Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
278cedba32644aa16f10a42093460ad5df552feae23ea2eb6548580c869338a2.exe
Resource
win10v2004-20241007-en
General
-
Target
278cedba32644aa16f10a42093460ad5df552feae23ea2eb6548580c869338a2.exe
-
Size
660KB
-
MD5
f3e07125ed115439aa127dd72431dbab
-
SHA1
84b7a3a5a9ca8debb3657adbf1a0719d73d85c44
-
SHA256
278cedba32644aa16f10a42093460ad5df552feae23ea2eb6548580c869338a2
-
SHA512
879faa8bef36f99188565123fbe658f6dad8a256589890354b2520458d07186256abec04f25a364de4ab7d3e9300600219b1052093ce37b42dc41c4ef960e3dd
-
SSDEEP
12288:/MrPy902FFXz46XVfPTJyVpPES/+7XBk2g/laTlmTn7/tzAQNpvwvhVg+:0ylfsOpTJumi+F7g/lR7100pvwvhVg+
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9e-12.dat healer behavioral1/memory/2056-15-0x00000000004A0000-0x00000000004AA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr058008.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr058008.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr058008.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr058008.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr058008.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr058008.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2348-2104-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x000e000000023b54-2109.dat family_redline behavioral1/memory/6964-2117-0x0000000000A40000-0x0000000000A70000-memory.dmp family_redline behavioral1/files/0x0007000000023c9c-2127.dat family_redline behavioral1/memory/6592-2128-0x0000000000180000-0x00000000001AE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ku829455.exe -
Executes dropped EXE 5 IoCs
pid Process 1040 ziDM4689.exe 2056 jr058008.exe 2348 ku829455.exe 6964 1.exe 6592 lr944682.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr058008.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 278cedba32644aa16f10a42093460ad5df552feae23ea2eb6548580c869338a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziDM4689.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4608 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6716 2348 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku829455.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr944682.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 278cedba32644aa16f10a42093460ad5df552feae23ea2eb6548580c869338a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziDM4689.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2056 jr058008.exe 2056 jr058008.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2056 jr058008.exe Token: SeDebugPrivilege 2348 ku829455.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4900 wrote to memory of 1040 4900 278cedba32644aa16f10a42093460ad5df552feae23ea2eb6548580c869338a2.exe 83 PID 4900 wrote to memory of 1040 4900 278cedba32644aa16f10a42093460ad5df552feae23ea2eb6548580c869338a2.exe 83 PID 4900 wrote to memory of 1040 4900 278cedba32644aa16f10a42093460ad5df552feae23ea2eb6548580c869338a2.exe 83 PID 1040 wrote to memory of 2056 1040 ziDM4689.exe 84 PID 1040 wrote to memory of 2056 1040 ziDM4689.exe 84 PID 1040 wrote to memory of 2348 1040 ziDM4689.exe 96 PID 1040 wrote to memory of 2348 1040 ziDM4689.exe 96 PID 1040 wrote to memory of 2348 1040 ziDM4689.exe 96 PID 2348 wrote to memory of 6964 2348 ku829455.exe 97 PID 2348 wrote to memory of 6964 2348 ku829455.exe 97 PID 2348 wrote to memory of 6964 2348 ku829455.exe 97 PID 4900 wrote to memory of 6592 4900 278cedba32644aa16f10a42093460ad5df552feae23ea2eb6548580c869338a2.exe 102 PID 4900 wrote to memory of 6592 4900 278cedba32644aa16f10a42093460ad5df552feae23ea2eb6548580c869338a2.exe 102 PID 4900 wrote to memory of 6592 4900 278cedba32644aa16f10a42093460ad5df552feae23ea2eb6548580c869338a2.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\278cedba32644aa16f10a42093460ad5df552feae23ea2eb6548580c869338a2.exe"C:\Users\Admin\AppData\Local\Temp\278cedba32644aa16f10a42093460ad5df552feae23ea2eb6548580c869338a2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDM4689.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDM4689.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr058008.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr058008.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku829455.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku829455.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 14444⤵
- Program crash
PID:6716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr944682.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr944682.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2348 -ip 23481⤵PID:6804
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4608
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD59bc12b5e02cb3b263635ee0eb2b702de
SHA1a653cdc89d81a891064c87cefc8d48dbe2ee4bb8
SHA256c2fcc3c0da96fe1b6c3f7cafa7e31f8e8f1d2c655f6cabe43b7bc8601e66a397
SHA512b25167c011eae78d755d6a9f3c2171f9c3aa0c3275c5bcd15f65a7438be8eea906134bb986da32dc25649b46738c064746e5d05b6771265fd5fb021e80fde805
-
Filesize
506KB
MD518dbba2d74c5afce783733d05c415395
SHA16288d5583a7c34055b18b7401daa2ade09b3d2bc
SHA2563690dfd70ec9022df164f6fce5bfb36bd21d8f8f8b03d1814ddfc926ead09c19
SHA512f5546994ce7d57447285c3870d95cf5bfe1c10defe8d4417ddc1f46de54c92698a7002e3f9e0761974972b772d8d5a670871f474090822e8c92d37a8a8f61a57
-
Filesize
15KB
MD51aeb8cdd6c149e36742d4057fbf4ada4
SHA1ed20d6a7cce3114b192ccbf08ee4a0086a23fa4c
SHA2569dce0908137b15913403f330a56c5142337cc568871573213573d28ed5ec86a4
SHA5128919a64393849eb833ab52dae0578feeff637441d81ec65439d6e2060cb1a1f69663ce5d22c3e489055239349129d4b446d46e5c8cc8199e7a35ddeb21eebcb0
-
Filesize
426KB
MD5f8d96d51b3a2c58eb2a9d971f0037ad1
SHA16a0cb27ff9ead9e9ff5bbe36ac893140ad949169
SHA256f6cbb72e282325e65d33b9dcefae425d571f57d19ebe74a5015f50fe5759248f
SHA512687c6c61f05be51a1873590cb470a133ad30ef55694127a9db6b45f1fabbf87171bff76de899ad2dc344f8917e7a0739fec4c694fae5c2f8f7eb2a57b2d3640d
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0