Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 04:05
Static task
static1
Behavioral task
behavioral1
Sample
671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exe
Resource
win10v2004-20241007-en
General
-
Target
671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exe
-
Size
652KB
-
MD5
55a82aba874170238ca6e23627fe63c7
-
SHA1
5a6f13fb2a236e85ec8b4d5d14e25e021801e05f
-
SHA256
671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0
-
SHA512
ecd38ef23ecc1422f334d234fd64901c015715c39aa1bbe3f8c2863ba378779cebbb8e2970acd8e9163f352ac204e7da756e523c212723595d9ca033b07c5ab8
-
SSDEEP
12288:FMr8y90q5uTf1Q2fNfeOnJr4Q3aFprNsAKRn8ooyTsSdyiorUOPselVYyI+WOapg:5yqTfDfA8JcxB0LiPFNI/OKel
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr400704.exe healer behavioral1/memory/1596-15-0x0000000000A40000-0x0000000000A4A000-memory.dmp healer -
Healer family
-
Processes:
jr400704.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr400704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr400704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr400704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr400704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr400704.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr400704.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4012-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/3912-2118-0x0000000000BA0000-0x0000000000BD0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr365144.exe family_redline behavioral1/memory/2004-2129-0x0000000000A80000-0x0000000000AAE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku826395.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ku826395.exe -
Executes dropped EXE 5 IoCs
Processes:
ziUd8729.exejr400704.exeku826395.exe1.exelr365144.exepid process 2144 ziUd8729.exe 1596 jr400704.exe 4012 ku826395.exe 3912 1.exe 2004 lr365144.exe -
Processes:
jr400704.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr400704.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exeziUd8729.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziUd8729.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1092 4012 WerFault.exe ku826395.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
lr365144.exe671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exeziUd8729.exeku826395.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr365144.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziUd8729.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku826395.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr400704.exepid process 1596 jr400704.exe 1596 jr400704.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr400704.exeku826395.exedescription pid process Token: SeDebugPrivilege 1596 jr400704.exe Token: SeDebugPrivilege 4012 ku826395.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exeziUd8729.exeku826395.exedescription pid process target process PID 464 wrote to memory of 2144 464 671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exe ziUd8729.exe PID 464 wrote to memory of 2144 464 671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exe ziUd8729.exe PID 464 wrote to memory of 2144 464 671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exe ziUd8729.exe PID 2144 wrote to memory of 1596 2144 ziUd8729.exe jr400704.exe PID 2144 wrote to memory of 1596 2144 ziUd8729.exe jr400704.exe PID 2144 wrote to memory of 4012 2144 ziUd8729.exe ku826395.exe PID 2144 wrote to memory of 4012 2144 ziUd8729.exe ku826395.exe PID 2144 wrote to memory of 4012 2144 ziUd8729.exe ku826395.exe PID 4012 wrote to memory of 3912 4012 ku826395.exe 1.exe PID 4012 wrote to memory of 3912 4012 ku826395.exe 1.exe PID 4012 wrote to memory of 3912 4012 ku826395.exe 1.exe PID 464 wrote to memory of 2004 464 671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exe lr365144.exe PID 464 wrote to memory of 2004 464 671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exe lr365144.exe PID 464 wrote to memory of 2004 464 671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exe lr365144.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exe"C:\Users\Admin\AppData\Local\Temp\671b387a844f235a275724cbbc4b1c5dabdc449c239a137e84d1d08d9e9087b0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUd8729.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUd8729.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr400704.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr400704.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku826395.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku826395.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3912 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 13804⤵
- Program crash
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr365144.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr365144.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2004
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4012 -ip 40121⤵PID:5104
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD55e002bee7256b3daab0e8f61b19f7216
SHA1ef3a0004161aab90d9d86bb32cbc40d5f6a8fc9e
SHA2562ee0a77e9d10c5eb0f06630dea6b3cdc0214a450c48e31fc7c680aeb576be20e
SHA51224c065589ca36f94723d998fa94a0571f52bd2a0519cc970926d6ed7213a7d9108ac70ef8624127da2ce109ed6c6388fdfbbe8aa633bff0dfe433ae2dd87af83
-
Filesize
498KB
MD5278ceb69cc33377cd95eacb8f1b29600
SHA1ba7f625ecbc70a0d55c89ca133a37de50c546e06
SHA25611723c2478344644988b84cbd554a5d2d602d9aaf52873a2f96b2f6d143b2b81
SHA512c435960a36dd9c575f6684b19e1885547c6b8f29a5af27f16fe388e4d04838084008f5174d9c3c3810fade8f047e06c233bd3e34765dfae3847106d8b6527cd7
-
Filesize
12KB
MD5946715281c55da8bae779e575fa7f34f
SHA19c477461107ffa8ee62c01ad417940f09e177999
SHA2560c9eac02a51d41d0fe1c608c78a7d0dfa2c86afa1e145eb3066eee1b26910099
SHA512164cc0755923abfc1e3450ece2508de8fb2bdacc311fb207846fc62d89759904de1c185f49d200953a8b427b5302f22bda829956e98afb86bc025a8d772b4d1f
-
Filesize
417KB
MD5588fa09ef33bf1a7d8bf57ffb20dc746
SHA1dcf37399e6409f494ff6f2193db72375f8debfe3
SHA256074cf633678ed57fc0b17b801add15bf83229462191171ba2910778608e5b455
SHA5125b1326431b38d0b59a6b20cc7fde84542ab26f3377e47618110402929a03d794223980c401e4906e336cc098e10fe89e728f775f945704eed84d6d393ba607e8
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0