Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 11:23
Static task
static1
Behavioral task
behavioral1
Sample
0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exe
Resource
win10v2004-20241007-en
General
-
Target
0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exe
-
Size
650KB
-
MD5
cc3dbcba5587491e86f70d8c2fc6048d
-
SHA1
d81b3f05d1b8ac3b32b0ec41242f7ab018e3218f
-
SHA256
0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5
-
SHA512
b25e7ba0f4248df93b090f250c4ae4589fd441ddb933bade1e4e12ed563516bd0d4092431064e69de7e6a97439827045fb6c81dfcde9ffff1c24af969e81b1da
-
SSDEEP
12288:aMrpy90nDAO47mfQFTRu9yKu6zn130Usu2eJuYguocA:DymF47m+Nu9yKu6r130BsuYgp
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr480214.exe healer behavioral1/memory/4756-15-0x0000000000580000-0x000000000058A000-memory.dmp healer -
Healer family
-
Processes:
jr480214.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr480214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr480214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr480214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr480214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr480214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr480214.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/5068-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3620-2118-0x0000000000330000-0x0000000000360000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr897419.exe family_redline behavioral1/memory/5188-2129-0x0000000000CE0000-0x0000000000D0E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku827850.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku827850.exe -
Executes dropped EXE 5 IoCs
Processes:
zizC3381.exejr480214.exeku827850.exe1.exelr897419.exepid process 1076 zizC3381.exe 4756 jr480214.exe 5068 ku827850.exe 3620 1.exe 5188 lr897419.exe -
Processes:
jr480214.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr480214.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exezizC3381.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zizC3381.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5556 5068 WerFault.exe ku827850.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exezizC3381.exeku827850.exe1.exelr897419.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zizC3381.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku827850.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr897419.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr480214.exepid process 4756 jr480214.exe 4756 jr480214.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr480214.exeku827850.exedescription pid process Token: SeDebugPrivilege 4756 jr480214.exe Token: SeDebugPrivilege 5068 ku827850.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exezizC3381.exeku827850.exedescription pid process target process PID 2616 wrote to memory of 1076 2616 0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exe zizC3381.exe PID 2616 wrote to memory of 1076 2616 0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exe zizC3381.exe PID 2616 wrote to memory of 1076 2616 0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exe zizC3381.exe PID 1076 wrote to memory of 4756 1076 zizC3381.exe jr480214.exe PID 1076 wrote to memory of 4756 1076 zizC3381.exe jr480214.exe PID 1076 wrote to memory of 5068 1076 zizC3381.exe ku827850.exe PID 1076 wrote to memory of 5068 1076 zizC3381.exe ku827850.exe PID 1076 wrote to memory of 5068 1076 zizC3381.exe ku827850.exe PID 5068 wrote to memory of 3620 5068 ku827850.exe 1.exe PID 5068 wrote to memory of 3620 5068 ku827850.exe 1.exe PID 5068 wrote to memory of 3620 5068 ku827850.exe 1.exe PID 2616 wrote to memory of 5188 2616 0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exe lr897419.exe PID 2616 wrote to memory of 5188 2616 0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exe lr897419.exe PID 2616 wrote to memory of 5188 2616 0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exe lr897419.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exe"C:\Users\Admin\AppData\Local\Temp\0d34ab3e2900f727e03df833e5bd989eac2cb6024227a1405e5e32d2602732f5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizC3381.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizC3381.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr480214.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr480214.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku827850.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku827850.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3620 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 15204⤵
- Program crash
PID:5556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr897419.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr897419.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5188
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5068 -ip 50681⤵PID:5136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD58d07592252f7d93341d34079d11ceecc
SHA18280489e8992c5df7925d6f89020c284f5e3191f
SHA256a8ae358e2749227053f36faa9f4435d14eaf28f6dbfb67f9a207b8759351c998
SHA512dc0cf0d451c17de9b0ca7772541db1a268f4eb534f612c1cac603c44be04b82dd12a1a7eda22714a2c86ec6abb752c8263f95c92f4f2dd772d3ec90e32ed236a
-
Filesize
496KB
MD56141319e8882a1d1a1f57cb686adfb17
SHA17089730779bbdf4a05bc12a4494dbfd057df7dbd
SHA256cbb418de751d83fcf1297754b624885591d37a4a685a632d73ee59d93aae0345
SHA512503a923afeaf7fa488dba61cdd9014342a2d5ebf6a9c60bc5c216de34453a842d8f92818a13e1ae9543ae3b9899b77c45d5dabbb002b2b4a0b83ce356b6457fb
-
Filesize
11KB
MD5dfa33e52c8fb0b869e73632601d85960
SHA1c410103bc4831833c3f0fbce00d372716f770ff2
SHA25667ebb846ad907b39d427410a9cecf07f8139e3d7f1097e8f2c72b17554b3b60f
SHA512ca3458bab1086f64bb83a8cdf1ea6fd009ee1849445ebbc3ec6bd77ebf8f794f901a862e1ea0811cc8ec7df377deae13a0ec7d42a6e07a1c1b9564d03d3254e2
-
Filesize
414KB
MD5ee90d83cec1d94cfe6e31fafc84f651b
SHA1cc1c88083ff8b96049c806035130cd41a97979fb
SHA25639fa2ae286e45bf3f2a2b27cae2cc424aca4c0b4ff95f77cec7b74d3e4a338d0
SHA5124d3450d5f9027feceaea03c72ef95e55f1b6da499ebe574ca3e849d1af1be8ee1a8e28b458dd4fb02c4ed3bc13a8499114ea252e9d068d60805c6f99e726628c
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0