Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exe
Resource
win10v2004-20241007-en
General
-
Target
730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exe
-
Size
684KB
-
MD5
98268add4e4bf02ead7689a2f707689c
-
SHA1
897374e13b2d40a8670c6b48c7eed9e958ab0333
-
SHA256
730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c
-
SHA512
428d5dfd79811f5d1fe89c1532b7f75be2e146d24034116a82b73a466fa862f74bdfcff58f32f95c39430a0f660926a7cda754ccd9f525860b45fc6122916c99
-
SSDEEP
12288:1Mruy900KN6MR+FEXW407oqhcLw4cHf6J6rFL373fMiMGXSLOQnFOW1eFBryTHcF:fy+N6c3X10UM4cHftLzftzrkVeFxyz+h
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr850376.exe healer behavioral1/memory/3288-15-0x0000000000850000-0x000000000085A000-memory.dmp healer -
Healer family
-
Processes:
jr850376.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr850376.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr850376.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr850376.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr850376.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr850376.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr850376.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1328-2105-0x0000000005740000-0x0000000005772000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3676-2118-0x0000000000B70000-0x0000000000BA0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr780444.exe family_redline behavioral1/memory/3968-2129-0x0000000000010000-0x000000000003E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku686724.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ku686724.exe -
Executes dropped EXE 5 IoCs
Processes:
zidM8446.exejr850376.exeku686724.exe1.exelr780444.exepid process 1764 zidM8446.exe 3288 jr850376.exe 1328 ku686724.exe 3676 1.exe 3968 lr780444.exe -
Processes:
jr850376.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr850376.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
zidM8446.exe730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidM8446.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4696 1328 WerFault.exe ku686724.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exelr780444.exe730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exezidM8446.exeku686724.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr780444.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zidM8446.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku686724.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr850376.exepid process 3288 jr850376.exe 3288 jr850376.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr850376.exeku686724.exedescription pid process Token: SeDebugPrivilege 3288 jr850376.exe Token: SeDebugPrivilege 1328 ku686724.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exezidM8446.exeku686724.exedescription pid process target process PID 4960 wrote to memory of 1764 4960 730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exe zidM8446.exe PID 4960 wrote to memory of 1764 4960 730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exe zidM8446.exe PID 4960 wrote to memory of 1764 4960 730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exe zidM8446.exe PID 1764 wrote to memory of 3288 1764 zidM8446.exe jr850376.exe PID 1764 wrote to memory of 3288 1764 zidM8446.exe jr850376.exe PID 1764 wrote to memory of 1328 1764 zidM8446.exe ku686724.exe PID 1764 wrote to memory of 1328 1764 zidM8446.exe ku686724.exe PID 1764 wrote to memory of 1328 1764 zidM8446.exe ku686724.exe PID 1328 wrote to memory of 3676 1328 ku686724.exe 1.exe PID 1328 wrote to memory of 3676 1328 ku686724.exe 1.exe PID 1328 wrote to memory of 3676 1328 ku686724.exe 1.exe PID 4960 wrote to memory of 3968 4960 730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exe lr780444.exe PID 4960 wrote to memory of 3968 4960 730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exe lr780444.exe PID 4960 wrote to memory of 3968 4960 730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exe lr780444.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exe"C:\Users\Admin\AppData\Local\Temp\730a1457d6afdf4b7779869645a105a6052eb41eb5fcb2c729562f1af25c3b9c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidM8446.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidM8446.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr850376.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr850376.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku686724.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku686724.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 13844⤵
- Program crash
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr780444.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr780444.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1328 -ip 13281⤵PID:1620
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD533ea22f6901e23bf915469eb12a49e83
SHA1117bbd1282f4d9c48251fadc5f9f47151631d230
SHA25615055495eb42a68c389fc5293835aa33e6880dc050914e958fa90658f01876ea
SHA512daa0115a20b338037019c40e589068bb2960099354be8fcfe653087e996b9855cdc28b4f99f62d6ff8250e2c1334233bdb3751bc63edaca7282a73635606511b
-
Filesize
530KB
MD571ee084c8abb06ca247cf46e3b6b23d2
SHA1d679f25afeb0a9412e56151c469f5e5d1d0912b8
SHA2566b259c3b3193c99c7800a5008cd6a6a6e78b032ba73ac6f595837ffcf27378cc
SHA51293c75b4610ce9105d8ac3ce3a535edbbe63c259c865ed066f0fa527d35f8715abb50cc6813a39cc29c7dba84148c4869b80f8777fa8b9c66c68c75522c68eac9
-
Filesize
12KB
MD5f85901fcc83414178c8a881836b4b2c5
SHA1f0fb83bc0001f02bb667eadcd304d94256c185dd
SHA256aa711fb69f762623c2f61665c13a2e430d89bc81e418385b89da18e34073121c
SHA512650a42f98f4439662df4bc0a4d04eab932e16914087d7af64c00bd40529178086cadf47469f8522d8250e432495f1856948ed739c46999e5fe05dd217d28e489
-
Filesize
495KB
MD5faced9233c92b7358eb9ed1ac71706d1
SHA10e83b3a5abf54c09bda486b98aaf227c6400fc02
SHA256dbb7246c831fd3b9b060a95b435e357cc62fd40136206b254af64228502f6a98
SHA5123c5589c496540cb54f13634757b296ebe8cef1b38d6a81b824beac4d77db3c21d355d2ece6ba0e1fae8e7ae865104cd59954ad3d6979e3023e80b7f91583c506
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0