Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 16:24
Static task
static1
Behavioral task
behavioral1
Sample
f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exe
Resource
win10v2004-20241007-en
General
-
Target
f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exe
-
Size
684KB
-
MD5
a0ffe07063817b2308b7665c00b16881
-
SHA1
3b69d1efacab031f8c04cadcc28c11f4d93555ce
-
SHA256
f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6
-
SHA512
67eaedcd6421441314efd8ef1ff6c907529674ed2f1264454e7db6539a4be3e7a034f9053e6c81abc8775ed30f825eb734e3bb3fad565ae90994ee000b07880e
-
SSDEEP
12288:lMray90MwNsTyr4UK7Uc8j31wcw/l5+9G54AIqwbyiDQNp6xXNkMcP0BEK3:vyBwNsJUeUN3pwYsGvDeKqMY0Bp
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr610293.exe healer behavioral1/memory/2244-15-0x0000000000850000-0x000000000085A000-memory.dmp healer -
Healer family
-
Processes:
jr610293.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr610293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr610293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr610293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr610293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr610293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr610293.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/3876-2105-0x0000000005750000-0x0000000005782000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/2296-2118-0x0000000000550000-0x0000000000580000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr740517.exe family_redline behavioral1/memory/5436-2129-0x0000000000BF0000-0x0000000000C1E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku342282.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ku342282.exe -
Executes dropped EXE 5 IoCs
Processes:
ziHJ7211.exejr610293.exeku342282.exe1.exelr740517.exepid process 5064 ziHJ7211.exe 2244 jr610293.exe 3876 ku342282.exe 2296 1.exe 5436 lr740517.exe -
Processes:
jr610293.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr610293.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exeziHJ7211.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziHJ7211.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4332 3876 WerFault.exe ku342282.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziHJ7211.exeku342282.exe1.exelr740517.exef8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziHJ7211.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku342282.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr740517.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr610293.exepid process 2244 jr610293.exe 2244 jr610293.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr610293.exeku342282.exedescription pid process Token: SeDebugPrivilege 2244 jr610293.exe Token: SeDebugPrivilege 3876 ku342282.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exeziHJ7211.exeku342282.exedescription pid process target process PID 4260 wrote to memory of 5064 4260 f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exe ziHJ7211.exe PID 4260 wrote to memory of 5064 4260 f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exe ziHJ7211.exe PID 4260 wrote to memory of 5064 4260 f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exe ziHJ7211.exe PID 5064 wrote to memory of 2244 5064 ziHJ7211.exe jr610293.exe PID 5064 wrote to memory of 2244 5064 ziHJ7211.exe jr610293.exe PID 5064 wrote to memory of 3876 5064 ziHJ7211.exe ku342282.exe PID 5064 wrote to memory of 3876 5064 ziHJ7211.exe ku342282.exe PID 5064 wrote to memory of 3876 5064 ziHJ7211.exe ku342282.exe PID 3876 wrote to memory of 2296 3876 ku342282.exe 1.exe PID 3876 wrote to memory of 2296 3876 ku342282.exe 1.exe PID 3876 wrote to memory of 2296 3876 ku342282.exe 1.exe PID 4260 wrote to memory of 5436 4260 f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exe lr740517.exe PID 4260 wrote to memory of 5436 4260 f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exe lr740517.exe PID 4260 wrote to memory of 5436 4260 f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exe lr740517.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exe"C:\Users\Admin\AppData\Local\Temp\f8084f298fb23f089567ab0ac657e4b91a4e6d3a0853f20270ea697a95a29ef6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHJ7211.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHJ7211.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr610293.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr610293.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku342282.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku342282.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3876 -s 13804⤵
- Program crash
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr740517.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr740517.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5436
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3876 -ip 38761⤵PID:3640
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5f67e1e4d037008980b8bcf3071aa3fd9
SHA1b4352238113e42651ed33b8ff166bd9c6fd0db69
SHA256f04c6182621ae895d3c7fdae8e6b8524d4b42f378b24233571ec06cf54b6ef60
SHA51272628e4ffaf77080338dbcce5d05e2ce629bb847df58dd522fa0d92b00ca146c26530d0cbfc6f67ac28588f55027c624579f23a6f548f3ae4597d57e726f54d8
-
Filesize
530KB
MD5ca3546b7b1331ab1889c36699e6c6da4
SHA1839c0893f716646e4691fe21cf9f3ea8a4396d92
SHA2561361d8de18b50b34135df85933107778cdfefd01fde2f20648cf6d15f673921c
SHA512f1c4693441cf635041174b7b351028e2da7b2e6e4d1e347ec7c29bfc685889b0383780b504857bd6e28711450bdab6c6d4fc434b93faa7586c2d8cb15708be85
-
Filesize
12KB
MD5d90c7807643ba6989f87d515ba9726b8
SHA1a07c8b50187da002ecf69e7fee33f367602e205f
SHA25670ae1cb9d92aee1727ab84110ee9e4dcac538bd1fbc2423b890074492d6b4a39
SHA512dbee26964e1c2f709ebdb5fd67f715572140a1775c09d4baca5aee8c43ba7534480888c63e6a4aeaa59a085b1eab83b739926c2d9d3d46b77535ef534ce28071
-
Filesize
495KB
MD557696bd2bc07ee1c4439860988285912
SHA1b644977e9365ba8d256fd66818efff93224a7103
SHA2565e0b586673e5c8e26ca903f6ab5018c99295f421ef2348f43310f9f1c0bd7050
SHA512139c85a0f84f3c1e9a30bfd9f25a7c55b3fdb9681cab3cf0eeb5c9f5bdb98b336a260f4203fdf9a9ff8a34d2ba085176c23205f58eb342a8f1d8fdb84b9482dc
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0