Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe
Resource
win10v2004-20241007-en
General
-
Target
5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe
-
Size
652KB
-
MD5
86e0e71b2d80d333e8219670deb2fe53
-
SHA1
d51af8bc454ebcdadfd222238e44ad4bc5775289
-
SHA256
5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1
-
SHA512
c94c8fec4a15c36bf8374fd04a6d099184529f3cb8b330392458670cefe4c70ae67e07396fe90ee09dd85a367fa684e7116b500baf2b784bf2ee1450518a372b
-
SSDEEP
12288:+Mrzy90iO7Y7vRfGsoTnAcxi8rw1Ps+DVXdAqRm/cJ7+P6Zg:tyVkWP/XAga6m
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr122544.exe healer behavioral1/memory/3460-15-0x0000000000AC0000-0x0000000000ACA000-memory.dmp healer -
Healer family
-
Processes:
jr122544.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr122544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr122544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr122544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr122544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr122544.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr122544.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3532-2105-0x0000000004D50000-0x0000000004D82000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/6688-2118-0x0000000000600000-0x0000000000630000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr508596.exe family_redline behavioral1/memory/2680-2129-0x0000000000870000-0x000000000089E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku190078.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ku190078.exe -
Executes dropped EXE 5 IoCs
Processes:
ziPp4948.exejr122544.exeku190078.exe1.exelr508596.exepid process 1044 ziPp4948.exe 3460 jr122544.exe 3532 ku190078.exe 6688 1.exe 2680 lr508596.exe -
Processes:
jr122544.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr122544.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziPp4948.exe5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziPp4948.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3352 3532 WerFault.exe ku190078.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku190078.exe1.exelr508596.exe5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exeziPp4948.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku190078.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr508596.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziPp4948.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr122544.exepid process 3460 jr122544.exe 3460 jr122544.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr122544.exeku190078.exedescription pid process Token: SeDebugPrivilege 3460 jr122544.exe Token: SeDebugPrivilege 3532 ku190078.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exeziPp4948.exeku190078.exedescription pid process target process PID 3296 wrote to memory of 1044 3296 5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe ziPp4948.exe PID 3296 wrote to memory of 1044 3296 5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe ziPp4948.exe PID 3296 wrote to memory of 1044 3296 5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe ziPp4948.exe PID 1044 wrote to memory of 3460 1044 ziPp4948.exe jr122544.exe PID 1044 wrote to memory of 3460 1044 ziPp4948.exe jr122544.exe PID 1044 wrote to memory of 3532 1044 ziPp4948.exe ku190078.exe PID 1044 wrote to memory of 3532 1044 ziPp4948.exe ku190078.exe PID 1044 wrote to memory of 3532 1044 ziPp4948.exe ku190078.exe PID 3532 wrote to memory of 6688 3532 ku190078.exe 1.exe PID 3532 wrote to memory of 6688 3532 ku190078.exe 1.exe PID 3532 wrote to memory of 6688 3532 ku190078.exe 1.exe PID 3296 wrote to memory of 2680 3296 5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe lr508596.exe PID 3296 wrote to memory of 2680 3296 5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe lr508596.exe PID 3296 wrote to memory of 2680 3296 5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe lr508596.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe"C:\Users\Admin\AppData\Local\Temp\5adfc92559895044f765fb0a5e280002b6636f3ce9ce5bf6bbf2f8034a95b1c1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPp4948.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPp4948.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr122544.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr122544.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku190078.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku190078.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 13844⤵
- Program crash
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr508596.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr508596.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3532 -ip 35321⤵PID:5416
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD532da97a6fc14facc28340f58d81495d9
SHA1629f778a33f2f972b565e7ea3ca1278d27aacd29
SHA25607bebc6c71aaf320e2a886301842cc5aee4ee2de0a60e4c707f5571b07a49227
SHA512306d0f25ee1621f292d7f834a4dd23f12e6be3bff2f8eddf10b1c616314653f860f97826d9ae18e4ba6d6cdfb6c9fe0fca7071932664dee5a098a7bb84f513a1
-
Filesize
498KB
MD54ca6b7952ef2c0aa9f7fcc382948aa8c
SHA19b89d9b1812536ea6eabe5771638e2828ff49e62
SHA256254c860d4e44791d0c0f406b603298589d6ffa1090d5c0c2ba2d9e181f11e313
SHA5125d9151c6b5e7017a6c6c005a27e1a608829d2b985edce81341d48b2b55d4ea023610fecc48aef9cb30600c77f3077aee9d82a51a909a9e5ed4320fae38a0b9b4
-
Filesize
12KB
MD5f900b07411b5555ffc3775e25a423fcf
SHA1d022123c255f527778efc9d92535e0630a87abd7
SHA2568a38c2f849ad02064bf8e57e70a8e79331afad8d59f34f72466804491d0de4ef
SHA512ead2fa3561e6bbac875a0f3ee70e4ab3046853e4787373fba7455c99ff00ca572e1c86bacea9b7c3b77ef902378ec453dbc4f38d4ba80df53a9ed0cc5710b6e4
-
Filesize
417KB
MD5cfaa9a611a7e7ee75210ffe750fa6149
SHA1c0844dd407042593cc9394b77cd478e2449de2f2
SHA256016b24716e1e7aa52471862d3cebd31154bebf5d261995624b05b3f63565cd50
SHA5128a84459a89c4d80e7c92ce4fd7ee5961ed1b44ba04b5e604ba196b9717bf1a189a157f24a83614a0127f4cf9984d173eb8a34cc48e25685cccbb1936469d8808
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0