Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exe
Resource
win10v2004-20241007-en
General
-
Target
0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exe
-
Size
651KB
-
MD5
38e5e9e6d4c7b1cf05548a0c7e23490e
-
SHA1
85d02918f46d921a0a9ae432265f8cc016b8595f
-
SHA256
0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191
-
SHA512
385df016dbe8cd542b63290756c58de6247c938eadb69616a70a4cd591911dde36a8dbe93c7a6050088f2c5b45b720789d11ff1c4efa654637dec053403f221a
-
SSDEEP
12288:TMrZy90gjVKzBT0K3xJGnzxriMDzEr3IUJvgE9uNRegVuNzc:yyEzCK3Wn5iMDor3II9uqXq
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr304612.exe healer behavioral1/memory/4580-15-0x00000000006E0000-0x00000000006EA000-memory.dmp healer -
Healer family
-
Processes:
jr304612.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr304612.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr304612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr304612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr304612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr304612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr304612.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2352-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5680-2118-0x0000000000890000-0x00000000008C0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr868511.exe family_redline behavioral1/memory/4124-2129-0x0000000000440000-0x000000000046E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku459546.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ku459546.exe -
Executes dropped EXE 5 IoCs
Processes:
ziAd2707.exejr304612.exeku459546.exe1.exelr868511.exepid process 3852 ziAd2707.exe 4580 jr304612.exe 2352 ku459546.exe 5680 1.exe 4124 lr868511.exe -
Processes:
jr304612.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr304612.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exeziAd2707.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAd2707.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 312 2352 WerFault.exe ku459546.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exeziAd2707.exeku459546.exe1.exelr868511.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziAd2707.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku459546.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr868511.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr304612.exepid process 4580 jr304612.exe 4580 jr304612.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr304612.exeku459546.exedescription pid process Token: SeDebugPrivilege 4580 jr304612.exe Token: SeDebugPrivilege 2352 ku459546.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exeziAd2707.exeku459546.exedescription pid process target process PID 4456 wrote to memory of 3852 4456 0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exe ziAd2707.exe PID 4456 wrote to memory of 3852 4456 0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exe ziAd2707.exe PID 4456 wrote to memory of 3852 4456 0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exe ziAd2707.exe PID 3852 wrote to memory of 4580 3852 ziAd2707.exe jr304612.exe PID 3852 wrote to memory of 4580 3852 ziAd2707.exe jr304612.exe PID 3852 wrote to memory of 2352 3852 ziAd2707.exe ku459546.exe PID 3852 wrote to memory of 2352 3852 ziAd2707.exe ku459546.exe PID 3852 wrote to memory of 2352 3852 ziAd2707.exe ku459546.exe PID 2352 wrote to memory of 5680 2352 ku459546.exe 1.exe PID 2352 wrote to memory of 5680 2352 ku459546.exe 1.exe PID 2352 wrote to memory of 5680 2352 ku459546.exe 1.exe PID 4456 wrote to memory of 4124 4456 0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exe lr868511.exe PID 4456 wrote to memory of 4124 4456 0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exe lr868511.exe PID 4456 wrote to memory of 4124 4456 0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exe lr868511.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exe"C:\Users\Admin\AppData\Local\Temp\0bd1886b51cd39fd27ffaa5f5d314327c91ccb92922920c5b7da62130b790191.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAd2707.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAd2707.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr304612.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr304612.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku459546.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku459546.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5680 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 14924⤵
- Program crash
PID:312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr868511.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr868511.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2352 -ip 23521⤵PID:4032
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD53e4c66b733a14f9008d2d50b9ec66e2b
SHA10eb0003c3e46b24ea65f27d4349afaba0b8d862c
SHA256eddf35f9cdf02dfd879ee0a2fe98ac6039947b06e4bc74b90b5096d6411505b4
SHA512e544774a8de09dd40f88e3e5124fe74a830a472c204224577fdaad88c27dcbac76fe44ee46a7510b5cffefb35a2e43c2f05f6b108d2ba6a3be9b363d99ce27fd
-
Filesize
496KB
MD59a203b470a26f9c2aed72671959b7723
SHA114f87659f8274fd3252ac65fc95fe3497e57e5d6
SHA256532ac12044346cfd46ebf2beb4ab89737402533c6689fdf34316c4c2a00a2bf1
SHA512e8caa9e8d0c305d0b33a10e2fd645ca27f5c07569de57f32f4ba56b58251a3379f10369ce5eb01cefd83c833d0789c436f26936ca26f38f54306cea9ed93c789
-
Filesize
11KB
MD57f778c11eeeac3a7294e4fcff7ece2ea
SHA1b716aa92d4fa5e0984a5ee585a0a850965d98442
SHA256e670a933d1e532620e8d8d633a361ea6bab66051d513a5f91f5d373f15c9243d
SHA512e00cdbd81d6f38831b6ee8ee2e185a70e53beabbb4294edd502a99fa5900cf9b619171db3e61dba8b6e51b43c97fdfebda265b68ca2b184cff65eff28b6ac958
-
Filesize
414KB
MD52436ced35f20a841b8f0322863de8ea2
SHA1a50e68ed19c11641eac7a51314491f0c340b597f
SHA2563339e1b39ecd33702da6165f855bc9a428d8e7cd6798b0ae4f95b8a39abe26ca
SHA512daf6d9923e03969a2880a9df8d6d85781bc0b4f9ce43a8b72cf89dad4fabfc513ce7e5782084db7e58dedfec821a54ee2d4f22eb306c14050d080909a3bc10cc
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0