Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 10:08
Static task
static1
Behavioral task
behavioral1
Sample
30309c27300dd09343f27569c5dab9aa4e156537a1e416d04a893c7184470440.exe
Resource
win10v2004-20241007-en
General
-
Target
30309c27300dd09343f27569c5dab9aa4e156537a1e416d04a893c7184470440.exe
-
Size
854KB
-
MD5
df9b4263be40f52d3d3812f9b4fcda23
-
SHA1
de10629f58ce37e4f33d50b49064a95fa892b731
-
SHA256
30309c27300dd09343f27569c5dab9aa4e156537a1e416d04a893c7184470440
-
SHA512
6b530511d701a131988b335e51bc4028493b5e0f6dc8cb410b181b84d496b0baf2375bb0ebb203f1339d4e7b74d9b601586af1ef637038aed6fa6fb7b82c9fc1
-
SSDEEP
24576:XygjhE77y5bArIam3HKpnjPLyf6DK3lXyq:ih7yBz3HgnrLyf3o
Malware Config
Extracted
redline
lada
185.161.248.90:4125
-
auth_value
0b3678897547fedafe314eda5a2015ba
Extracted
redline
diza
185.161.248.90:4125
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it124978.exe healer behavioral1/memory/2028-22-0x00000000008C0000-0x00000000008CA000-memory.dmp healer -
Healer family
-
Processes:
it124978.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it124978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it124978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it124978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it124978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it124978.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it124978.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3612-2174-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5992-2187-0x00000000003A0000-0x00000000003CE000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp101868.exe family_redline behavioral1/memory/4568-2198-0x0000000000AD0000-0x0000000000B00000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr167056.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation jr167056.exe -
Executes dropped EXE 6 IoCs
Processes:
ziMr0776.exeziLg5383.exeit124978.exejr167056.exe1.exekp101868.exepid process 3632 ziMr0776.exe 5000 ziLg5383.exe 2028 it124978.exe 3612 jr167056.exe 5992 1.exe 4568 kp101868.exe -
Processes:
it124978.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it124978.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
30309c27300dd09343f27569c5dab9aa4e156537a1e416d04a893c7184470440.exeziMr0776.exeziLg5383.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 30309c27300dd09343f27569c5dab9aa4e156537a1e416d04a893c7184470440.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziMr0776.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziLg5383.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4156 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4348 3612 WerFault.exe jr167056.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
kp101868.exe30309c27300dd09343f27569c5dab9aa4e156537a1e416d04a893c7184470440.exeziMr0776.exeziLg5383.exejr167056.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp101868.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30309c27300dd09343f27569c5dab9aa4e156537a1e416d04a893c7184470440.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziMr0776.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziLg5383.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr167056.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
it124978.exepid process 2028 it124978.exe 2028 it124978.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
it124978.exejr167056.exedescription pid process Token: SeDebugPrivilege 2028 it124978.exe Token: SeDebugPrivilege 3612 jr167056.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
