Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 03:57
Static task
static1
Behavioral task
behavioral1
Sample
1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73.exe
Resource
win10v2004-20241007-en
General
-
Target
1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73.exe
-
Size
926KB
-
MD5
af2b0093e91d0db81808c2f50ac16739
-
SHA1
d741b98e79078516266d90b86c3489dc2a4f6dde
-
SHA256
1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73
-
SHA512
80133c603b37309dbdc2128d58fa5c07628ef7cde74acf5a01f6d22feb74a3aac13e377b07442d9af0acb7e43a61e3a14049b9f6522e112ef5fa959a6ba0bb90
-
SSDEEP
24576:UyluDEeJM6RlUbO4IPNojyTqjVD9rkyZXUH:j4DEePuOjl6n5uyp
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c96-19.dat healer behavioral1/memory/3868-22-0x0000000000A10000-0x0000000000A1A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it388581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it388581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it388581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it388581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it388581.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it388581.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4984-2112-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x000f000000023b50-2117.dat family_redline behavioral1/memory/216-2125-0x00000000004A0000-0x00000000004D0000-memory.dmp family_redline behavioral1/files/0x0007000000023c94-2134.dat family_redline behavioral1/memory/232-2136-0x00000000004C0000-0x00000000004EE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation jr175317.exe -
Executes dropped EXE 6 IoCs
pid Process 4348 ziDn7902.exe 4864 zidq3200.exe 3868 it388581.exe 4984 jr175317.exe 216 1.exe 232 kp495632.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it388581.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziDn7902.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zidq3200.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5320 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4716 4984 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziDn7902.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zidq3200.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr175317.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp495632.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3868 it388581.exe 3868 it388581.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3868 it388581.exe Token: SeDebugPrivilege 4984 jr175317.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3384 wrote to memory of 4348 3384 1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73.exe 84 PID 3384 wrote to memory of 4348 3384 1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73.exe 84 PID 3384 wrote to memory of 4348 3384 1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73.exe 84 PID 4348 wrote to memory of 4864 4348 ziDn7902.exe 85 PID 4348 wrote to memory of 4864 4348 ziDn7902.exe 85 PID 4348 wrote to memory of 4864 4348 ziDn7902.exe 85 PID 4864 wrote to memory of 3868 4864 zidq3200.exe 87 PID 4864 wrote to memory of 3868 4864 zidq3200.exe 87 PID 4864 wrote to memory of 4984 4864 zidq3200.exe 97 PID 4864 wrote to memory of 4984 4864 zidq3200.exe 97 PID 4864 wrote to memory of 4984 4864 zidq3200.exe 97 PID 4984 wrote to memory of 216 4984 jr175317.exe 98 PID 4984 wrote to memory of 216 4984 jr175317.exe 98 PID 4984 wrote to memory of 216 4984 jr175317.exe 98 PID 4348 wrote to memory of 232 4348 ziDn7902.exe 103 PID 4348 wrote to memory of 232 4348 ziDn7902.exe 103 PID 4348 wrote to memory of 232 4348 ziDn7902.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73.exe"C:\Users\Admin\AppData\Local\Temp\1781ddb602a316730559d94109077fd3718e6d208ab0f6888cf259283ce14e73.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDn7902.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDn7902.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidq3200.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zidq3200.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it388581.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it388581.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr175317.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr175317.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 15285⤵
- Program crash
PID:4716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp495632.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp495632.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:232
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4984 -ip 49841⤵PID:4316
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5320
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661KB
MD5899e9120c658e7e3c7c2c7a9a9a21aab
SHA15fd2c3ffb8ce0d3c27a026ae5223bba45e1ec3b9
SHA256cbf258d649c1f92b2f1eec9f66661daa294d222056719fb6752c408e9fcfd25c
SHA51263c4ee6c2e65caf77399bd1f7d720f0c781bbd63908641627694c27950bd32760ea31f6c41d952c9505db10f8c520377a3f646b67a3f29a50c072c31d71b8fae
-
Filesize
168KB
MD5a92b838486aaf2643db0e49a680ce9fc
SHA137498bbf5c651868fec1b669e39ba07819c7e4f5
SHA2566b068b2cc1baa6e84a71172d77dc6a4aaa100e3116a2fcbc9b58162571b86121
SHA5121521fdc8a8d17a935596154b9bb362ed00c5e2f5bc391486e08909f3c9195c63fff7d77f3162c5168da51f3abef3001f3e8bb5f27feb04c090cdeb4659c496b2
-
Filesize
507KB
MD5a061a4c274525f0a9142bd6de2b41234
SHA1f5aa622460a3d13185d1913c44e4c0729c723c17
SHA256aa2383f1c4b6fe9010ba121361edd280f8f3a1cac7f9f8c9c18a4d6d05ba59c2
SHA512884523e8c1a5e4aa83437c27723f1bd2036b6299922a12e889365dbbe2db36a70e64ff82448a74dd27b74bdadaac39a00e0bd47c4b7ab9317da3531198efec52
-
Filesize
15KB
MD52447e1e6ad9b17347a382e011eb251b7
SHA15668f8a65e26553a30cb39e8e579f3009d843541
SHA256a0772f1c60f3f4373094eafedfa7353d9c64394218f18dca23229fe500d6d760
SHA512ab050f5ba1cd615117929f14d20ba40c5ca6be6ae6b516644c7742e40ce579b8045832c2ffa776e025fdc4be55eaefd8121e8ad4370897b79d246d9e93adfb4d
-
Filesize
426KB
MD5da3dd22ce8608de812d4c12b72bcddf8
SHA133c3e905e669d111b78445099a4d6e9ee66b1133
SHA2560ae3d29bcf4c3b9fb4abdb411aa2df76d9745dc00429b2cedd946dedb68e86f9
SHA51202c85e1ae6a0ea01400f8a0dd85690cf26cf1d632c79589bb4d6833cd9cf4aeb3e48612285ef99e998b254c0f772f53cb6824b39afde18284e95a3aaf1503c02
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0