Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 13:29
Static task
static1
Behavioral task
behavioral1
Sample
2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exe
Resource
win10v2004-20241007-en
General
-
Target
2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exe
-
Size
652KB
-
MD5
9bf262b54f240affe921d93bfdc48d51
-
SHA1
aa77acb8a17e7a0e879c38b0e7dd6053d52f92f8
-
SHA256
2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a
-
SHA512
cff56ed580b22452af7ef2e95438272f6ea994f93d34f91097e9bf9267a831cb2524571a1497303d61d3fb2332503614b44eeb5bff537d55a49b1fd9bcd47e82
-
SSDEEP
12288:gMr2y90d/enu2tdeb1yowTOTsidrfmP232VrKwd1kFebZ:myI2C4DPMjAF
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr432204.exe healer behavioral1/memory/4076-15-0x00000000006E0000-0x00000000006EA000-memory.dmp healer -
Healer family
-
Processes:
jr432204.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr432204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr432204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr432204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr432204.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr432204.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr432204.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2456-2105-0x0000000005550000-0x0000000005582000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5884-2118-0x0000000000D50000-0x0000000000D80000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr168203.exe family_redline behavioral1/memory/6104-2129-0x0000000000490000-0x00000000004BE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku316491.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ku316491.exe -
Executes dropped EXE 5 IoCs
Processes:
zide9536.exejr432204.exeku316491.exe1.exelr168203.exepid process 3676 zide9536.exe 4076 jr432204.exe 2456 ku316491.exe 5884 1.exe 6104 lr168203.exe -
Processes:
jr432204.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr432204.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
zide9536.exe2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zide9536.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6020 2456 WerFault.exe ku316491.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exezide9536.exeku316491.exe1.exelr168203.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zide9536.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku316491.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr168203.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr432204.exepid process 4076 jr432204.exe 4076 jr432204.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr432204.exeku316491.exedescription pid process Token: SeDebugPrivilege 4076 jr432204.exe Token: SeDebugPrivilege 2456 ku316491.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exezide9536.exeku316491.exedescription pid process target process PID 4716 wrote to memory of 3676 4716 2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exe zide9536.exe PID 4716 wrote to memory of 3676 4716 2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exe zide9536.exe PID 4716 wrote to memory of 3676 4716 2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exe zide9536.exe PID 3676 wrote to memory of 4076 3676 zide9536.exe jr432204.exe PID 3676 wrote to memory of 4076 3676 zide9536.exe jr432204.exe PID 3676 wrote to memory of 2456 3676 zide9536.exe ku316491.exe PID 3676 wrote to memory of 2456 3676 zide9536.exe ku316491.exe PID 3676 wrote to memory of 2456 3676 zide9536.exe ku316491.exe PID 2456 wrote to memory of 5884 2456 ku316491.exe 1.exe PID 2456 wrote to memory of 5884 2456 ku316491.exe 1.exe PID 2456 wrote to memory of 5884 2456 ku316491.exe 1.exe PID 4716 wrote to memory of 6104 4716 2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exe lr168203.exe PID 4716 wrote to memory of 6104 4716 2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exe lr168203.exe PID 4716 wrote to memory of 6104 4716 2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exe lr168203.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exe"C:\Users\Admin\AppData\Local\Temp\2200d05ad74d630d251cdb6aa659ceb78675831b3904055135624b6c36cb128a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zide9536.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zide9536.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr432204.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr432204.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku316491.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku316491.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 11804⤵
- Program crash
PID:6020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr168203.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr168203.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2456 -ip 24561⤵PID:5976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5dc012a88dc2d41d215896ee1e16d589e
SHA1b218ea8d06303a15ae9b2f155a7e45bbe0dfd687
SHA256d831055decf362a43f4a4762ee7386945bca6d2fbc9170686d279b0b2427d0a8
SHA5128f721fb84cad9d807c0037f34693c724888d6e230c7e24a0b24406a72f2d843ecfc9899f9355e7b3cd38aad24eb24d22e6b039dba9bfedf4bf69a0bcb66b7b41
-
Filesize
498KB
MD5aa36b9445b3e2d4f6522ad9c3240426a
SHA16bdc56ad6f731b446d08aca5712b50592cbae56b
SHA256927456d7c0d7d93c095c2e7ba30c444cba3a09e3e403e77835acc3e242892069
SHA51205cb7cc19e925f4390f8ff8f171f1f7769109c8e18a161a33554d08027490b234c1857f02d0046271887b3467efa7e163797fda6010ee6dc2e47721b02ddebad
-
Filesize
12KB
MD5b99a8d41703e629e4c22ac69840cfde3
SHA101fff850232f8953ad5b53384193c3d118ade671
SHA256713b8ee63c2f0dd7db591b5075b5bc451e6666e03483f59de2feb199f1d5f003
SHA512a8e33a6d926cd9b87717aeb7fa5718d93c65ed4bd1aba6e7fde8b6e631920c0910128bc2b3f1a16db944fbded6d0daf21577aeaf3326b15a9d4cfa938ee4ad16
-
Filesize
417KB
MD5d7859ae4bed638b5e438cf5673bb2c0c
SHA1ba6005cbe4607096bd362513df708072cae8c246
SHA2563f4fd5ae903a59456240021778c4e82a12105fe8197b1956c45ddc81dae9a8c6
SHA512b4a82644c3e935d8fb661af945f5512d7a90c087fc89cfe2546050bff0b5d73ee63ab5607d606f7ddbd6e5d24bd5d1c4fb1587b8599eaaaab3f25bfd042dc81b
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0