Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 09:08
Static task
static1
Behavioral task
behavioral1
Sample
f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exe
Resource
win10v2004-20241007-en
General
-
Target
f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exe
-
Size
685KB
-
MD5
d2d163ad97be4f6b332162ed9f67a21a
-
SHA1
4749ad61d644b12f7c083832417b9244500e6faa
-
SHA256
f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6
-
SHA512
9012c07cee32a739c503a7ea8138cfde7821077d28a58f6419fe2268b4cf09302a2d81fc0d069f399d04480615d9e1695af8815c694c956a6f4f0d416d6557f9
-
SSDEEP
12288:EMrCy90cQ4rISmyL4Ujq672n1rSjQHG2I/vSgNQGrSnUwhMLS9WXhQC:+yrrvw+stSjQm207ThWtg9
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr877706.exe healer behavioral1/memory/720-15-0x0000000000800000-0x000000000080A000-memory.dmp healer -
Healer family
-
Processes:
jr877706.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr877706.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr877706.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr877706.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr877706.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr877706.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr877706.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1008-2105-0x0000000004FD0000-0x0000000005002000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1560-2118-0x0000000000F00000-0x0000000000F30000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr512821.exe family_redline behavioral1/memory/3112-2129-0x0000000000FE0000-0x000000000100E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku163044.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku163044.exe -
Executes dropped EXE 5 IoCs
Processes:
ziub6530.exejr877706.exeku163044.exe1.exelr512821.exepid process 1896 ziub6530.exe 720 jr877706.exe 1008 ku163044.exe 1560 1.exe 3112 lr512821.exe -
Processes:
jr877706.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr877706.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exeziub6530.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziub6530.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4792 1008 WerFault.exe ku163044.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exeziub6530.exeku163044.exe1.exelr512821.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziub6530.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku163044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr512821.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr877706.exepid process 720 jr877706.exe 720 jr877706.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr877706.exeku163044.exedescription pid process Token: SeDebugPrivilege 720 jr877706.exe Token: SeDebugPrivilege 1008 ku163044.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exeziub6530.exeku163044.exedescription pid process target process PID 3760 wrote to memory of 1896 3760 f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exe ziub6530.exe PID 3760 wrote to memory of 1896 3760 f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exe ziub6530.exe PID 3760 wrote to memory of 1896 3760 f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exe ziub6530.exe PID 1896 wrote to memory of 720 1896 ziub6530.exe jr877706.exe PID 1896 wrote to memory of 720 1896 ziub6530.exe jr877706.exe PID 1896 wrote to memory of 1008 1896 ziub6530.exe ku163044.exe PID 1896 wrote to memory of 1008 1896 ziub6530.exe ku163044.exe PID 1896 wrote to memory of 1008 1896 ziub6530.exe ku163044.exe PID 1008 wrote to memory of 1560 1008 ku163044.exe 1.exe PID 1008 wrote to memory of 1560 1008 ku163044.exe 1.exe PID 1008 wrote to memory of 1560 1008 ku163044.exe 1.exe PID 3760 wrote to memory of 3112 3760 f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exe lr512821.exe PID 3760 wrote to memory of 3112 3760 f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exe lr512821.exe PID 3760 wrote to memory of 3112 3760 f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exe lr512821.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exe"C:\Users\Admin\AppData\Local\Temp\f45a55c78bb4c718087fdc6251f45a72a65b366aabb97c6a89ccc54142a36ce6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziub6530.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziub6530.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr877706.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr877706.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku163044.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku163044.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 11844⤵
- Program crash
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr512821.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr512821.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1008 -ip 10081⤵PID:1640
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5a0bb43d61899c1e6e2728e150f41a6c4
SHA1353c9fa010bdd65e9a9cb3c1f5dfacb76d32e66d
SHA256b1b83829bb8b02fd350412283393e0051d6e67ac743b3b162d6fd359761571d0
SHA5123c37159ba74c3b41cfa7e990c181ab39fa698d81aea58f9a0ff667aa298fd9220fa54ae168e515377b4cc5edfd988e839f6f3e806bb3cdbffe2aafddd388b40d
-
Filesize
530KB
MD51014b4766cf0682d60ffab2b3a41b015
SHA14254c968fe672956bc9ebf37bedb6f0b862f209c
SHA256aae041b623d980eee2fbc3fbe30ac20fd5f148b9b3ef5d0f7ac9a0cd65f9fc5d
SHA512b3836401af53e6ce46d2b5468fc280cd6d0fb6e238febbc60411119f7c3887ec4333f05f76efaf4fa857e3e80816273970625867a4f5878c3e9efddc748f9083
-
Filesize
12KB
MD592f8ab57f522cab81debbaf764c042f6
SHA1751e503ae31f8ff5b8a5b7aef12cb4e3497eec2c
SHA256a67131b1e7a7bef9ffb203a11fa83998a85e0438f8f242d030f142044d8debb3
SHA51294d69035cfaacfddecbc474a2c2ee52cda557078e6e233bc101dc1e749941c1a2cd9728a030754838d414736cdff540bd80e8777412574629a7ff14dd77706c8
-
Filesize
495KB
MD56b06cdc98beffc3bc21a6defe01f5d86
SHA148d29defe9c50a28cc38533ba269eb27879d9fa4
SHA256b2d30f5f08d3ce79e70cebcfc6ca05ad7242188a090dbc66bb6eaa324697299e
SHA5127e7c2d0832f4845506d06df50616d42afe199144bb8de764912961864547673b9c6b34ea1d5725d59a61556ef05c3d7ccc3606cce5c178e17f5707e8eca367a8
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0