Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 15:10
Static task
static1
Behavioral task
behavioral1
Sample
10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exe
Resource
win10v2004-20241007-en
General
-
Target
10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exe
-
Size
652KB
-
MD5
b255e3128404f05784b176656f3bfe82
-
SHA1
45d1650a410d828d0ac07a905a7fbb841b3e2881
-
SHA256
10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b
-
SHA512
675b485f9e3c02853784326e1bd1a528fd19c8ed908cb18eea8acf8e439d2c8991c6d5dff84400e36a127110ba4fcb5a8530a04a4b9c9ee9959a208f8811f9b9
-
SSDEEP
12288:XMr1y9075qWf6AuQQ3mcIzBOv5sADms3KpgGTecr8sA7eA1:qyUp3XQUBORh/GvNA751
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr692570.exe healer behavioral1/memory/4884-15-0x0000000000360000-0x000000000036A000-memory.dmp healer -
Healer family
-
Processes:
jr692570.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr692570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr692570.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr692570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr692570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr692570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr692570.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4512-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4632-2118-0x0000000000C90000-0x0000000000CC0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr275623.exe family_redline behavioral1/memory/5048-2129-0x0000000000F70000-0x0000000000F9E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku602501.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ku602501.exe -
Executes dropped EXE 5 IoCs
Processes:
ziMw1592.exejr692570.exeku602501.exe1.exelr275623.exepid process 4868 ziMw1592.exe 4884 jr692570.exe 4512 ku602501.exe 4632 1.exe 5048 lr275623.exe -
Processes:
jr692570.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr692570.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exeziMw1592.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziMw1592.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4288 4512 WerFault.exe ku602501.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
lr275623.exe10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exeziMw1592.exeku602501.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr275623.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziMw1592.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku602501.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr692570.exepid process 4884 jr692570.exe 4884 jr692570.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr692570.exeku602501.exedescription pid process Token: SeDebugPrivilege 4884 jr692570.exe Token: SeDebugPrivilege 4512 ku602501.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exeziMw1592.exeku602501.exedescription pid process target process PID 1768 wrote to memory of 4868 1768 10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exe ziMw1592.exe PID 1768 wrote to memory of 4868 1768 10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exe ziMw1592.exe PID 1768 wrote to memory of 4868 1768 10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exe ziMw1592.exe PID 4868 wrote to memory of 4884 4868 ziMw1592.exe jr692570.exe PID 4868 wrote to memory of 4884 4868 ziMw1592.exe jr692570.exe PID 4868 wrote to memory of 4512 4868 ziMw1592.exe ku602501.exe PID 4868 wrote to memory of 4512 4868 ziMw1592.exe ku602501.exe PID 4868 wrote to memory of 4512 4868 ziMw1592.exe ku602501.exe PID 4512 wrote to memory of 4632 4512 ku602501.exe 1.exe PID 4512 wrote to memory of 4632 4512 ku602501.exe 1.exe PID 4512 wrote to memory of 4632 4512 ku602501.exe 1.exe PID 1768 wrote to memory of 5048 1768 10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exe lr275623.exe PID 1768 wrote to memory of 5048 1768 10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exe lr275623.exe PID 1768 wrote to memory of 5048 1768 10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exe lr275623.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exe"C:\Users\Admin\AppData\Local\Temp\10e8e668a40001911be6d68bf49a9d0ae762a41e5fd5f5795a4a9af6ea6e577b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMw1592.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMw1592.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr692570.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr692570.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602501.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku602501.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 15164⤵
- Program crash
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr275623.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr275623.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4512 -ip 45121⤵PID:1344
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5f8e09958d6e4e8b6ed9e4b5002bb1ee6
SHA191930e681c9454e841ef80dd7e91e1b8e117fc6b
SHA256c532a1525860c246a1d863ddb28efb2d897705c3af89353200debd9fc87932d7
SHA512480447d047611c791b5dee7561f509cb79a1d5ea0990456e020063081d5c0432847b7f9157e73db9a50903e360aed3f0d509138701bafbb794acf993825fc2a6
-
Filesize
497KB
MD55cf7696a49f16b9069680bfe211da2c5
SHA16f3a90b1f009962d25f1ea65cc50f54267ab4dc3
SHA256cc47542b2eb1a69146ca2fbcee1c792067bdb5fa724e92f769a342dc45e00fb6
SHA512b8e63e16fc07de77f19ec6ac57b62a08659158e8373b6195efdc192a65d304401dcafc84c4c73bcce5d2b5dcb14b9ed579f4791acb590e663e582e7ff579303e
-
Filesize
11KB
MD5d0d6fc81142671b82b5052b72791bb1f
SHA148238c5108a450dac95785cd3373a608778fbab2
SHA256422920b6ea226d36fe947e48170b2afe1f7b43d766f3a5d30b53b4ec13d41468
SHA512a5d2703393c8c38fcfd88fd078ae3a89eaaabb270fc17dd8f81496987703b8469e837186288278b5fb2e6b8ee4c59a755574740863afef99ccb3ae820256aee3
-
Filesize
415KB
MD5fd89cf75da3d9ffc844a34f83481e56c
SHA16488325d0abc569a208514e61b822cf97deda53e
SHA256463c36ada360cddd0f6d2c96422e5d3db6aa8d947ef9509fabbe5dd1bd0d752e
SHA5122f1dcef6fcf78b34faf7e24af86b5a0ef92649ae8d6dcd274d8d42491a8e4e7543e8db778689e8c49ad611fe79d6c94bfdc149d4fb2ff4e05867f314b0977fa5
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0