Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 03:17
Static task
static1
Behavioral task
behavioral1
Sample
15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exe
Resource
win10v2004-20241007-en
General
-
Target
15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exe
-
Size
661KB
-
MD5
84be63ae36c7a4638f5163538c418d2f
-
SHA1
9ab586c337a0e350931d31a4c2811d9128652abd
-
SHA256
15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023
-
SHA512
c933f498bc3280c80d1a34a16e8dc92c18298339aa6f5d1f435fef178ea290cf509e29a1c3e9e1434b2d06424c5f062bf2c5070a6b541018fa16b440b5565d8d
-
SSDEEP
12288:2MrXy90JKfPyz7dmDfgPni2gLv3pjZcjBfnXyddYzPv0Szcs3phUNEAv9hVNy:VySKfqz7iIPXiZjZcjBCeDv0ELjbAv94
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr846762.exe healer behavioral1/memory/2032-15-0x0000000000F30000-0x0000000000F3A000-memory.dmp healer -
Healer family
-
Processes:
jr846762.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr846762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr846762.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr846762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr846762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr846762.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr846762.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/972-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3960-2118-0x0000000000E20000-0x0000000000E50000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr122940.exe family_redline behavioral1/memory/6084-2129-0x0000000000980000-0x00000000009AE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku090125.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku090125.exe -
Executes dropped EXE 5 IoCs
Processes:
zisB7831.exejr846762.exeku090125.exe1.exelr122940.exepid process 1132 zisB7831.exe 2032 jr846762.exe 972 ku090125.exe 3960 1.exe 6084 lr122940.exe -
Processes:
jr846762.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr846762.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exezisB7831.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zisB7831.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5708 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5128 972 WerFault.exe ku090125.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
zisB7831.exeku090125.exe1.exelr122940.exe15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zisB7831.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku090125.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr122940.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr846762.exepid process 2032 jr846762.exe 2032 jr846762.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr846762.exeku090125.exedescription pid process Token: SeDebugPrivilege 2032 jr846762.exe Token: SeDebugPrivilege 972 ku090125.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exezisB7831.exeku090125.exedescription pid process target process PID 1524 wrote to memory of 1132 1524 15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exe zisB7831.exe PID 1524 wrote to memory of 1132 1524 15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exe zisB7831.exe PID 1524 wrote to memory of 1132 1524 15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exe zisB7831.exe PID 1132 wrote to memory of 2032 1132 zisB7831.exe jr846762.exe PID 1132 wrote to memory of 2032 1132 zisB7831.exe jr846762.exe PID 1132 wrote to memory of 972 1132 zisB7831.exe ku090125.exe PID 1132 wrote to memory of 972 1132 zisB7831.exe ku090125.exe PID 1132 wrote to memory of 972 1132 zisB7831.exe ku090125.exe PID 972 wrote to memory of 3960 972 ku090125.exe 1.exe PID 972 wrote to memory of 3960 972 ku090125.exe 1.exe PID 972 wrote to memory of 3960 972 ku090125.exe 1.exe PID 1524 wrote to memory of 6084 1524 15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exe lr122940.exe PID 1524 wrote to memory of 6084 1524 15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exe lr122940.exe PID 1524 wrote to memory of 6084 1524 15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exe lr122940.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exe"C:\Users\Admin\AppData\Local\Temp\15dad1f8cabb6b66c7951c075596de2ffd1aa53be098a1ede451d956e80db023.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisB7831.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisB7831.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr846762.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr846762.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku090125.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku090125.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 15444⤵
- Program crash
PID:5128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr122940.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr122940.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 972 -ip 9721⤵PID:3428
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5708
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD54f5cc5939d4c114a858c8a00b5690a7d
SHA186a6f877703bb53a4deb3ce18bbc1ac52abfde8c
SHA2567c8cfe15f9b165447b4a5d967809f5a080300993741c0df5e85a621bf56c2096
SHA51207f8023634ca574c7717d7c9ab2c72c27995c320b8f9d1292fc790f884aa6943114e0a944a5e56dc743e553ef19a65d7be44a7b2dbccc736fc1a245acfa845d5
-
Filesize
507KB
MD5c8dbcd772a925173d32ea48de9ea5151
SHA1c97ad7b7af3630cb2b7566f4dcec8c4c50d17418
SHA256316ed14aa69192656093bc15f26f139b972cfb7a37be94dc6350b4722c129b1f
SHA512f37ddd4dd1a05d3fe00ee4978da911d63359245268c367196067dafa665b251b9e2ecc39843212c5d72504b30ce57378f1fa763526a16a9b99bfe0db1115afb8
-
Filesize
11KB
MD574f89a0b9ff9389fd8657992b726e45e
SHA11aea38cc5f5a340a0c281a870f03a10ce48ed3f0
SHA25612c6ccdb64789a5a12a760868a646ba024a8c60a631ac32b2d166fb244761dc2
SHA51282437db3eafca5a6742764b43fbc7fec4aba8a1015019d16502e49b7f31e462831033be11847524fccb6ace4f90e7fcdff1fd48ca015dcc089ea2774f9647699
-
Filesize
435KB
MD5ae743a811e4915f6a2cdf023bf4d0673
SHA10129b04e17fbcacc7c23aa0f83ef8330f69b3dad
SHA256d7acc7ed548ab3a0327b209a26def31e13b6943d9bb06c5c14519312fbe36470
SHA5125e28e59946839f5ea3e963722acb74766314659e59e3f29d304bf14b13d940e3cc482e555f56d3ea4b7dbd40ce24b4815628878b0962f514463336ffc83d1dc7
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0