Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 10:06
Static task
static1
Behavioral task
behavioral1
Sample
3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exe
Resource
win10v2004-20241007-en
General
-
Target
3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exe
-
Size
655KB
-
MD5
a4c94312c6d4941b1c10bb988cb43161
-
SHA1
47d38f23abe213a5236f0fdf06a0c9a113896f13
-
SHA256
3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf
-
SHA512
35cdbbd161e52a2f6af11386c25136bd820b72352dba37726bf2e2e85816a6d0292fcec254ab7a7cfe927bbaeb8f1937ff2fc418f0e9f7cfa0f86959cf6da826
-
SSDEEP
12288:ZMrCy90jqIXEaq336IVinYuSnh8St44eftZoBqBt1Y/NGtKCxQI7bl6yJO5N:TyKXEaq3l2ynhr/eftZFBQGtMUoaO5N
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr755558.exe healer behavioral1/memory/2532-15-0x0000000000070000-0x000000000007A000-memory.dmp healer -
Healer family
-
Processes:
jr755558.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr755558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr755558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr755558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr755558.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr755558.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr755558.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2368-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/6032-2118-0x0000000000700000-0x0000000000730000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr469487.exe family_redline behavioral1/memory/1944-2129-0x00000000005E0000-0x000000000060E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku111530.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ku111530.exe -
Executes dropped EXE 5 IoCs
Processes:
zigd6222.exejr755558.exeku111530.exe1.exelr469487.exepid process 864 zigd6222.exe 2532 jr755558.exe 2368 ku111530.exe 6032 1.exe 1944 lr469487.exe -
Processes:
jr755558.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr755558.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exezigd6222.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zigd6222.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2672 2368 WerFault.exe ku111530.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exezigd6222.exeku111530.exe1.exelr469487.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zigd6222.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku111530.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr469487.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr755558.exepid process 2532 jr755558.exe 2532 jr755558.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr755558.exeku111530.exedescription pid process Token: SeDebugPrivilege 2532 jr755558.exe Token: SeDebugPrivilege 2368 ku111530.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exezigd6222.exeku111530.exedescription pid process target process PID 5028 wrote to memory of 864 5028 3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exe zigd6222.exe PID 5028 wrote to memory of 864 5028 3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exe zigd6222.exe PID 5028 wrote to memory of 864 5028 3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exe zigd6222.exe PID 864 wrote to memory of 2532 864 zigd6222.exe jr755558.exe PID 864 wrote to memory of 2532 864 zigd6222.exe jr755558.exe PID 864 wrote to memory of 2368 864 zigd6222.exe ku111530.exe PID 864 wrote to memory of 2368 864 zigd6222.exe ku111530.exe PID 864 wrote to memory of 2368 864 zigd6222.exe ku111530.exe PID 2368 wrote to memory of 6032 2368 ku111530.exe 1.exe PID 2368 wrote to memory of 6032 2368 ku111530.exe 1.exe PID 2368 wrote to memory of 6032 2368 ku111530.exe 1.exe PID 5028 wrote to memory of 1944 5028 3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exe lr469487.exe PID 5028 wrote to memory of 1944 5028 3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exe lr469487.exe PID 5028 wrote to memory of 1944 5028 3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exe lr469487.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exe"C:\Users\Admin\AppData\Local\Temp\3682419f73647dcbca78ee082753f33ae553fd74b740d40c529e593e3a4238cf.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigd6222.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigd6222.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr755558.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr755558.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku111530.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku111530.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 13804⤵
- Program crash
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr469487.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr469487.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2368 -ip 23681⤵PID:1856
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD54a2195d994ec43c9fdf5c22b69309a5a
SHA1bed523365a5c801fd14158ef165d90f9fe3dc0bf
SHA2562b43c918f4b0714636e2f391b45066f7b1c71257b34ffe03f9a544010084e1e1
SHA512f09007bfc4c9b3d76e7fc6ede681cf5a75f715c7ffc1b11202abd4946dc18aa09a7d39986e3a68dacf6057f81d7d757a9c69882fbd86bdacf6636b77aa5c5568
-
Filesize
501KB
MD53401e01394915bdd8e890c90baec68ad
SHA1a4b75d9d0a0bc71735aadaecb6d3b4a78460fc47
SHA256eb376e2af16aeb03216a9a3fbd3139bc79241d1ebdd1e00c4beed748887f1932
SHA51205a7a560c0ac09671c8502c6ee18b04a4fae6cd601d0bd59089347e679cb744dcd73b52244bcdf1620a169a6de594cf531bfd8aa16e9a4fb0abdc83aea9ae4af
-
Filesize
11KB
MD5d176273ad159e6563aea484f4ac3bc92
SHA156c7fc138b4c9fa0f13205e0fbf85a2d5e7dec6f
SHA256b8b32fb691f3be35be435bce8c5f97572869d083e9f453c1a606c4512d2c9cd6
SHA5124b270071f4fe2f5bc28037adc693d5e1d5bb6d7c210505dc50492b8bb2dfd8149185d22d31c49b62f438ed43c7a561c9d2074ba6b1152fc9f5e3723eb060db25
-
Filesize
424KB
MD5e22b90bc416b24321ca7476757e68812
SHA1c22de864000d4d8f439d3a3fbd55cb3f199da2af
SHA2566b10bc7d5938f86c63175a6b5d317ed39409a71c11c6c88328d643cf31d00ff5
SHA5123498df93405149517f92f791ef272d67a8d4858131eed7e586ffdaaeef05ccf544a5564a2ca2cf0cd951dadc52d4ccb7d6c09e614d3624423bfb1d0c0a4978f7
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0