Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 08:31
Static task
static1
Behavioral task
behavioral1
Sample
c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6.exe
Resource
win10v2004-20241007-en
General
-
Target
c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6.exe
-
Size
661KB
-
MD5
b7bbf63ea9f9ce62c6c46d6910dce749
-
SHA1
10e0eb666b67e54d169ea276031401a77d73c382
-
SHA256
c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6
-
SHA512
6b22a21ad2feae14976fc6a4b8f403965ebe8a3f45a8a0d13d92f01b555780a437a0e378e2d2da15fa5b257ea13026d4fa0af9d7e1499c2b6ad4f4e259de46ff
-
SSDEEP
12288:SMrsy90WFh+HX6yMCsXibI8j6c61f6JHlSxhlu4I4piPJBaOF/SHpg:KytFgCObI8ju1SJHlSlu4I7BRhYpg
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023c9f-12.dat healer behavioral1/memory/640-15-0x00000000001C0000-0x00000000001CA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr517871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr517871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr517871.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr517871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr517871.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr517871.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2360-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x0007000000023ca5-2110.dat family_redline behavioral1/memory/960-2118-0x0000000000660000-0x0000000000690000-memory.dmp family_redline behavioral1/files/0x0007000000023c9d-2127.dat family_redline behavioral1/memory/5352-2129-0x00000000002B0000-0x00000000002DE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ku741136.exe -
Executes dropped EXE 5 IoCs
pid Process 412 ziHl2002.exe 640 jr517871.exe 2360 ku741136.exe 960 1.exe 5352 lr321829.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr517871.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziHl2002.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5228 2360 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr321829.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziHl2002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku741136.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 640 jr517871.exe 640 jr517871.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 640 jr517871.exe Token: SeDebugPrivilege 2360 ku741136.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4604 wrote to memory of 412 4604 c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6.exe 83 PID 4604 wrote to memory of 412 4604 c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6.exe 83 PID 4604 wrote to memory of 412 4604 c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6.exe 83 PID 412 wrote to memory of 640 412 ziHl2002.exe 84 PID 412 wrote to memory of 640 412 ziHl2002.exe 84 PID 412 wrote to memory of 2360 412 ziHl2002.exe 98 PID 412 wrote to memory of 2360 412 ziHl2002.exe 98 PID 412 wrote to memory of 2360 412 ziHl2002.exe 98 PID 2360 wrote to memory of 960 2360 ku741136.exe 103 PID 2360 wrote to memory of 960 2360 ku741136.exe 103 PID 2360 wrote to memory of 960 2360 ku741136.exe 103 PID 4604 wrote to memory of 5352 4604 c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6.exe 108 PID 4604 wrote to memory of 5352 4604 c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6.exe 108 PID 4604 wrote to memory of 5352 4604 c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6.exe"C:\Users\Admin\AppData\Local\Temp\c402db00ac998d458e8f9fdb41f68e8b408f08e6cfec774fef47472f208c6ab6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHl2002.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHl2002.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr517871.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr517871.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku741136.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku741136.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:960
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 14644⤵
- Program crash
PID:5228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr321829.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr321829.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2360 -ip 23601⤵PID:2264
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD54bee12b23da12c06eb82a30af209ce9d
SHA1502c5bad927d05be643974b8aef7460759f61214
SHA2563ab7f8fd90f7f0a3488d185628753a34e7a18291d700d4379d48bf1eea176bba
SHA5123d44894c6c6a971030821453bbb511c70b9f185ee5f62c4388f2f81614fa46c5f954934f6cf009623dd8e129e9316ed6a8ddec9fc926f9791e2e49460bf80818
-
Filesize
507KB
MD53bbf81b26f390464871e27baff640f17
SHA1f0c170bf271ad190076657a33dfbee4dcc01553e
SHA256ae8efc7df41020098a824b3b3091110df0538634670925ea9d82fde14bbcf244
SHA5124948ab86f742624e6b591111ca40697e6a3f04fd66a043591de6f6bc5375c30eba7d3c79590bcf6e6714fcd33a18d3230a5185f4e2936beb75873082ee00fc64
-
Filesize
15KB
MD578d270d5ef40646b754c122fd5b22496
SHA11f7d1ec825d1daa2e31385d522cb09f4ebbccb21
SHA25657c4a7ad711e865756ce9ed72ffcb59c7dd7d7dd9d8f01636ed222f29d874eaf
SHA512b42def7e9c7e0f1c0c52f6efd7627189b96a74b91c772df09e5a761454ed5c87410bc122ffd3a13ecb023f1b07c0815406f3b4ede03919783ee9e0931e8b1b1f
-
Filesize
426KB
MD567f3cd0d976d8e1420d20c73ef979d1c
SHA17f13a8bba10e6734422a611e82e3ca92542ae594
SHA2568319af1f68d74be85d51376249716791de81ec313a6da3d10bff90e4edf33acf
SHA512bbc86e84655c8bb63dc5f43a18ce664ccaae4e74bf16da19e3813a74d3de0a6bd76d378025f8a0a5035ae661a2a05cb7e40057dc40465ad6ad683c33aa9e0c6e
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0