Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 05:44
Static task
static1
Behavioral task
behavioral1
Sample
92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exe
Resource
win10v2004-20241007-en
General
-
Target
92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exe
-
Size
686KB
-
MD5
207acc2d1cd09393d2fc2307b85cd2b8
-
SHA1
eb441d49d854fa1d7c4c5d61cc7e299aa86a1eab
-
SHA256
92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65
-
SHA512
200011513133ec95d9be77abb56b0475f3f1be0a95af45a1a1ea0e693d06b8697684d494e110d4c56bb626a1a50b4e172f3c3af4c80dca66ced3ca98e4d3f2d0
-
SSDEEP
12288:9MrHy90LAqKKdoNrLG4y8CNqL5p9s54lIKwbyjDQpK2xRN2PGkhsmGqyfF:WyB2d2n0NEtGqDULSPGkOM8F
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr867993.exe healer behavioral1/memory/3688-15-0x0000000000D30000-0x0000000000D3A000-memory.dmp healer -
Healer family
-
Processes:
jr867993.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr867993.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr867993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr867993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr867993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr867993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr867993.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4496-2105-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1408-2118-0x0000000000270000-0x00000000002A0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr872902.exe family_redline behavioral1/memory/3200-2129-0x0000000000790000-0x00000000007BE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku962876.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ku962876.exe -
Executes dropped EXE 5 IoCs
Processes:
ziXM5824.exejr867993.exeku962876.exe1.exelr872902.exepid process 3748 ziXM5824.exe 3688 jr867993.exe 4496 ku962876.exe 1408 1.exe 3200 lr872902.exe -
Processes:
jr867993.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr867993.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exeziXM5824.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziXM5824.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5992 4496 WerFault.exe ku962876.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exeziXM5824.exeku962876.exe1.exelr872902.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziXM5824.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku962876.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr872902.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr867993.exepid process 3688 jr867993.exe 3688 jr867993.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr867993.exeku962876.exedescription pid process Token: SeDebugPrivilege 3688 jr867993.exe Token: SeDebugPrivilege 4496 ku962876.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exeziXM5824.exeku962876.exedescription pid process target process PID 4908 wrote to memory of 3748 4908 92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exe ziXM5824.exe PID 4908 wrote to memory of 3748 4908 92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exe ziXM5824.exe PID 4908 wrote to memory of 3748 4908 92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exe ziXM5824.exe PID 3748 wrote to memory of 3688 3748 ziXM5824.exe jr867993.exe PID 3748 wrote to memory of 3688 3748 ziXM5824.exe jr867993.exe PID 3748 wrote to memory of 4496 3748 ziXM5824.exe ku962876.exe PID 3748 wrote to memory of 4496 3748 ziXM5824.exe ku962876.exe PID 3748 wrote to memory of 4496 3748 ziXM5824.exe ku962876.exe PID 4496 wrote to memory of 1408 4496 ku962876.exe 1.exe PID 4496 wrote to memory of 1408 4496 ku962876.exe 1.exe PID 4496 wrote to memory of 1408 4496 ku962876.exe 1.exe PID 4908 wrote to memory of 3200 4908 92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exe lr872902.exe PID 4908 wrote to memory of 3200 4908 92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exe lr872902.exe PID 4908 wrote to memory of 3200 4908 92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exe lr872902.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exe"C:\Users\Admin\AppData\Local\Temp\92e7a951f9d793b2a59b2a44dfd6b7bcb8df4d23f501680a8f12c53ba2e3ea65.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXM5824.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXM5824.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr867993.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr867993.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku962876.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku962876.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 15164⤵
- Program crash
PID:5992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr872902.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr872902.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3200
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4496 -ip 44961⤵PID:6028
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5d650055eb028674cb42dcf44dcb0f666
SHA1797362efaed9181c182c8595a5e6f2eb0a1260e0
SHA2563fef1367e62b560d210275f4851e10474aec3e637807cebbefb557456e78c953
SHA51225c7942f0faced7a3d2e3686472356325ff5b8ed22b7bb3c5eb27fc17e1baced9c555c279083e650bf09d8d50fc5d3bf3b0cc8bbced0697138c8ec793e0ecccd
-
Filesize
531KB
MD526cedd36cd92477cf5e97fab87a82b9c
SHA11e25e4ef4a01378ee572f0d8c8a7ee8ac9f24fbf
SHA2563e61cc47da2fa5d07bd98fb747c02bd98afddcf6cda94d3a81df255776c30d24
SHA512870bf1eda2c00cc9955dd75fbfe2e7a60923d098058d8173f35c44c8dd3d542b70fa3accc665e6b72df9600f5a9c07f55f0d9a21c5d51d40ba9cd249b162155c
-
Filesize
12KB
MD52bfa07bca240cf3ea524ad72363d0890
SHA1d8876b58a11ada1390452eeca8a33af457ad557a
SHA2567642bb810266734a39c5c91158cb28ec4bbde7fa2da8b613aa647067bed20740
SHA512b9d4dbcfeb37c056b417ef0f4861b06c576e1418e81a3a0c24a748075d6253cd3bd64a79803226be164f5e6c2a45474ad9e63298eda5cdfc198c1ba0556f8a2e
-
Filesize
495KB
MD56eb6f78cffad9e5a294a5b94d1aed2b0
SHA1fe0b334cafa5e436adff8eaa93a97ea6388f4e4f
SHA25675408194d60c76a7dfd5b92751616be4d921f6541121dc5babe3f0af42584da8
SHA512dc0028fc76e996f829f4a5fdbf97ce262d4e16e46154c81d971e93000786e579b2ecc38cb1cc11023040de142af5d316c8b4adc006f0aa2a0d43c1e411fa9d08
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0