Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 02:19
Static task
static1
Behavioral task
behavioral1
Sample
c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exe
Resource
win10v2004-20241007-en
General
-
Target
c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exe
-
Size
651KB
-
MD5
7e2ccc61a382b55d6d168a895accf213
-
SHA1
8844c88b52ade7507ff0eb8ecd23ba1ebaf3f54d
-
SHA256
c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef
-
SHA512
dde611d57a970ea03c98092328d3c3d2c47354d921565aa994c707a92c20037fb16d8f38e8388b29d39c6e62a248f3e894759a45e2fb52f35bdc445a02eb537c
-
SSDEEP
12288:vMrDy901/4/UtA8QsGVJGCAWZQ33pgGmqVr8D+Wi6I2k:0yitA8QsdCaKG1y+Wi92k
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr566820.exe healer behavioral1/memory/3184-15-0x0000000000FC0000-0x0000000000FCA000-memory.dmp healer -
Healer family
-
Processes:
jr566820.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr566820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr566820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr566820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr566820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr566820.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr566820.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2088-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5904-2118-0x0000000000BB0000-0x0000000000BE0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr293388.exe family_redline behavioral1/memory/4388-2129-0x0000000000500000-0x000000000052E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku210163.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ku210163.exe -
Executes dropped EXE 5 IoCs
Processes:
zikC5455.exejr566820.exeku210163.exe1.exelr293388.exepid process 2388 zikC5455.exe 3184 jr566820.exe 2088 ku210163.exe 5904 1.exe 4388 lr293388.exe -
Processes:
jr566820.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr566820.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exezikC5455.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zikC5455.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5132 2088 WerFault.exe ku210163.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exelr293388.exec7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exezikC5455.exeku210163.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr293388.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zikC5455.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku210163.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr566820.exepid process 3184 jr566820.exe 3184 jr566820.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr566820.exeku210163.exedescription pid process Token: SeDebugPrivilege 3184 jr566820.exe Token: SeDebugPrivilege 2088 ku210163.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exezikC5455.exeku210163.exedescription pid process target process PID 216 wrote to memory of 2388 216 c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exe zikC5455.exe PID 216 wrote to memory of 2388 216 c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exe zikC5455.exe PID 216 wrote to memory of 2388 216 c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exe zikC5455.exe PID 2388 wrote to memory of 3184 2388 zikC5455.exe jr566820.exe PID 2388 wrote to memory of 3184 2388 zikC5455.exe jr566820.exe PID 2388 wrote to memory of 2088 2388 zikC5455.exe ku210163.exe PID 2388 wrote to memory of 2088 2388 zikC5455.exe ku210163.exe PID 2388 wrote to memory of 2088 2388 zikC5455.exe ku210163.exe PID 2088 wrote to memory of 5904 2088 ku210163.exe 1.exe PID 2088 wrote to memory of 5904 2088 ku210163.exe 1.exe PID 2088 wrote to memory of 5904 2088 ku210163.exe 1.exe PID 216 wrote to memory of 4388 216 c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exe lr293388.exe PID 216 wrote to memory of 4388 216 c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exe lr293388.exe PID 216 wrote to memory of 4388 216 c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exe lr293388.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exe"C:\Users\Admin\AppData\Local\Temp\c7006dcbf0dcd2f65a5b32f018174058cd800c78ac05bab48765932f522e01ef.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikC5455.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikC5455.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr566820.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr566820.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku210163.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku210163.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 15004⤵
- Program crash
PID:5132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr293388.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr293388.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4388
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2088 -ip 20881⤵PID:5836
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5797b81c04691b2af737ba437efefa3cd
SHA10e5f25c127f7de32b83dec1ccf5e9147430edc00
SHA256ba93f238d3bbc8e3868bcc1e85fb3d1ddb5ab927c4a1451be4a7793ea34c44fa
SHA512b0ee5624d7af24105f8be1c81a0a3b4a1cdb034f97897dcccee95502da1dd689246a4df24a567f8dc2a6608c7a7ef09c1c416e1f61c8c5a1101cef8dd977bc9d
-
Filesize
497KB
MD5e41b37e1b028ed5b0770d4450516de9c
SHA14d582932042a75903210879fa5c52703b9989ad6
SHA2564ab8d0d287e8e479f2fcbc6ea6d0eee0b337a3e1babc8806aa332b90392b9b9d
SHA51259e9b3ca2551254b1ce669aaf79eae20edf63e4d1a2e69f63330523ca6140e560ceb42b2a6143e690b02e58052bfbfe271d4c3b0a256e2f35c59cfff130f7989
-
Filesize
11KB
MD56c94eb056a187b5548595dc8cfc97b1d
SHA152f12562abdbce64a72c0668e74e26e2d48b2407
SHA2568e0c9536bd5fe0d04ee5ded32726fa988a4bd5ebdb2ccd38e21ee90eb37e5d8c
SHA512b8e66b5baa9bfe3b2dba36c21645cf5db2656f4d679eda8356da12d6bc6a5a9d3902e5c06261a6d0565e5fa2943ddd8b34b75fce85057646fb061c8d91a37ad7
-
Filesize
415KB
MD554e091747098ec2129fbf99ffb5c6225
SHA10875a14db357de9282fab86424d1f4c1aada68e7
SHA2561c43fa8279d418da1abeabf5d6792025041b6816ee33a5fe1a2233ebaea58546
SHA512c9794c4818231730efda5213741d1fe52d508b939fd8e3c332b2bacca8364f21ead1f27e0fa9ae0802b20930e289b3e43c76a95b869ff1d46fe2fe4072cab9fb
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0