Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 16:42
Static task
static1
Behavioral task
behavioral1
Sample
8b94034ee20dee07d7e21903f07c20997f7fd000ded7ae28dca3ba60412c10dc.exe
Resource
win10v2004-20241007-en
General
-
Target
8b94034ee20dee07d7e21903f07c20997f7fd000ded7ae28dca3ba60412c10dc.exe
-
Size
660KB
-
MD5
d65314f7ec974bae85937b08c72781d6
-
SHA1
78c521123490d94b24d5f4da229a902e1594aa62
-
SHA256
8b94034ee20dee07d7e21903f07c20997f7fd000ded7ae28dca3ba60412c10dc
-
SHA512
fd221145c03693e4ca98db6e6b3c5e43bc229a4eec7cbfb90baf0ab9397f9eb65ad87828b10ed3e4b1efd7eb4ffcc855c71b08987526e70c7ea4516fb3c1e4ff
-
SSDEEP
12288:fMray90AevYe1JKKXLshAmnndn//PTecuRHIxCfyqbuT8Gqp6:Rysge1kyOhnd/XWMoy0p6
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b78-12.dat healer behavioral1/memory/2176-15-0x0000000000680000-0x000000000068A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr263863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr263863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr263863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr263863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr263863.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr263863.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1876-2105-0x0000000005550000-0x0000000005582000-memory.dmp family_redline behavioral1/files/0x000e000000023a70-2110.dat family_redline behavioral1/memory/5084-2118-0x0000000000570000-0x00000000005A0000-memory.dmp family_redline behavioral1/files/0x0031000000023b76-2127.dat family_redline behavioral1/memory/6040-2129-0x0000000000E20000-0x0000000000E4E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ku015080.exe -
Executes dropped EXE 5 IoCs
pid Process 4560 ziIZ0334.exe 2176 jr263863.exe 1876 ku015080.exe 5084 1.exe 6040 lr813555.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr263863.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8b94034ee20dee07d7e21903f07c20997f7fd000ded7ae28dca3ba60412c10dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziIZ0334.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6024 1876 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziIZ0334.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku015080.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr813555.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b94034ee20dee07d7e21903f07c20997f7fd000ded7ae28dca3ba60412c10dc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2176 jr263863.exe 2176 jr263863.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2176 jr263863.exe Token: SeDebugPrivilege 1876 ku015080.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5088 wrote to memory of 4560 5088 8b94034ee20dee07d7e21903f07c20997f7fd000ded7ae28dca3ba60412c10dc.exe 84 PID 5088 wrote to memory of 4560 5088 8b94034ee20dee07d7e21903f07c20997f7fd000ded7ae28dca3ba60412c10dc.exe 84 PID 5088 wrote to memory of 4560 5088 8b94034ee20dee07d7e21903f07c20997f7fd000ded7ae28dca3ba60412c10dc.exe 84 PID 4560 wrote to memory of 2176 4560 ziIZ0334.exe 86 PID 4560 wrote to memory of 2176 4560 ziIZ0334.exe 86 PID 4560 wrote to memory of 1876 4560 ziIZ0334.exe 96 PID 4560 wrote to memory of 1876 4560 ziIZ0334.exe 96 PID 4560 wrote to memory of 1876 4560 ziIZ0334.exe 96 PID 1876 wrote to memory of 5084 1876 ku015080.exe 97 PID 1876 wrote to memory of 5084 1876 ku015080.exe 97 PID 1876 wrote to memory of 5084 1876 ku015080.exe 97 PID 5088 wrote to memory of 6040 5088 8b94034ee20dee07d7e21903f07c20997f7fd000ded7ae28dca3ba60412c10dc.exe 102 PID 5088 wrote to memory of 6040 5088 8b94034ee20dee07d7e21903f07c20997f7fd000ded7ae28dca3ba60412c10dc.exe 102 PID 5088 wrote to memory of 6040 5088 8b94034ee20dee07d7e21903f07c20997f7fd000ded7ae28dca3ba60412c10dc.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b94034ee20dee07d7e21903f07c20997f7fd000ded7ae28dca3ba60412c10dc.exe"C:\Users\Admin\AppData\Local\Temp\8b94034ee20dee07d7e21903f07c20997f7fd000ded7ae28dca3ba60412c10dc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziIZ0334.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziIZ0334.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr263863.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr263863.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku015080.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku015080.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1876 -s 15204⤵
- Program crash
PID:6024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr813555.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr813555.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1876 -ip 18761⤵PID:696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD543b990b6f5ee093d49f09a3482c4b851
SHA1f7fe648e6567f819ea11212d6488346d36c030a9
SHA2562bf7700d682c51fdbf2ef131ca28e3073e3565408752068a38760f8391e5de48
SHA51281eaf94a8b918b3f57dc949c510775eb3e13634107004ab3df675956b2c106e690754e688639c879dfbf936a28185dc1a1f7325c37e6be7684f07dc3923b1c88
-
Filesize
506KB
MD566a3ccac34a1cea7348bbcc702608b0d
SHA184e4e4077de09738ba4877d8207480882eb2a95d
SHA256cedbc78f467fa9120389f306638194908b2158f5c32afe28a82c19fa2c51621f
SHA512c6411689cd39797b386e472ea4e703245ccca70c388798c5c76a7d02b752c5c955d47be55e8e93a59c1785766afcd3ebd0d6125ddbcd8ca62a8e520c90548c48
-
Filesize
14KB
MD5d2f47ca59a23e77d98f592b7533dabb8
SHA1d2ab46ba01d896c1edb926b5f5efd418b72ac51f
SHA256c93f3c81aa456c7b615a94b4d1f4c54d4c8fed66ff080c9146dd93ceaf4c9250
SHA51221d707b7cee685ce46a5be3743c5fe84e3073b79ca6cb00a02e341346b451eb9341f02bc626d114b0758ab372ff0bf8c54fa9704e9953de4d771e9c4af493b5d
-
Filesize
426KB
MD549dac1945431fc34d9576cb38c92adf1
SHA158d5a62f63bdd16780fd5838b685472a407d3a26
SHA256b78b8c02de48be52a9af58a1839e3bdaa2e55dbd915995abf1709b00c1d07fac
SHA51237bc9d60b99f287b72f681fe0ea787f0ff719bc06f85ed56cbd9f73ea50ef883d812c9aa4601c6189fcf815c6d4e5c3ab2cf2231f335616f2b6ef39c3a23c955
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0