Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 16:00
Static task
static1
Behavioral task
behavioral1
Sample
14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exe
Resource
win10v2004-20241007-en
General
-
Target
14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exe
-
Size
650KB
-
MD5
0f0d06f8db4507f6baf5f7bd31101923
-
SHA1
e6f7151c7d56657bf5d6af02109262a67b77b319
-
SHA256
14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a
-
SHA512
b9e8aaa1472fd56d64aeeab374416b97a698e61adf8aeeb8e1ac5195179385941dfc1454663ffcf75a6ffa2acacc781b20903ea997d9b352202c07099f60e9fb
-
SSDEEP
12288:TMrdy903cmFbjHbLzh2Qu9fKDMzr136Ugn1ERuuITY03Jx:CyFuzbLFu9fKDMv136R2uFTXz
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr053242.exe healer behavioral1/memory/4756-15-0x0000000000ED0000-0x0000000000EDA000-memory.dmp healer -
Healer family
-
Processes:
jr053242.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr053242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr053242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr053242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr053242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr053242.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr053242.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3968-2104-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1368-2117-0x0000000000F00000-0x0000000000F30000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr758003.exe family_redline behavioral1/memory/5340-2128-0x0000000000F40000-0x0000000000F6E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku202978.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ku202978.exe -
Executes dropped EXE 5 IoCs
Processes:
zikd4308.exejr053242.exeku202978.exe1.exelr758003.exepid process 5012 zikd4308.exe 4756 jr053242.exe 3968 ku202978.exe 1368 1.exe 5340 lr758003.exe -
Processes:
jr053242.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr053242.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exezikd4308.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zikd4308.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5212 3968 WerFault.exe ku202978.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
lr758003.exe14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exezikd4308.exeku202978.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr758003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zikd4308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku202978.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr053242.exepid process 4756 jr053242.exe 4756 jr053242.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr053242.exeku202978.exedescription pid process Token: SeDebugPrivilege 4756 jr053242.exe Token: SeDebugPrivilege 3968 ku202978.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exezikd4308.exeku202978.exedescription pid process target process PID 3956 wrote to memory of 5012 3956 14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exe zikd4308.exe PID 3956 wrote to memory of 5012 3956 14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exe zikd4308.exe PID 3956 wrote to memory of 5012 3956 14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exe zikd4308.exe PID 5012 wrote to memory of 4756 5012 zikd4308.exe jr053242.exe PID 5012 wrote to memory of 4756 5012 zikd4308.exe jr053242.exe PID 5012 wrote to memory of 3968 5012 zikd4308.exe ku202978.exe PID 5012 wrote to memory of 3968 5012 zikd4308.exe ku202978.exe PID 5012 wrote to memory of 3968 5012 zikd4308.exe ku202978.exe PID 3968 wrote to memory of 1368 3968 ku202978.exe 1.exe PID 3968 wrote to memory of 1368 3968 ku202978.exe 1.exe PID 3968 wrote to memory of 1368 3968 ku202978.exe 1.exe PID 3956 wrote to memory of 5340 3956 14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exe lr758003.exe PID 3956 wrote to memory of 5340 3956 14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exe lr758003.exe PID 3956 wrote to memory of 5340 3956 14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exe lr758003.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exe"C:\Users\Admin\AppData\Local\Temp\14baab2d9128035ef8cf0caf28c4ee3a4638138814d88ed04086cfd3d678780a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikd4308.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikd4308.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr053242.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr053242.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku202978.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku202978.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 15364⤵
- Program crash
PID:5212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr758003.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr758003.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3968 -ip 39681⤵PID:2860
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5658e7122c8e820c86f79379e3c09741b
SHA1b876fc8733b8c23a1a79fe2a7968834b9349bfa7
SHA256db6a34c457d2896342cbdbd699b7df4a66492e12b834a367cd0f84d04d2cb515
SHA512ae84bfe39a02933cb8501e6244282e15eb60028569a8c0cc704eb7f8ec8b6b2223a46be52d802c7386c7fa242f331ceecf416f3cb0071de3d92c1c3863e85fcc
-
Filesize
496KB
MD589b1da8757153dba95444f35ce38aa94
SHA1b5df83f33c34785f0ea8c502eaa6dec1a0a71e0b
SHA256a7155933625defb2f37ec6416e2a3c6471b2b055c352e5338d8331b05e1347bf
SHA51241712ee94540a77841cb7f0f5a9b7e0696a09388d7aec0f05475ee4e04d9ecf9b9c1219e0565fc7923668c2f57ec903caab5751f3b7e3f3cab3f06f8254a9138
-
Filesize
11KB
MD58a8de0fd584c718e2c5f360fd3e539b2
SHA1c6f7ba0adb699fa4fcb589e58c92a060ad7c9155
SHA256256b88727e5a36ba2f8557c1477b0700456b9b21718bf7b36911c6c4afc28e00
SHA5123d4082acff695b82724b8f4781f684399957d331521d95673aabe6c6a9ef978cbe66582044c25eac2c57df076cc7f4da127c14d5c226ca825aed975265fd13f9
-
Filesize
414KB
MD51cc9e4b2fbceed7eda1e167cc5d1aa5e
SHA185c170f23e3434f7b4191ed457b52ee22faaad65
SHA256af54d3df98bf820ca728b314da6ac1a3c087901d211536b2d9ac12824764808b
SHA51282ee93cd8010291e093165448910c84665e2c805883129cacfffe137365f8c331f690c514121444d158f05405c9d07ed490b393163ce29742526cffcd47609ad
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0