Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 06:22
Static task
static1
Behavioral task
behavioral1
Sample
c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exe
Resource
win10v2004-20241007-en
General
-
Target
c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exe
-
Size
684KB
-
MD5
3c11945431bf2580c3e53de04ab9c76f
-
SHA1
c023151155ab1e1436ea96aa6a23ff84361b82a7
-
SHA256
c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0
-
SHA512
1f227355acae06ba67d6e0ab880ab388e27a06c3cd53f1dde8ba0f7c548e080ac0b58c149fe61b7e8f8a40effc00b2cd6247c3d5389b3d0022537a65ca26d05c
-
SSDEEP
12288:GMrEy9066KLsWombpiWN2nk3oIB3FL+73/Mi5rXSLORSjIwJmcvTLRv:OyGKYWDpim4k3/Lw/tprcjNJmcvJ
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr050996.exe healer behavioral1/memory/1920-15-0x0000000000A20000-0x0000000000A2A000-memory.dmp healer -
Healer family
-
Processes:
jr050996.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr050996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr050996.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr050996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr050996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr050996.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr050996.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/784-2105-0x0000000005890000-0x00000000058C2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5172-2118-0x0000000000FF0000-0x0000000001020000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr992792.exe family_redline behavioral1/memory/3648-2129-0x0000000000920000-0x000000000094E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku793572.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ku793572.exe -
Executes dropped EXE 5 IoCs
Processes:
zipp3848.exejr050996.exeku793572.exe1.exelr992792.exepid process 3656 zipp3848.exe 1920 jr050996.exe 784 ku793572.exe 5172 1.exe 3648 lr992792.exe -
Processes:
jr050996.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr050996.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exezipp3848.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipp3848.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2996 784 WerFault.exe ku793572.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exezipp3848.exeku793572.exe1.exelr992792.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zipp3848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku793572.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr992792.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr050996.exepid process 1920 jr050996.exe 1920 jr050996.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr050996.exeku793572.exedescription pid process Token: SeDebugPrivilege 1920 jr050996.exe Token: SeDebugPrivilege 784 ku793572.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exezipp3848.exeku793572.exedescription pid process target process PID 5108 wrote to memory of 3656 5108 c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exe zipp3848.exe PID 5108 wrote to memory of 3656 5108 c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exe zipp3848.exe PID 5108 wrote to memory of 3656 5108 c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exe zipp3848.exe PID 3656 wrote to memory of 1920 3656 zipp3848.exe jr050996.exe PID 3656 wrote to memory of 1920 3656 zipp3848.exe jr050996.exe PID 3656 wrote to memory of 784 3656 zipp3848.exe ku793572.exe PID 3656 wrote to memory of 784 3656 zipp3848.exe ku793572.exe PID 3656 wrote to memory of 784 3656 zipp3848.exe ku793572.exe PID 784 wrote to memory of 5172 784 ku793572.exe 1.exe PID 784 wrote to memory of 5172 784 ku793572.exe 1.exe PID 784 wrote to memory of 5172 784 ku793572.exe 1.exe PID 5108 wrote to memory of 3648 5108 c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exe lr992792.exe PID 5108 wrote to memory of 3648 5108 c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exe lr992792.exe PID 5108 wrote to memory of 3648 5108 c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exe lr992792.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exe"C:\Users\Admin\AppData\Local\Temp\c1cec33e84ebf131caa7879479a0ab179fbb272136fe64ee218857dc3e9f3ca0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipp3848.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipp3848.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr050996.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr050996.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku793572.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku793572.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 784 -s 13844⤵
- Program crash
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr992792.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr992792.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 784 -ip 7841⤵PID:1376
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD518e7f7dc262131b90f467aae99902671
SHA1a2789bc5368171c6330f8d1fada0589188eae8f9
SHA25622eaa841a1dfa6a7223d6c2dfabcabcf798905cbda218cfa16e0cd7b6514bc07
SHA51216620fa3d39e0831ddb234969eb069821b939bec15f3992897a52dd342d0e377e9489642e671be4fdf342d6b004ac154611d73a35146e7e37984192e0a036dbd
-
Filesize
530KB
MD567acd9fb637654f243de651ab73b2673
SHA18093e0c84c19ada042349d4233c1ae0cb0cfecb9
SHA256c0518080bbe94b8e19e9453ac00314085dbbd01c7defdfbecbea5fd22285c0a4
SHA512adddb6353dec38158f2bcd40ceaf57a0b871a44420559b01e393f8fdbfa4bf2a926dd80e5d64ab697aeb80fd3182240e3b2e696afcabdc54dcc69934928873a6
-
Filesize
12KB
MD57dc774d346b9c0c00037515944927c8c
SHA1f5bd791a37f401df4d03b9d757d62b79894f657e
SHA256bf27954b5d4c0c1ca8c06d6da583a86cdc7f8aab44e06ca7b6aa5dbb65265d04
SHA512ec8a4b09bd8987148bb8fb90c002c45e92c3190d01b13597424e168096a1d0999d0a714c96c3650f33ca66425553c79e11709b3f119d8bd297108e9a8b62f691
-
Filesize
495KB
MD5816b2fd4a25773f3390173833cfa16b5
SHA1d28387c7170812ea587c9490cce817a8c4c6c336
SHA2563a40efae1bf1c3ae89c85be0ef9568cff1c9054456321ce9a97273dbaad073c4
SHA51218f0de4bd875084fd58eb7d711345b4538aba55a0b0e9d126e9741bc5938719f9a431fe4ec6ea3efd685d2dd6c97f8edebef26fb3a2631604c82a2c12ce6490a
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0