Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 10:23
Static task
static1
Behavioral task
behavioral1
Sample
653b0e62cb1bd858e81ca374f600a1700479be1868d561fbdaaa7c916c88c346.exe
Resource
win10v2004-20241007-en
General
-
Target
653b0e62cb1bd858e81ca374f600a1700479be1868d561fbdaaa7c916c88c346.exe
-
Size
661KB
-
MD5
5eb4ef9b2aaa2b405df1a6d806f65664
-
SHA1
e74f9a3f3b89d4c9e8b64d26fbabbc61fb5837cc
-
SHA256
653b0e62cb1bd858e81ca374f600a1700479be1868d561fbdaaa7c916c88c346
-
SHA512
6d7539ea2e2af8e4d352f43dbdcfbc1b98e8a9779a827ec8d8ff9a80f517ea2d2c7a4148eedc03cc3c63c3d9da5f0aaf81e6a312ddc6cb36ffb2747ccee6ecd6
-
SSDEEP
12288:EMrky90ASzqdfnw9xVQCgjl5qQpN4IbpiVJ4urGymyXQFhJxSt:oyCqdfCQJjl5TN4I64zjy0/St
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c7d-12.dat healer behavioral1/memory/4552-15-0x00000000004B0000-0x00000000004BA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr690639.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr690639.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr690639.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr690639.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr690639.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr690639.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/536-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x0008000000023c78-2110.dat family_redline behavioral1/memory/4376-2118-0x00000000004E0000-0x0000000000510000-memory.dmp family_redline behavioral1/files/0x0007000000023c7b-2128.dat family_redline behavioral1/memory/1452-2129-0x0000000000240000-0x000000000026E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ku494053.exe -
Executes dropped EXE 5 IoCs
pid Process 2588 ziMf2477.exe 4552 jr690639.exe 536 ku494053.exe 4376 1.exe 1452 lr284088.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr690639.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 653b0e62cb1bd858e81ca374f600a1700479be1868d561fbdaaa7c916c88c346.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziMf2477.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5888 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3608 536 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 653b0e62cb1bd858e81ca374f600a1700479be1868d561fbdaaa7c916c88c346.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziMf2477.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku494053.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr284088.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4552 jr690639.exe 4552 jr690639.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4552 jr690639.exe Token: SeDebugPrivilege 536 ku494053.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4412 wrote to memory of 2588 4412 653b0e62cb1bd858e81ca374f600a1700479be1868d561fbdaaa7c916c88c346.exe 83 PID 4412 wrote to memory of 2588 4412 653b0e62cb1bd858e81ca374f600a1700479be1868d561fbdaaa7c916c88c346.exe 83 PID 4412 wrote to memory of 2588 4412 653b0e62cb1bd858e81ca374f600a1700479be1868d561fbdaaa7c916c88c346.exe 83 PID 2588 wrote to memory of 4552 2588 ziMf2477.exe 84 PID 2588 wrote to memory of 4552 2588 ziMf2477.exe 84 PID 2588 wrote to memory of 536 2588 ziMf2477.exe 94 PID 2588 wrote to memory of 536 2588 ziMf2477.exe 94 PID 2588 wrote to memory of 536 2588 ziMf2477.exe 94 PID 536 wrote to memory of 4376 536 ku494053.exe 95 PID 536 wrote to memory of 4376 536 ku494053.exe 95 PID 536 wrote to memory of 4376 536 ku494053.exe 95 PID 4412 wrote to memory of 1452 4412 653b0e62cb1bd858e81ca374f600a1700479be1868d561fbdaaa7c916c88c346.exe 100 PID 4412 wrote to memory of 1452 4412 653b0e62cb1bd858e81ca374f600a1700479be1868d561fbdaaa7c916c88c346.exe 100 PID 4412 wrote to memory of 1452 4412 653b0e62cb1bd858e81ca374f600a1700479be1868d561fbdaaa7c916c88c346.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\653b0e62cb1bd858e81ca374f600a1700479be1868d561fbdaaa7c916c88c346.exe"C:\Users\Admin\AppData\Local\Temp\653b0e62cb1bd858e81ca374f600a1700479be1868d561fbdaaa7c916c88c346.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMf2477.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMf2477.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr690639.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr690639.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku494053.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku494053.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 15044⤵
- Program crash
PID:3608
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr284088.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr284088.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 536 -ip 5361⤵PID:764
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5888
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5e566affd885382312b015200d1be1dc3
SHA1325f43c5d601ecf413712aefe76f6e80bd4c0e60
SHA2561ab03d7590c53c7639809baa490fee2cb377cb6f6d8d52a744d4ab1778ee15ca
SHA512227ac40021ddaa52e3a1506f40446203a2bf873e9656b6cd3035892ca3375bda8735c20bffca27b7460cc8bc82e56ea2066317196abc6d477e8e000a79687713
-
Filesize
507KB
MD5f17f5b68385acb1a532391b3e485de5b
SHA13b0ed92b67a03012fa89c6d75315cd415fb21419
SHA2563d38f80deab6aeeef067832957ae3c72c3eca42bc461d70c0cf83eb64831f06d
SHA5121614256d231841bd0050d2e2146220078033c6b8a18d943816c0ec392305a6670f6c8c9d5b08b59ca60461bf75156a664f13a805a918c35a800b7f944e5153e6
-
Filesize
15KB
MD512c073237645f48c52b4e8bc19107e9e
SHA15739baaa14f28275df79082aebfc46c864bc3d99
SHA256f243280a14b0ce6c458f50325047644c8562898c74f8d6d372c9087abc78d69a
SHA51205b62b98b69f1a0bf9a48e8f867ef0f97b48e84ec1cafc512501ab00d6317223a0bb8a35f0a9f1fbe300545aeb127a9037e03d0454f2fb05a9cbe7eb8aa1bc9a
-
Filesize
426KB
MD57fa6437b900a9c4eb7965bcaa2a1bd79
SHA1c57efb9b7fafe510baa88af6143a56a8bc4cd57c
SHA256372d80afaacb1d777cc32874a4363823bbe09328e5478c03decc44f88cad6566
SHA512d6375bb2b4a0a07558bc5f5f51c2cb7846b0310fc1c2f4be716f6ca41e4d8f1814bb6b0cb3369f278a0608eb01dd6a6f53a16df66ca8af3b7fd75dccc85884f5
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0