Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/11/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
a56cd0d8485df2f5277e1497db2b707db7373a90bb6b071ef93d6770ea981bbb.exe
Resource
win10v2004-20241007-en
General
-
Target
a56cd0d8485df2f5277e1497db2b707db7373a90bb6b071ef93d6770ea981bbb.exe
-
Size
661KB
-
MD5
886b956f48f7fa103ff866aff8204ed5
-
SHA1
a33edceb00879c55af5ba2e58f442b639057bf78
-
SHA256
a56cd0d8485df2f5277e1497db2b707db7373a90bb6b071ef93d6770ea981bbb
-
SHA512
be1a6371ed090d86b9e1169bb40fdfb789df5544b5e169ce976f108337cd725365bd1eb99a1a20e616e61e861e1e668e72ff6b41afe52eb7368a0da631cbf03c
-
SSDEEP
12288:nMr6y90T/bO4gbHMlrlBP3cY4IWpihJZKUgih3tJRHjyBUK:RyP+lrlB0Y4Ivv1dWBh
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c8b-12.dat healer behavioral1/memory/4536-14-0x00000000008F0000-0x00000000008FA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr373955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr373955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr373955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr373955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr373955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr373955.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4232-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x000400000001e4d4-2110.dat family_redline behavioral1/memory/2380-2118-0x0000000000410000-0x0000000000440000-memory.dmp family_redline behavioral1/files/0x0007000000023c89-2127.dat family_redline behavioral1/memory/4572-2129-0x0000000000C30000-0x0000000000C5E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation ku276712.exe -
Executes dropped EXE 5 IoCs
pid Process 4140 zigQ0538.exe 4536 jr373955.exe 4232 ku276712.exe 2380 1.exe 4572 lr455625.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr373955.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a56cd0d8485df2f5277e1497db2b707db7373a90bb6b071ef93d6770ea981bbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zigQ0538.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1808 4232 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a56cd0d8485df2f5277e1497db2b707db7373a90bb6b071ef93d6770ea981bbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zigQ0538.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku276712.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr455625.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4536 jr373955.exe 4536 jr373955.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4536 jr373955.exe Token: SeDebugPrivilege 4232 ku276712.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3744 wrote to memory of 4140 3744 a56cd0d8485df2f5277e1497db2b707db7373a90bb6b071ef93d6770ea981bbb.exe 84 PID 3744 wrote to memory of 4140 3744 a56cd0d8485df2f5277e1497db2b707db7373a90bb6b071ef93d6770ea981bbb.exe 84 PID 3744 wrote to memory of 4140 3744 a56cd0d8485df2f5277e1497db2b707db7373a90bb6b071ef93d6770ea981bbb.exe 84 PID 4140 wrote to memory of 4536 4140 zigQ0538.exe 86 PID 4140 wrote to memory of 4536 4140 zigQ0538.exe 86 PID 4140 wrote to memory of 4232 4140 zigQ0538.exe 93 PID 4140 wrote to memory of 4232 4140 zigQ0538.exe 93 PID 4140 wrote to memory of 4232 4140 zigQ0538.exe 93 PID 4232 wrote to memory of 2380 4232 ku276712.exe 94 PID 4232 wrote to memory of 2380 4232 ku276712.exe 94 PID 4232 wrote to memory of 2380 4232 ku276712.exe 94 PID 3744 wrote to memory of 4572 3744 a56cd0d8485df2f5277e1497db2b707db7373a90bb6b071ef93d6770ea981bbb.exe 98 PID 3744 wrote to memory of 4572 3744 a56cd0d8485df2f5277e1497db2b707db7373a90bb6b071ef93d6770ea981bbb.exe 98 PID 3744 wrote to memory of 4572 3744 a56cd0d8485df2f5277e1497db2b707db7373a90bb6b071ef93d6770ea981bbb.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\a56cd0d8485df2f5277e1497db2b707db7373a90bb6b071ef93d6770ea981bbb.exe"C:\Users\Admin\AppData\Local\Temp\a56cd0d8485df2f5277e1497db2b707db7373a90bb6b071ef93d6770ea981bbb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigQ0538.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigQ0538.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr373955.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr373955.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku276712.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku276712.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2380
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 13884⤵
- Program crash
PID:1808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr455625.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr455625.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4232 -ip 42321⤵PID:4044
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD575276525461a25c8f2f635bc99ab490c
SHA12c831e9d916798b455f6449d73a7952c1eb4d7f3
SHA256a2c11e59c28425ea352e1b2f5452d837bc284054a9da647dda6afde344dde9d3
SHA5129e81ccc59403158bbe779d0fdd4234b40fcb105097427b430ea0edbc24abeda87adf6a13b8f4b85c0b7301d8a1e3bbdee794d55ddee1c3b9aaacdd8dcb137d65
-
Filesize
507KB
MD53ca92735341c0cf4a16ef399ce1bf893
SHA1b115e9f514e9d0ee1394b095d0a717e23de5def8
SHA256846414d688004ffdef92747d91612c06a93087f8d05f0775ba8a86d34b900195
SHA5126d713533fa4bbb60721f7e90377b9699a0e1ac9f44bd00e690c8ab1c2776774a4c593c0e98def015b11780af245d83ba315311e47e451f4b3399ea4f3e8d8ce8
-
Filesize
15KB
MD54ed1da36d3392959a0d3aff55b864280
SHA139cc721cae406bb2555e48f2096274bea5e36bfa
SHA2564fd8e9f9c514bc608e600f9928cb2e0e2127c50602254ddbe232824c4ca12972
SHA5129ef6dd0be777b08e2166f4a86a1c2781756d7ce1a8fca0e7decddf4b5f3f07e71b6b4ba3b84da33acce8686f68c0ad6f7a4c6344f013126235725e1a9558c087
-
Filesize
426KB
MD5167b2b557b410ddd7285e8347c8cd3e0
SHA1cd8e87545260a31fb34ff25df3b793a6b1a629f0
SHA256d5ae0dacb583b3c57ef9c2a0185884cb2b7a34a9c62a79ad226873af82350667
SHA5123e07b106d342a2f12764d0ff189823f35e390b7e07aaf03892dcb51d99230da5bb4102ef57fbf62a27ff04b2aa69b40d0c5dca12757bbcffd28281418b75694e
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0