Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 05:44
Static task
static1
Behavioral task
behavioral1
Sample
a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exe
Resource
win10v2004-20241007-en
General
-
Target
a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exe
-
Size
684KB
-
MD5
6aed8cf736c6e56e972e260aa6c62c3f
-
SHA1
b6105839d343c5774c14c5c58ba1c5ca18abb23b
-
SHA256
a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857
-
SHA512
4e4f886b7e883a70af10cf7d38e015bd26420d42717995e0cdd3731eadd7d626170f809154723a4ce54165a71933440d090bcf6c0872b0b30f2650d88e942fbc
-
SSDEEP
12288:iMrSy90T6JoRPiEUddDgwDuBLWyMFLc73iMixiXSLOv2Zf3XE+HNq4M:UygRPicXcLiitSrehHEQIP
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr062798.exe healer behavioral1/memory/632-15-0x0000000000B70000-0x0000000000B7A000-memory.dmp healer -
Healer family
-
Processes:
jr062798.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr062798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr062798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr062798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr062798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr062798.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr062798.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2268-2105-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2208-2118-0x0000000000EE0000-0x0000000000F10000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr019136.exe family_redline behavioral1/memory/6124-2129-0x0000000000ED0000-0x0000000000EFE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku672993.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ku672993.exe -
Executes dropped EXE 5 IoCs
Processes:
zism3989.exejr062798.exeku672993.exe1.exelr019136.exepid process 1204 zism3989.exe 632 jr062798.exe 2268 ku672993.exe 2208 1.exe 6124 lr019136.exe -
Processes:
jr062798.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr062798.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exezism3989.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zism3989.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2424 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5624 2268 WerFault.exe ku672993.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku672993.exe1.exelr019136.exea5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exezism3989.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku672993.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr019136.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zism3989.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr062798.exepid process 632 jr062798.exe 632 jr062798.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr062798.exeku672993.exedescription pid process Token: SeDebugPrivilege 632 jr062798.exe Token: SeDebugPrivilege 2268 ku672993.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exezism3989.exeku672993.exedescription pid process target process PID 4304 wrote to memory of 1204 4304 a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exe zism3989.exe PID 4304 wrote to memory of 1204 4304 a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exe zism3989.exe PID 4304 wrote to memory of 1204 4304 a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exe zism3989.exe PID 1204 wrote to memory of 632 1204 zism3989.exe jr062798.exe PID 1204 wrote to memory of 632 1204 zism3989.exe jr062798.exe PID 1204 wrote to memory of 2268 1204 zism3989.exe ku672993.exe PID 1204 wrote to memory of 2268 1204 zism3989.exe ku672993.exe PID 1204 wrote to memory of 2268 1204 zism3989.exe ku672993.exe PID 2268 wrote to memory of 2208 2268 ku672993.exe 1.exe PID 2268 wrote to memory of 2208 2268 ku672993.exe 1.exe PID 2268 wrote to memory of 2208 2268 ku672993.exe 1.exe PID 4304 wrote to memory of 6124 4304 a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exe lr019136.exe PID 4304 wrote to memory of 6124 4304 a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exe lr019136.exe PID 4304 wrote to memory of 6124 4304 a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exe lr019136.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exe"C:\Users\Admin\AppData\Local\Temp\a5e30eb7a5ca134cb19f34d919343f3146c6ef9f95e8927c05369951bbb95857.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zism3989.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zism3989.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr062798.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr062798.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku672993.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku672993.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 15204⤵
- Program crash
PID:5624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr019136.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr019136.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2268 -ip 22681⤵PID:1596
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2424
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5a7cfe00fd8135c0607c18fc9ccda8ee0
SHA126cd0bf2dfbe765463d5dc6a25a7f095d284abf5
SHA256ca9dbb1743d9a6f57d0ccd4634b504f3c77c4a884af77d1a737fd11873e04d7c
SHA5126a2721622e4ea705501b8f1ca720c593b636b9965e085be61108e518a692daa6ebd0bb7a71d311b7285faf4369d0f27526f3b0e5ce753d5625029ef5ece0c5af
-
Filesize
530KB
MD5d264861fb33864eb23c7e0a4c0795c4f
SHA1b34e7edad9d84a4065aeed8fcf154701201c038d
SHA2564529ad32264fe7dc991a783f342ddf7def6b9eb553ec16fd943d4421671f1569
SHA5124b31c7ca48bc05e5c36fab1c67e5686614e1dd9093d986122909180479b8eef2e62d4f73ede3a2847fe3f7f18e038889d054ebcb20ecfdc7e3d609f98a6b4c33
-
Filesize
12KB
MD54e830b404877192fb10fd4898328f562
SHA1033a3bf87e87ab5493bce17d647bea209ecf0314
SHA2569322accd6337b8614383992039832f90bed364e733686632d51b3490d87aeb26
SHA512374e1ba4594cd079543b472d1ee55123de56e4d53564c8ede8713af84c93200c0e12dcde69dfdc5ee4d367233e3a3d7c62dab4ac4c0e7ea1c293909a2a5cc9cc
-
Filesize
495KB
MD50eb3e58464ce32e3fb9ab3807b6bd557
SHA1105344650eacd7de7be0a086778cb3280043f2a0
SHA256b806b65e9bba550d4a4454ba484665ed35d64342245b52d2810645177d2fa99d
SHA51219f4923c3a416850b9a0454c5eab8552a917859eac22c2e1d8f20a3f9c2a656ff0991e695b704827942cdeb156fcda81c3c44047620fa398c572daa9630a8dbe
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0