Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 09:08
Static task
static1
Behavioral task
behavioral1
Sample
76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exe
Resource
win10v2004-20241007-en
General
-
Target
76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exe
-
Size
684KB
-
MD5
11f965ba6224efc0bad2f04c6afc3de9
-
SHA1
a48f81d85e3c331ad2b6659a6e2247a32b4b215c
-
SHA256
76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e
-
SHA512
3ca56d8879086f82eb46bbe320ee93cfeb62c80d04f1f30e8699a289ac5ef18d0eb8836b744584e928411a41ecad68376656b133053dc2754718d0753dad882a
-
SSDEEP
12288:IMrmy903+UKfJdlO1wLrCkmFLh73mMiClXSLO7rgow86rQc:OymYzQ2ULxmtmrnhZc
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr636968.exe healer behavioral1/memory/2008-15-0x00000000000B0000-0x00000000000BA000-memory.dmp healer -
Healer family
-
Processes:
jr636968.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr636968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr636968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr636968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr636968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr636968.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr636968.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1572-2104-0x0000000005770000-0x00000000057A2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5184-2117-0x0000000000440000-0x0000000000470000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr551855.exe family_redline behavioral1/memory/1252-2128-0x0000000000180000-0x00000000001AE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku277722.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ku277722.exe -
Executes dropped EXE 5 IoCs
Processes:
zife7204.exejr636968.exeku277722.exe1.exelr551855.exepid process 5064 zife7204.exe 2008 jr636968.exe 1572 ku277722.exe 5184 1.exe 1252 lr551855.exe -
Processes:
jr636968.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr636968.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exezife7204.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zife7204.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1952 1572 WerFault.exe ku277722.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exezife7204.exeku277722.exe1.exelr551855.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zife7204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku277722.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr551855.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr636968.exepid process 2008 jr636968.exe 2008 jr636968.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr636968.exeku277722.exedescription pid process Token: SeDebugPrivilege 2008 jr636968.exe Token: SeDebugPrivilege 1572 ku277722.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exezife7204.exeku277722.exedescription pid process target process PID 680 wrote to memory of 5064 680 76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exe zife7204.exe PID 680 wrote to memory of 5064 680 76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exe zife7204.exe PID 680 wrote to memory of 5064 680 76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exe zife7204.exe PID 5064 wrote to memory of 2008 5064 zife7204.exe jr636968.exe PID 5064 wrote to memory of 2008 5064 zife7204.exe jr636968.exe PID 5064 wrote to memory of 1572 5064 zife7204.exe ku277722.exe PID 5064 wrote to memory of 1572 5064 zife7204.exe ku277722.exe PID 5064 wrote to memory of 1572 5064 zife7204.exe ku277722.exe PID 1572 wrote to memory of 5184 1572 ku277722.exe 1.exe PID 1572 wrote to memory of 5184 1572 ku277722.exe 1.exe PID 1572 wrote to memory of 5184 1572 ku277722.exe 1.exe PID 680 wrote to memory of 1252 680 76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exe lr551855.exe PID 680 wrote to memory of 1252 680 76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exe lr551855.exe PID 680 wrote to memory of 1252 680 76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exe lr551855.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exe"C:\Users\Admin\AppData\Local\Temp\76b01f234ef68cc54d62710a1c169f1bd27d2f4defc70f108ea17c653b83604e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zife7204.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zife7204.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr636968.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr636968.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku277722.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku277722.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5184 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1572 -s 15124⤵
- Program crash
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr551855.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr551855.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1572 -ip 15721⤵PID:3784
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD53520e9e3c7c3ea1ad11f02917ec79a87
SHA15e6d77816ae5dce3c2ae352e5dfd6e40877698c6
SHA256a766056dbf3eba066484378280fc0fecc660d09eaa51b784f54ff6c64cf983fa
SHA512eda4e3f7d5175610093c63bf38e9f48f2e464b012d939d36997a89ce5a4ffc1c2a4ff2698b3860077d24db1cf2449a8a2039faf95a3689133a6256da21a42c57
-
Filesize
529KB
MD593ef2a0cf6fcdef205cc27e9ba539024
SHA1fed2ecd9eaffd1ee153ad6f9e046a32eb54b4f0d
SHA256de2ab53e671c5e539e301d40ac5daf012a5c5022fe82d97951b04c12a2a02d56
SHA5128b4a9e0fd4f8646ea9be6c897e03901c68eab138fe5014167217a45817a562b4ce115f77ec854ff92d555e2894378a1ae0b6353c6d11643bc7079ceb5022b6f7
-
Filesize
12KB
MD50d6fceb0f056e8a79bdc4f7b84f4297c
SHA1aa8cedc7ea5e73766dd617f5c5dd5a975c8bea42
SHA25698be71b46c5414f6dd4e3295c221bb8cf29b8f27e41c634fbdb2fb52efd21103
SHA512829333fa42e524f82830d68beffa5afab387b9f3fd8eacb74939a6030f5781839d117d4adc633ff1b3c031a3b286e4beb01a8457a951e369fdd2a1f049f89b4e
-
Filesize
495KB
MD5b4c103448845f327ceb5911f389d253d
SHA17894ead0f2854588d078f9621332d9c7bb33cf03
SHA2569ffc425da5d3ebf6735baa1d1eb05be834c66a4981dced31735f443279bdedf3
SHA5126af057ccb2ec38a0c2a730e30c5dee910cf959fa7fc4d8ba756fc3550a006237268ca0d0bb8e87b2860caa03d97d712458afeab3fe025e7fbd24e98d62f9becd
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0