Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 06:12
Static task
static1
Behavioral task
behavioral1
Sample
80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe
Resource
win10v2004-20241007-en
General
-
Target
80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe
-
Size
684KB
-
MD5
d065c06a9fa94b444bcd92d2fdb7e47a
-
SHA1
5d7ca4a5c262363054563d81f85564609a972770
-
SHA256
80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050
-
SHA512
a5432eb8a00c5817ca4dea5211fffc0bf240a41ca9a15a8d3ab398006f9c790a161f0e6f8fbc6dc4c697711fbe50ceb4ab773629a8914d4b1a5c77deb925030f
-
SSDEEP
12288:lMrwy90Av8/tlQasqS+QuW5ikBg2ziNS5WtprSdYadytzdB8fdbRA:dytvQlu+Y5ikG2+eWOXytJBidbq
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr207338.exe healer behavioral1/memory/1996-15-0x0000000000DC0000-0x0000000000DCA000-memory.dmp healer -
Healer family
-
Processes:
jr207338.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr207338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr207338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr207338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr207338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr207338.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr207338.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4772-2104-0x0000000005780000-0x00000000057B2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5316-2117-0x0000000000930000-0x0000000000960000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062337.exe family_redline behavioral1/memory/5536-2128-0x0000000000D30000-0x0000000000D5E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku498136.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku498136.exe -
Executes dropped EXE 5 IoCs
Processes:
zihQ4123.exejr207338.exeku498136.exe1.exelr062337.exepid process 3304 zihQ4123.exe 1996 jr207338.exe 4772 ku498136.exe 5316 1.exe 5536 lr062337.exe -
Processes:
jr207338.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr207338.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exezihQ4123.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zihQ4123.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5460 4772 WerFault.exe ku498136.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exezihQ4123.exeku498136.exe1.exelr062337.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zihQ4123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku498136.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr062337.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr207338.exepid process 1996 jr207338.exe 1996 jr207338.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr207338.exeku498136.exedescription pid process Token: SeDebugPrivilege 1996 jr207338.exe Token: SeDebugPrivilege 4772 ku498136.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exezihQ4123.exeku498136.exedescription pid process target process PID 1484 wrote to memory of 3304 1484 80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe zihQ4123.exe PID 1484 wrote to memory of 3304 1484 80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe zihQ4123.exe PID 1484 wrote to memory of 3304 1484 80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe zihQ4123.exe PID 3304 wrote to memory of 1996 3304 zihQ4123.exe jr207338.exe PID 3304 wrote to memory of 1996 3304 zihQ4123.exe jr207338.exe PID 3304 wrote to memory of 4772 3304 zihQ4123.exe ku498136.exe PID 3304 wrote to memory of 4772 3304 zihQ4123.exe ku498136.exe PID 3304 wrote to memory of 4772 3304 zihQ4123.exe ku498136.exe PID 4772 wrote to memory of 5316 4772 ku498136.exe 1.exe PID 4772 wrote to memory of 5316 4772 ku498136.exe 1.exe PID 4772 wrote to memory of 5316 4772 ku498136.exe 1.exe PID 1484 wrote to memory of 5536 1484 80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe lr062337.exe PID 1484 wrote to memory of 5536 1484 80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe lr062337.exe PID 1484 wrote to memory of 5536 1484 80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe lr062337.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe"C:\Users\Admin\AppData\Local\Temp\80ae5bdd217d3e1c7ba04120b7d45a53a0b7d392b78a864eaff96d093792f050.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihQ4123.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihQ4123.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr207338.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr207338.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku498136.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku498136.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 13804⤵
- Program crash
PID:5460 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062337.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr062337.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4772 -ip 47721⤵PID:5416
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD579403bba257a7d87498be2afb74382d9
SHA11fa4467f135f0fe6d46a9b0684e802d557d96817
SHA2568fd8bf21ca335ea884781216794db57e33ec537fb7954db738c9042d1fd7538a
SHA512f02a0feecc5186f3a40511ee2d39fca6725015585ebe31e4fd2ea432a76111962f5feb610e78ed93e16f74a87962662ac7cdaec16c45419a74747cefbd76100e
-
Filesize
530KB
MD5651b2a2a2052e90e9045c2542fa4a36b
SHA16ad403b94173ee085dc3be57f4db2187162d82af
SHA25650ba72cb945753c47a98b8b415906590181357aa74f25a812980eb08691679c3
SHA5128cdbc2fb01529b97b587c2942f09bd919c5552561bb7fbc12e7fc72f9b071cc076c323c5dfda1a45d17efda8f52774b7e53812f9712d88a3b6aca08716470029
-
Filesize
12KB
MD560d91f3eac0c7a3d42e4783bdeb025ed
SHA17ce972b5852094603535d485b2c1c21a61700e7b
SHA256b0bcee6d4c099d77b69d0729d6992d7fd1b6c849e5dba53c8aaffda8d937401f
SHA5125394fde664092500635193d92740d8df445b2d76eedba1c0ca5d322596cc8ffe1249ecf9e7e229a317d13eff74f9e821136d84300ab8d57c88d7db2c26bd87bf
-
Filesize
495KB
MD55e5599fb9900de1157c3613d85484671
SHA14f8264d62f92d6d760e2ba4e07d6e2268a9f13bc
SHA2560dbfe5f0a3b2e26b91a1e502db9eabaf8a4f8dc29a6186aa528b34f33f7eff66
SHA512972e0af949c7652a8f7991b0b8f8996db3aa0175f31d8b9d963468ffc506b57316abab1276b660934ea58380bb1bcd43e176872bec98dc2ed75ce05d91f4c621
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0