Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exe
Resource
win10v2004-20241007-en
General
-
Target
bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exe
-
Size
650KB
-
MD5
382f29ff415cfbefb30e5a90ddbd8a69
-
SHA1
8a7fac4a5a6fc31a73276286e63fb8597e58ce1d
-
SHA256
bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650
-
SHA512
85e51bd0ca75a42e341ed4c9da5c6d3b6845e1b3bb41086ab4f021b7e757cea1bd8e596fc6e3793224c601084488274129f2400bacef001ecd5711d4d3400e5c
-
SSDEEP
12288:eMrzy904m73jsxQGvoaYZcMQUTVu9iKj1zsL3cU6DgDMubd08HwQ:lyDWjtOWSspu9iKj1oL3cTju57t
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr078757.exe healer behavioral1/memory/2896-15-0x0000000000750000-0x000000000075A000-memory.dmp healer -
Healer family
-
Processes:
jr078757.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr078757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr078757.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr078757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr078757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr078757.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr078757.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3332-2105-0x0000000005560000-0x0000000005592000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2948-2118-0x0000000000560000-0x0000000000590000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr137838.exe family_redline behavioral1/memory/5168-2129-0x00000000001E0000-0x000000000020E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku439240.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ku439240.exe -
Executes dropped EXE 5 IoCs
Processes:
zidu1396.exejr078757.exeku439240.exe1.exelr137838.exepid process 1652 zidu1396.exe 2896 jr078757.exe 3332 ku439240.exe 2948 1.exe 5168 lr137838.exe -
Processes:
jr078757.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr078757.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exezidu1396.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidu1396.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1012 3332 WerFault.exe ku439240.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exezidu1396.exeku439240.exe1.exelr137838.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zidu1396.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku439240.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr137838.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr078757.exepid process 2896 jr078757.exe 2896 jr078757.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr078757.exeku439240.exedescription pid process Token: SeDebugPrivilege 2896 jr078757.exe Token: SeDebugPrivilege 3332 ku439240.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exezidu1396.exeku439240.exedescription pid process target process PID 3640 wrote to memory of 1652 3640 bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exe zidu1396.exe PID 3640 wrote to memory of 1652 3640 bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exe zidu1396.exe PID 3640 wrote to memory of 1652 3640 bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exe zidu1396.exe PID 1652 wrote to memory of 2896 1652 zidu1396.exe jr078757.exe PID 1652 wrote to memory of 2896 1652 zidu1396.exe jr078757.exe PID 1652 wrote to memory of 3332 1652 zidu1396.exe ku439240.exe PID 1652 wrote to memory of 3332 1652 zidu1396.exe ku439240.exe PID 1652 wrote to memory of 3332 1652 zidu1396.exe ku439240.exe PID 3332 wrote to memory of 2948 3332 ku439240.exe 1.exe PID 3332 wrote to memory of 2948 3332 ku439240.exe 1.exe PID 3332 wrote to memory of 2948 3332 ku439240.exe 1.exe PID 3640 wrote to memory of 5168 3640 bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exe lr137838.exe PID 3640 wrote to memory of 5168 3640 bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exe lr137838.exe PID 3640 wrote to memory of 5168 3640 bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exe lr137838.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exe"C:\Users\Admin\AppData\Local\Temp\bed856928533116e29c20af9abf3e18c7a2da493556def8c6a253c886099b650.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidu1396.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidu1396.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr078757.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr078757.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku439240.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku439240.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 12164⤵
- Program crash
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr137838.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr137838.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3332 -ip 33321⤵PID:1104
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD57943a53c799c2a687fa2b6f4c8c34d64
SHA1e531def4d7141cc338a5b1e324636f0e4a0bb16a
SHA256b791c5fce7c88378974157eea94a3da38e79ab3c73326c1f9467039692313e39
SHA512a9046a6fdfa896f8f123a47ae2f8336a12e5ac01a6572969b99363ce7810152a8726b142cd92d3b663364d5300c84e222a34714fde35cdb73098879ffcb2105b
-
Filesize
496KB
MD592545d19bdd640c638f77ecc48540f1e
SHA1fea1a63e3acaac83ff49fbe72d3aa9cd9637c5b0
SHA2568d78337207d9ae2a2c66748aac9c2a14f1c5a0b9211db510c91ae37cd89ee179
SHA512e49309f0bc520c3797758e9dd59e88678d54249be00a3fad97391439d0e80a6a0eae23f70277ac48ec4eb3ed20e08e5c54f39804175de4c0f58f8e014b4788bf
-
Filesize
11KB
MD5ba447d378a1267606b1f361624acb6e8
SHA141ce7255de8d20141e4813e6ca50228c8622644b
SHA2566ef1b37a60a7c7c234da28d5ae1ec21c4dbceab4088a121f0cd55eb163f75668
SHA5127a8c8a548822f74c5b40c99284085939ff89a392ed73e100516aa5ac77511535d5d4563dbe9912e3e70472bf71b0d74581cc806db20fc9c79c1d519067e4c16f
-
Filesize
414KB
MD5a8561b324aac87cc0ac24a9b48778e5e
SHA15183417099067c9f2d8dde7857cad61aa5c388c1
SHA256f57a762e1d457a82be717da2ac465349a95b7c56a91b7525bc21078ec0bc2397
SHA512900eb50bd9374904b703ada68eb580d3f89ccae286dab93c40a5ce71b3de78324c25ed530f1813349872862bb39ff12c2b9c99f283825d263b73400f1393b073
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0