e74e616846963cfb642f2c9aa154c6bafd388d6bd06d74cf28de
-
Filesize
11KB
MD511a8335b9a735da66bfdc28e0b864cb3
SHA1689d6617916bd4581abde04bc79932efa3613d86
SHA256d7d8bddc6c6e500d5a6562d7ea5d79849939251bcb26f1adc47475c62dbbf86a
SHA5127983a27d1204aebb8800a7002a42a4137d4944977b40608710a564889fb5fd6b0acffe91ac7096e5beb75dc910d129d6a5377e3ec52231980c2e55acbcaa4e15
-
Filesize
435KB
MD5641409e8e5cba9035c7a6f6afeec3770
SHA1898a8b533a37eaa46a3359349011ab0c8f9e3734
SHA2566ba239ded124b5ea070ecea3aea98db7c8e4ee2260c3f23feaf1fb9dee541a1f
SHA5125559aa7b9bcf5e7587d8336d2f55ea2fe038704800f50c3bc423d5ec8c6ba01886ca109f2f59838f19e8af95e04fa3a80e162fe63faa08c1c22926f2774d7f15
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0