Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exe
Resource
win10v2004-20241007-en
General
-
Target
c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exe
-
Size
660KB
-
MD5
36c3e3cc26ee90289442c647ee1f138a
-
SHA1
a5f317dcb7bb453fbbfa19eee2ef1aadcc38aa8c
-
SHA256
c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594
-
SHA512
91295fb1dcaac01cb4b56455a46e95b2d42c7affb2d2fd9994fd982f7c8718fb10f69f4688b17cb4cbd7c0d18028df5060ec80c0a369d8642abb335d9516980b
-
SSDEEP
12288:WMr3y90PsKlbYhTJMGf650SZCjBfEPyalYzui4kSzcKmZDCOLnrsCyzl:1y7hTJl650SZCjB0Wii4kEg5Izl
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr935929.exe healer behavioral1/memory/3312-15-0x0000000000250000-0x000000000025A000-memory.dmp healer -
Healer family
-
Processes:
jr935929.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr935929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr935929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr935929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr935929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr935929.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr935929.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1428-2105-0x0000000005410000-0x0000000005442000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/960-2118-0x0000000000F60000-0x0000000000F90000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr460393.exe family_redline behavioral1/memory/3360-2129-0x0000000000990000-0x00000000009BE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku104068.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation ku104068.exe -
Executes dropped EXE 5 IoCs
Processes:
ziWf8777.exejr935929.exeku104068.exe1.exelr460393.exepid process 2412 ziWf8777.exe 3312 jr935929.exe 1428 ku104068.exe 960 1.exe 3360 lr460393.exe -
Processes:
jr935929.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr935929.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziWf8777.exec2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWf8777.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2800 1428 WerFault.exe ku104068.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
lr460393.exec2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exeziWf8777.exeku104068.exe1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr460393.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziWf8777.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku104068.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr935929.exepid process 3312 jr935929.exe 3312 jr935929.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr935929.exeku104068.exedescription pid process Token: SeDebugPrivilege 3312 jr935929.exe Token: SeDebugPrivilege 1428 ku104068.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exeziWf8777.exeku104068.exedescription pid process target process PID 5032 wrote to memory of 2412 5032 c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exe ziWf8777.exe PID 5032 wrote to memory of 2412 5032 c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exe ziWf8777.exe PID 5032 wrote to memory of 2412 5032 c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exe ziWf8777.exe PID 2412 wrote to memory of 3312 2412 ziWf8777.exe jr935929.exe PID 2412 wrote to memory of 3312 2412 ziWf8777.exe jr935929.exe PID 2412 wrote to memory of 1428 2412 ziWf8777.exe ku104068.exe PID 2412 wrote to memory of 1428 2412 ziWf8777.exe ku104068.exe PID 2412 wrote to memory of 1428 2412 ziWf8777.exe ku104068.exe PID 1428 wrote to memory of 960 1428 ku104068.exe 1.exe PID 1428 wrote to memory of 960 1428 ku104068.exe 1.exe PID 1428 wrote to memory of 960 1428 ku104068.exe 1.exe PID 5032 wrote to memory of 3360 5032 c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exe lr460393.exe PID 5032 wrote to memory of 3360 5032 c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exe lr460393.exe PID 5032 wrote to memory of 3360 5032 c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exe lr460393.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exe"C:\Users\Admin\AppData\Local\Temp\c2ba08540944f8be263cb5bbeffe198a241d9d247915caa2adc7e97857f0f594.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWf8777.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWf8777.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr935929.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr935929.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku104068.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku104068.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 15204⤵
- Program crash
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr460393.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr460393.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3360
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1428 -ip 14281⤵PID:1592
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5235c7d22f19a5a112d39821bfc5d6fbb
SHA19a0240aa04bf4d4a62c98446bf768bc8219ea4b8
SHA25679c2fde6c63bdbcbd4489a1eda7c397486cd8dd47e651aa63d7481fc740ce7ae
SHA512ba158af68c850fd6bb25367a49075c732af05a5e48f0a662020cfd9a8f38a3acc82c0d59395f898125c8348af2f1d723e82cbc03c01505cb9d418ed604266db2
-
Filesize
507KB
MD564d40d2688360b75f7a1e7797f5c0a6e
SHA1fef79d86718949217ff8db5ff6b88c1dec5c4392
SHA256013ed7241e387738bdc1f2a412a411925e9882fe0578378236287a3230fc1ac8
SHA51288bc79b795a5061040af5383032e9e22022eeb3d77541f49600ee30f46af486527a42efc43fae16e9ad81df85245b89c49d4d2d3f2f1c0a56535328a01a3f371
-
Filesize
11KB
MD562333705c6e94740ed1ea6373b5d044d
SHA105e1892ad2bf472902b3a5491781c19fdbbd8177
SHA256d41e4af4a3e4f45c734298ebe777ead8dcadfd1fb18717b3251117bbd5dafd47
SHA512e21d711a22edf987c6ffe04fba89aa3a1d6d18aec4a8e12db8724627ba9e6ca3cfb5ffed3f552523039785fecab8ac3235d5f1acc97f0b64b7cbbd0c946b747e
-
Filesize
435KB
MD53cdd8fccd5f2c0c129f2fc286b2718ba
SHA10591710acce06c21355dd9f57387f524d9ea5e03
SHA256d0c80ab694d23b39e16b3617c91249f042abe5c2fb5b8f4b657ab0ddde1803b5
SHA512c9635130cbaab2267856786f9c71f06db2383895290d7a50b04ac3bed07213a517388661decc7af2064313d5372ff742efba14fb7431192fe06f8c19df4803ba
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0