Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 15:42
Static task
static1
Behavioral task
behavioral1
Sample
098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe
Resource
win10v2004-20241007-en
General
-
Target
098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe
-
Size
651KB
-
MD5
2fb613ae3b0f1036637e3e0086f276b4
-
SHA1
b21acc75de412644c5b5b877bd9e8ca1e0b45e2e
-
SHA256
098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f
-
SHA512
addf59918dd85ae3f034f1828b9271fa46cba51b06d08b85a06c8bc1cc51e95d8182c574026ff9b57b4402c420caf1038a4c9751b0c7ddcc15d715cd29e13ecf
-
SSDEEP
12288:NMrPy90ObulvkoFmGy3SpgG2qhr8XdTmESMs:yyFbOyXGRydTm3
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr642165.exe healer behavioral1/memory/4760-15-0x0000000000EF0000-0x0000000000EFA000-memory.dmp healer -
Healer family
-
Processes:
jr642165.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr642165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr642165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr642165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr642165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr642165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr642165.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1596-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4804-2118-0x0000000000FC0000-0x0000000000FF0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr489010.exe family_redline behavioral1/memory/4936-2129-0x0000000000410000-0x000000000043E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku382035.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku382035.exe -
Executes dropped EXE 5 IoCs
Processes:
zivN5782.exejr642165.exeku382035.exe1.exelr489010.exepid process 2192 zivN5782.exe 4760 jr642165.exe 1596 ku382035.exe 4804 1.exe 4936 lr489010.exe -
Processes:
jr642165.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr642165.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
zivN5782.exe098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zivN5782.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4236 1596 WerFault.exe ku382035.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
zivN5782.exeku382035.exe1.exelr489010.exe098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zivN5782.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku382035.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr489010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr642165.exepid process 4760 jr642165.exe 4760 jr642165.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr642165.exeku382035.exedescription pid process Token: SeDebugPrivilege 4760 jr642165.exe Token: SeDebugPrivilege 1596 ku382035.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exezivN5782.exeku382035.exedescription pid process target process PID 4060 wrote to memory of 2192 4060 098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe zivN5782.exe PID 4060 wrote to memory of 2192 4060 098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe zivN5782.exe PID 4060 wrote to memory of 2192 4060 098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe zivN5782.exe PID 2192 wrote to memory of 4760 2192 zivN5782.exe jr642165.exe PID 2192 wrote to memory of 4760 2192 zivN5782.exe jr642165.exe PID 2192 wrote to memory of 1596 2192 zivN5782.exe ku382035.exe PID 2192 wrote to memory of 1596 2192 zivN5782.exe ku382035.exe PID 2192 wrote to memory of 1596 2192 zivN5782.exe ku382035.exe PID 1596 wrote to memory of 4804 1596 ku382035.exe 1.exe PID 1596 wrote to memory of 4804 1596 ku382035.exe 1.exe PID 1596 wrote to memory of 4804 1596 ku382035.exe 1.exe PID 4060 wrote to memory of 4936 4060 098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe lr489010.exe PID 4060 wrote to memory of 4936 4060 098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe lr489010.exe PID 4060 wrote to memory of 4936 4060 098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe lr489010.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe"C:\Users\Admin\AppData\Local\Temp\098b140da47d298640c55a864f5aab44af931f521c57e3fac4d56f9981234c5f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivN5782.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivN5782.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr642165.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr642165.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku382035.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku382035.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 13804⤵
- Program crash
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr489010.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr489010.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1596 -ip 15961⤵PID:4808
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5da2a3930d92426272ff2df806a129c2f
SHA11b11ac3df03893811480d5746a57a7c03d9e8353
SHA256b3c2c9bb981048ea8efade1f0c06f74c13361b25d8a18417b004fd45287ed437
SHA5128e3bc4c13488449a25988b4209fb108aa7675b67d06053c4b6df9ae3210d9d24049d6c2f15c9dccc2ba448a3902524425d71610fa34e7ff225231c161d65fc6b
-
Filesize
497KB
MD52c639fafa5bfa815e10f0158a57dc45c
SHA1d3096c0dc0d7e06ddd6ab8320211a5c2f808569a
SHA256d1863703f536b48f52be21530016bca145c4756d1c6a942f9b611a7b6f1db8ac
SHA51253cb192575d8290e5c16e3da705cbf574f339a93f474376159f53f658474b0287ea1bb2997f864d7ba57d1f1f543f48452a7e42063bf8b7b82b102b962f140de
-
Filesize
11KB
MD50c3d377a0c6e48ada16a67496e1fae1a
SHA1cd6e88b40eb74a61c3cc39f2aa571ce9a5dad422
SHA256cfd5f8ce02d6d06bcaa69e1a325696c6e6b5febddfbfccfe58cf51c7d2615ec4
SHA512b650fcc6fb98fa024b1f8a27904f8d1a65bff69e106e3cc48693ab653daa131c2e956933baf67b87f6edab0e50befbd40c3b3885a21d94c009e5ab4c51a75fb2
-
Filesize
415KB
MD5e6a2ac5b26b1f92decdee62b1178b63f
SHA1b019d47c34df5b8fe0fdbee0b91019d6fd23cc7c
SHA2563a24fef643e954e23fde828fbde15dd91addbe6b03477078b4feaa797211ea3f
SHA51289be9c48268bcef8e71d8d8f9bd2e54b0ea43ddb257eba942010c378481f47f3cd2be0b77695ba11c456c57c191f8e87c18e1ade49a651deaffad165615b18b1
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0