Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 08:16
Static task
static1
Behavioral task
behavioral1
Sample
4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe
Resource
win10v2004-20241007-en
General
-
Target
4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe
-
Size
651KB
-
MD5
b4f5315a18d1130ba8f937225117796d
-
SHA1
22282f3b258872a0d9ed8d00d3e2f328778f3536
-
SHA256
4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48
-
SHA512
760485721f242932c41f96334d1af0322011560c19b015d9eb99976339b1b1fa654a7a51e7ee7ffd35a58de989ca36661da2d9e799974a3c8485fd978c51936d
-
SSDEEP
12288:GMrny906UBiU/MtRu3fpgG/qKr89q61eTzT4F:pyI0etiGjAqGyf4F
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr343794.exe healer behavioral1/memory/1932-15-0x0000000000FA0000-0x0000000000FAA000-memory.dmp healer -
Healer family
-
Processes:
jr343794.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr343794.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr343794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr343794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr343794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr343794.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr343794.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4460-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/4672-2118-0x0000000000490000-0x00000000004C0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr828335.exe family_redline behavioral1/memory/3928-2129-0x0000000000A80000-0x0000000000AAE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku523953.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation ku523953.exe -
Executes dropped EXE 5 IoCs
Processes:
ziOb9679.exejr343794.exeku523953.exe1.exelr828335.exepid process 4208 ziOb9679.exe 1932 jr343794.exe 4460 ku523953.exe 4672 1.exe 3928 lr828335.exe -
Processes:
jr343794.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr343794.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exeziOb9679.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziOb9679.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 536 4460 WerFault.exe ku523953.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exeziOb9679.exeku523953.exe1.exelr828335.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziOb9679.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku523953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr828335.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr343794.exepid process 1932 jr343794.exe 1932 jr343794.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr343794.exeku523953.exedescription pid process Token: SeDebugPrivilege 1932 jr343794.exe Token: SeDebugPrivilege 4460 ku523953.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exeziOb9679.exeku523953.exedescription pid process target process PID 4868 wrote to memory of 4208 4868 4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe ziOb9679.exe PID 4868 wrote to memory of 4208 4868 4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe ziOb9679.exe PID 4868 wrote to memory of 4208 4868 4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe ziOb9679.exe PID 4208 wrote to memory of 1932 4208 ziOb9679.exe jr343794.exe PID 4208 wrote to memory of 1932 4208 ziOb9679.exe jr343794.exe PID 4208 wrote to memory of 4460 4208 ziOb9679.exe ku523953.exe PID 4208 wrote to memory of 4460 4208 ziOb9679.exe ku523953.exe PID 4208 wrote to memory of 4460 4208 ziOb9679.exe ku523953.exe PID 4460 wrote to memory of 4672 4460 ku523953.exe 1.exe PID 4460 wrote to memory of 4672 4460 ku523953.exe 1.exe PID 4460 wrote to memory of 4672 4460 ku523953.exe 1.exe PID 4868 wrote to memory of 3928 4868 4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe lr828335.exe PID 4868 wrote to memory of 3928 4868 4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe lr828335.exe PID 4868 wrote to memory of 3928 4868 4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe lr828335.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe"C:\Users\Admin\AppData\Local\Temp\4ceccc77ecf6970765bcf2b0d87cf1207b51df08b1fc25e03904531386214c48.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOb9679.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOb9679.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr343794.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr343794.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku523953.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku523953.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4672 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4460 -s 14604⤵
- Program crash
PID:536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr828335.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr828335.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4460 -ip 44601⤵PID:4604
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5042ec369a7cacd1f76d53d69474094ee
SHA134868e8a424bd60c3279126c0ff47d0a68e9f88e
SHA256865013bf121dc92d74dee9119b3bdbbc01414ef4702886a62610b8205f0cfc5c
SHA512ecbe2805679de534812592d2f0614c2dd3c7fc20196aebb468a40adfda43f5fbf0743449ad62b59232d0092cfe6c4134e3072b039c7272b20d361754f9559282
-
Filesize
497KB
MD52a74752296fd8fc38cf426a344799d80
SHA1d18a9a5b09eda85bc8af4865b4dbba56fad38fcc
SHA25699f94d6ef2c61d0cf0f156072e24620d340c937ee34efe4da419fd3ea394111f
SHA512beb5177a82ad97e3d3ffbf7427c3331c3810372db9e83ab7303bc42533b88794c7cc815b9de0687b39f49c7da45ce2d7b6176ea1c7fbc5a4011f9692065c8486
-
Filesize
11KB
MD55d32b9be063ad2f8be909fd2f0afd612
SHA19dd527759e797077f87d545e75f268143f9ab10d
SHA256ef0dc9e17565777cc45d4cc38bfc6f2018fbec8ea41a611c6f92510e3b9336fe
SHA512af802148afdc5b6339c07458913f46c507d0f4eebbcbf91ebbebf794c24e87932add325849ed54719d69920cc3021d948672efc8372a106fa0240c8e00a87d4f
-
Filesize
415KB
MD530ad912e0e63b4041e6c0f096577907e
SHA1c4e010f9ec2076b28fda4e46082d94e724b7b1b9
SHA2560242c1766008435d2ef2a7e3d8399a0a74534a7d8624eb203a6ac0b2f51b8580
SHA51271f87faacbddbfb9531698e09792c926695931fcfa7de98c9bb8a34ba4f3281cb02a6b7a09ee6528ffb3fb9a82d4510196224645393d4fbc03b2e716378f6ea3
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0