Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 11:02
Static task
static1
Behavioral task
behavioral1
Sample
76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exe
Resource
win10v2004-20241007-en
General
-
Target
76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exe
-
Size
650KB
-
MD5
cf382008d3488eae11216f1e8cd6837c
-
SHA1
061b1d07fc4dcb8c5aaa164c73e9fcca44100d4b
-
SHA256
76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d
-
SHA512
c0b9827cb672c76a9232ee0624f01796f2474ddf4a237c518e63d9ea67f96b884d6c273f5da839602bc2618de8c37a3f65621eb47966f78d6da9110d3684bf15
-
SSDEEP
12288:bMrxy90nBOrG27rZvzXu9HKZBzTk3AUcJUCRu7aGFSr0K:CyqQX7Fvru9HKZB/k3ARJuWv
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr324773.exe healer behavioral1/memory/2376-15-0x0000000000610000-0x000000000061A000-memory.dmp healer -
Healer family
-
Processes:
jr324773.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr324773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr324773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr324773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr324773.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr324773.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr324773.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/556-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/860-2118-0x0000000000640000-0x0000000000670000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr749141.exe family_redline behavioral1/memory/2376-2129-0x00000000008F0000-0x000000000091E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku337655.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation ku337655.exe -
Executes dropped EXE 5 IoCs
Processes:
zirU9898.exejr324773.exeku337655.exe1.exelr749141.exepid process 1960 zirU9898.exe 2376 jr324773.exe 556 ku337655.exe 860 1.exe 2376 lr749141.exe -
Processes:
jr324773.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr324773.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exezirU9898.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zirU9898.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4248 556 WerFault.exe ku337655.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exezirU9898.exeku337655.exe1.exelr749141.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zirU9898.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku337655.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr749141.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr324773.exepid process 2376 jr324773.exe 2376 jr324773.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr324773.exeku337655.exedescription pid process Token: SeDebugPrivilege 2376 jr324773.exe Token: SeDebugPrivilege 556 ku337655.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exezirU9898.exeku337655.exedescription pid process target process PID 456 wrote to memory of 1960 456 76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exe zirU9898.exe PID 456 wrote to memory of 1960 456 76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exe zirU9898.exe PID 456 wrote to memory of 1960 456 76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exe zirU9898.exe PID 1960 wrote to memory of 2376 1960 zirU9898.exe jr324773.exe PID 1960 wrote to memory of 2376 1960 zirU9898.exe jr324773.exe PID 1960 wrote to memory of 556 1960 zirU9898.exe ku337655.exe PID 1960 wrote to memory of 556 1960 zirU9898.exe ku337655.exe PID 1960 wrote to memory of 556 1960 zirU9898.exe ku337655.exe PID 556 wrote to memory of 860 556 ku337655.exe 1.exe PID 556 wrote to memory of 860 556 ku337655.exe 1.exe PID 556 wrote to memory of 860 556 ku337655.exe 1.exe PID 456 wrote to memory of 2376 456 76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exe lr749141.exe PID 456 wrote to memory of 2376 456 76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exe lr749141.exe PID 456 wrote to memory of 2376 456 76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exe lr749141.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exe"C:\Users\Admin\AppData\Local\Temp\76821fff004dbd2b7b70deb9e011081c73582ad1e6f28d4b06b2dc009d1df89d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirU9898.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirU9898.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr324773.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr324773.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku337655.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku337655.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 13764⤵
- Program crash
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr749141.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr749141.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2376
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 556 -ip 5561⤵PID:5252
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5719d8b96a43454388baace3eb00b400c
SHA147a18d32f8a6666f65023926669cf810ca67c3c1
SHA256ef3ff76a550613ca075c79e01373e7b5cdebd94c360bded5099892121b5346b7
SHA512fc29086d35ca38a752bb3e6ac83df53e276ed0ae3d021a2d0877a377ca851c29339375372ddbcee747319efa2d6fd104cbd96fa52ad5af759fc109aed85b53c4
-
Filesize
496KB
MD5a2dd1961b02d83b99bb3bd891d4922c0
SHA1955ae95203367f2ebfdf83266343284e03b3e238
SHA25663ecb7273fcdcc82e641709443649e8848a7ced203f6aea6f4548b5d7120d1ab
SHA5127ce7f521e63feeea6cc4f2a20cd1efdcfcc25d65768e0bda0cdc540c5e51e710b0e26564160f55ea84ac75a8b8cd9cce4d274a3c9021990bd25078cacd4e0912
-
Filesize
11KB
MD59df0c5537dd09f4a8b1eb5f8f6110de5
SHA1b6626c8d88e9f65c629502d45b0ef127f1e442bb
SHA25651091875b1da3394ff86761a222413f8f57464e1ebc3f15f2112c99a25236898
SHA512a48554a5cc6724c02277b6682a68e1ed4a9fd9ba6e15f49ce0e0347a8bb2142cb99cce0eebe852d480591c125d166e661a7253f81c957b1208d2e0deef5e15c9
-
Filesize
414KB
MD58c39ec77dc6f1b60968d37170a43e25b
SHA1a2bcc4606ab6f6cbea37c77c2ab999564050f0ee
SHA256eaf81ff7fa19a494704fd9e95609db38e28d2cc354e13300ed7508846b1af3f9
SHA512fe0dbe59dee60fc57def24d78724813c53dee8eb44695fa3656af1300545aed2c1cd4a22769f05a041e3ebd9b7d100879d0b37eb2e14c84a37d9f05170e2d37f
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0