30309c27300dd09343f27569c5dab9aa4e156537a1e416d04a893c7184470440.exeziMr0776.exeziLg5383.exejr167056.exedescription pid process target process PID 4904 wrote to memory of 3632 4904 30309c27300dd09343f27569c5dab9aa4e156537a1e416d04a893c7184470440.exe ziMr0776.exe PID 4904 wrote to memory of 3632 4904 30309c27300dd09343f27569c5dab9aa4e156537a1e416d04a893c7184470440.exe ziMr0776.exe PID 4904 wrote to memory of 3632 4904 30309c27300dd09343f27569c5dab9aa4e156537a1e416d04a893c7184470440.exe ziMr0776.exe PID 3632 wrote to memory of 5000 3632 ziMr0776.exe ziLg5383.exe PID 3632 wrote to memory of 5000 3632 ziMr0776.exe ziLg5383.exe PID 3632 wrote to memory of 5000 3632 ziMr0776.exe ziLg5383.exe PID 5000 wrote to memory of 2028 5000 ziLg5383.exe it124978.exe PID 5000 wrote to memory of 2028 5000 ziLg5383.exe it124978.exe PID 5000 wrote to memory of 3612 5000 ziLg5383.exe jr167056.exe PID 5000 wrote to memory of 3612 5000 ziLg5383.exe jr167056.exe PID 5000 wrote to memory of 3612 5000 ziLg5383.exe jr167056.exe PID 3612 wrote to memory of 5992 3612 jr167056.exe 1.exe PID 3612 wrote to memory of 5992 3612 jr167056.exe 1.exe PID 3612 wrote to memory of 5992 3612 jr167056.exe 1.exe PID 3632 wrote to memory of 4568 3632 ziMr0776.exe kp101868.exe PID 3632 wrote to memory of 4568 3632 ziMr0776.exe kp101868.exe PID 3632 wrote to memory of 4568 3632 ziMr0776.exe kp101868.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\30309c27300dd09343f27569c5dab9aa4e156537a1e416d04a893c7184470440.exe"C:\Users\Admin\AppData\Local\Temp\30309c27300dd09343f27569c5dab9aa4e156537a1e416d04a893c7184470440.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMr0776.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMr0776.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziLg5383.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziLg5383.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it124978.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it124978.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr167056.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr167056.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5992 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3612 -s 15045⤵
- Program crash
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp101868.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp101868.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3612 -ip 36121⤵PID:2908
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4156
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
671KB
MD551bc966590619ced8f21c20f6cc67907
SHA1915b1af3e27c1d9c0671fcdd68d06facc04b4574
SHA25686836ebea78c5ec4260130ec80be0d09f200a63c64c81e3e3ca95266ba53a759
SHA51291bd8ff2832b60f60ea8c66c4d26e3899d18ed88eef5ecded31352ec5956fe76f132982cf2208d13d95d9c2de3ea1ebf5a1bfd678909986b36afcd1096a8d505
-
Filesize
168KB
MD5c52ebada00a59ec1f651a0e9fbcef2eb
SHA1e1941278df76616f1ca3202ef2a9f99d2592d52f
SHA25635d5cff482e78c0137b3c51556d1e14aab0f38921ebfe46abc979a826301d28e
SHA5126b11124fa6cfa1d2fdb8b6a4cc237b4a65ecbeb1797179568dcef378041ce05bdf0af9b6434cc0b3feb2479112d003b0fa5c0d2178c73bc65d35f5c2cfb36be2
-
Filesize
518KB
MD5cf5302edd23cfd9f8448a4e06362b959
SHA17014515bf64536178bbec57366c17a9fe875c7a7
SHA256d22895e42bd70cf8d1c979d0d4ea2fd1269c9dd4753c1c9c7322b267d7f881ec
SHA512af0c3426c4901cf9e36538e35a30afbbe6ad81569f0a834c2989015c21a55b1b3de02f779c4fb9a0fff1ff6beee509ed07941fb3be9b9486a4941b4b32ca5ede
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
438KB
MD58f28b151354ad8609ee05ccf8b1aaf1b
SHA1b010d85c26dfcf016dad69e99260282ad01f7a4d
SHA25631542e9bbd9abfecdf34d2cd1bb09dd6993d0d42a02ac288fc83bcaf49b4de10
SHA512b52208629e8b0b8e803cbecd7f46b72ccd71f681a9928fc09b83cd1de24f726ba5ec57597054a3d7e84d5d0a750cb08c06ee4d10835591b7eb90cce2820c5961
-
Filesize
168KB
MD503728fed675bcde5256342183b1d6f27
SHA1d13eace7d3d92f93756504b274777cc269b222a2
SHA256f1181356c69b3dcebadc67d4c751d01164c929eab2b250b83cdedeedd4cd5ef0
SHA5126e2800d2d4e7dcbcbe1842d78029b75d2faa742c8fd7925ae2486396c3dd8c0b8f66e760f3916e42631cde41c0606c48528a4cb779f124b8d28c7af9197c18d1