Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 05:38
Static task
static1
Behavioral task
behavioral1
Sample
1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exe
Resource
win10v2004-20241007-en
General
-
Target
1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exe
-
Size
652KB
-
MD5
3748668d146b7a04de6ceedc66516d4e
-
SHA1
714b598143009f1d6d6341b788ce040c4587b7aa
-
SHA256
1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1
-
SHA512
bd1358f0c924e7a28fa689b3aef5ac73942f0d6fca6e9433115002d05579ec26e79b69efb4f47bee3b21df059faef7abda43dab0f41923b5ea618e205935ad49
-
SSDEEP
12288:QMrVy902t7tNfnSBjvoLTapyPiXr8BP9NLVxxTmP0/z:Vy9Xnqj4hP3Nfr
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr635074.exe healer behavioral1/memory/1676-15-0x00000000009A0000-0x00000000009AA000-memory.dmp healer -
Healer family
-
Processes:
jr635074.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr635074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr635074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr635074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr635074.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr635074.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr635074.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2148-2105-0x0000000004E80000-0x0000000004EB2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/404-2118-0x00000000002D0000-0x0000000000300000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr406424.exe family_redline behavioral1/memory/2296-2129-0x0000000000EB0000-0x0000000000EDE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku682744.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ku682744.exe -
Executes dropped EXE 5 IoCs
Processes:
zitw7885.exejr635074.exeku682744.exe1.exelr406424.exepid process 3716 zitw7885.exe 1676 jr635074.exe 2148 ku682744.exe 404 1.exe 2296 lr406424.exe -
Processes:
jr635074.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr635074.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exezitw7885.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zitw7885.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2680 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2536 2148 WerFault.exe ku682744.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exelr406424.exe1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exezitw7885.exeku682744.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr406424.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zitw7885.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku682744.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr635074.exepid process 1676 jr635074.exe 1676 jr635074.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr635074.exeku682744.exedescription pid process Token: SeDebugPrivilege 1676 jr635074.exe Token: SeDebugPrivilege 2148 ku682744.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exezitw7885.exeku682744.exedescription pid process target process PID 3228 wrote to memory of 3716 3228 1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exe zitw7885.exe PID 3228 wrote to memory of 3716 3228 1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exe zitw7885.exe PID 3228 wrote to memory of 3716 3228 1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exe zitw7885.exe PID 3716 wrote to memory of 1676 3716 zitw7885.exe jr635074.exe PID 3716 wrote to memory of 1676 3716 zitw7885.exe jr635074.exe PID 3716 wrote to memory of 2148 3716 zitw7885.exe ku682744.exe PID 3716 wrote to memory of 2148 3716 zitw7885.exe ku682744.exe PID 3716 wrote to memory of 2148 3716 zitw7885.exe ku682744.exe PID 2148 wrote to memory of 404 2148 ku682744.exe 1.exe PID 2148 wrote to memory of 404 2148 ku682744.exe 1.exe PID 2148 wrote to memory of 404 2148 ku682744.exe 1.exe PID 3228 wrote to memory of 2296 3228 1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exe lr406424.exe PID 3228 wrote to memory of 2296 3228 1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exe lr406424.exe PID 3228 wrote to memory of 2296 3228 1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exe lr406424.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exe"C:\Users\Admin\AppData\Local\Temp\1c17a14f04578211c60e9571e3717578ff00e16079aa6fd1a1326db5437e45a1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitw7885.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitw7885.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr635074.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr635074.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku682744.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku682744.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:404 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 15644⤵
- Program crash
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr406424.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr406424.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2148 -ip 21481⤵PID:4088
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5225ffbcbb4d6ace9641e9848f2f9c079
SHA1d79ee753b92ea9d7c3afb42b36b815879c5986d6
SHA2564bb16b0c0c6ec8a39928f7f2590bc9f8ba9cf85454896a92e5a0d799a21b2275
SHA51237106520b0e06b8f5c184bca775573caaaaa47b1aa748087a5957f787b116bbffdc3bd77231376b253a1810257d6a95d4d44d6842af27cb0215e562ab0332fce
-
Filesize
498KB
MD55a5670b9d1841a05c27f8f7138a1cb9e
SHA14742fff62619893b3354561eb83f927767561847
SHA256f926ec6695acd2d7e5bf48ca5a43d9d4ea95b0f04158fc7caf046a6026b93bdb
SHA512d867ab10f679fc21d184d6fa113167896dd3b9a49e9c75c74ff64bdcb3135117bcde45afd57f072413d16e1015d2db556a3667ac0f887083f95a250de636a475
-
Filesize
12KB
MD58aeff4bee49bef534495819012d12335
SHA1c948b67e975133e9476fab30868a1a6927a79522
SHA25678ae2fb27844ac486ceff8a48e1a82a8ab8d6029da7d3503b8f6afe7212d7701
SHA5124e649093ea5c5a762249cf157d936b96dd6154fb15695b083b302acee1b6d0ac9a7f5521208e7c2894849aca2f2419ad60ffb6a32f267a7831b47b377ec95dea
-
Filesize
417KB
MD535787e296af67aec43cd921dab6e1494
SHA1dcdb583c84b9ade13bd60620c99ec55689129fd5
SHA25607121f10a5c8bdec6c7fe0a83973c4dbadca345cfe76946c01079b2b481a3dee
SHA512737419d1055ccd6a6f22ac3b1d0503984274b114d257301663fa0624a000e076c6e74355e6ff4e62502e41c86a72637c4fd25b5451793fbc58ad067b2d7ab9cf
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0