Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 12:42
Static task
static1
Behavioral task
behavioral1
Sample
75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exe
Resource
win10v2004-20241007-en
General
-
Target
75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exe
-
Size
651KB
-
MD5
452d02e6454b5bdc6c599f1751fec4e8
-
SHA1
4e6e59719d65a1cf4079c60e40e7a54b2e5f1f9c
-
SHA256
75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff
-
SHA512
16e3a5953926ae5da406dbd948c2c5f36bd38fdbff0582158635356326b77af7b77d94d849ab37a06bf5753cad0b659cdac6b95d0ead1c49d6da072ed62e9d21
-
SSDEEP
12288:kMrvy90y1PgeFm5aszFBPu96KnQzzf3wUULJIkuOrL7rxhnt:jyv1cPu96KnQHf3w1nuuxht
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr582397.exe healer behavioral1/memory/3260-15-0x0000000000580000-0x000000000058A000-memory.dmp healer -
Healer family
-
Processes:
jr582397.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr582397.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr582397.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr582397.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr582397.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr582397.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr582397.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/4420-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5328-2118-0x0000000000DC0000-0x0000000000DF0000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr001019.exe family_redline behavioral1/memory/1844-2129-0x00000000001F0000-0x000000000021E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku951581.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ku951581.exe -
Executes dropped EXE 5 IoCs
Processes:
ziYq4863.exejr582397.exeku951581.exe1.exelr001019.exepid process 4708 ziYq4863.exe 3260 jr582397.exe 4420 ku951581.exe 5328 1.exe 1844 lr001019.exe -
Processes:
jr582397.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr582397.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exeziYq4863.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYq4863.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 6752 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2960 4420 WerFault.exe ku951581.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exeziYq4863.exeku951581.exe1.exelr001019.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziYq4863.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku951581.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr001019.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr582397.exepid process 3260 jr582397.exe 3260 jr582397.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr582397.exeku951581.exedescription pid process Token: SeDebugPrivilege 3260 jr582397.exe Token: SeDebugPrivilege 4420 ku951581.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exeziYq4863.exeku951581.exedescription pid process target process PID 2128 wrote to memory of 4708 2128 75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exe ziYq4863.exe PID 2128 wrote to memory of 4708 2128 75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exe ziYq4863.exe PID 2128 wrote to memory of 4708 2128 75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exe ziYq4863.exe PID 4708 wrote to memory of 3260 4708 ziYq4863.exe jr582397.exe PID 4708 wrote to memory of 3260 4708 ziYq4863.exe jr582397.exe PID 4708 wrote to memory of 4420 4708 ziYq4863.exe ku951581.exe PID 4708 wrote to memory of 4420 4708 ziYq4863.exe ku951581.exe PID 4708 wrote to memory of 4420 4708 ziYq4863.exe ku951581.exe PID 4420 wrote to memory of 5328 4420 ku951581.exe 1.exe PID 4420 wrote to memory of 5328 4420 ku951581.exe 1.exe PID 4420 wrote to memory of 5328 4420 ku951581.exe 1.exe PID 2128 wrote to memory of 1844 2128 75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exe lr001019.exe PID 2128 wrote to memory of 1844 2128 75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exe lr001019.exe PID 2128 wrote to memory of 1844 2128 75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exe lr001019.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exe"C:\Users\Admin\AppData\Local\Temp\75486ada493cac19cc8bf1bfbb7b5903e684685a77f556e156871bc8c2dc5eff.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYq4863.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYq4863.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr582397.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr582397.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku951581.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku951581.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 15124⤵
- Program crash
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr001019.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr001019.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4420 -ip 44201⤵PID:3484
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:6752
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD571c60bc20f180dedbcdfc30f984af278
SHA15f7b044b762bbcc1b8f76f823e179081fa9331a8
SHA256beacc0b90f863c44b9ca97120b096c654b2fadc3046f397d765dd07aa3c6b701
SHA51253ca1650ae03d158c997029c7dec6f842b667bbd40c536f73100793b7dbd7f3a5500d548ced489a7679d8f0fcf7643506536f45a2fccc0e685cbff27ba500744
-
Filesize
496KB
MD5d2e088edcfc1856ac95f9fb17da5be22
SHA1ee120c118502122afe9424d874dc351f58409b26
SHA25678aa6d7f73546ee94a0ef37910d92a93cdacc6d9fd967f8b242a810c496643ae
SHA5127aa1e31eb9577cef528cc27f7f753f68e57f57abcd3ba6dfdd06c9c43553bedcf75ca0460715092c1624095d1b59f35648ef0eb340627a6670bf2bea4b814b32
-
Filesize
12KB
MD5c716ed259cfaa72701354cab5c45b44b
SHA1249c18298d9c45971a69ab78988b6accb49a55a9
SHA256dad1271b2521e0cd12037fb2aacc66cd6c0409ad7946cd45cc7d3f398f6c55d9
SHA51273f0592edf2c37a53a79eecf6a011473a7e9ba5fb327fda318a2d7fa73aa0895f04dddde8c15c497fdecd02d1a8a76cc80769a839c3d6ed9a4ecef148761909a
-
Filesize
414KB
MD5b1ad83c21af9a79529182ba43f422445
SHA102d2d38e15ecbf0a87be56be8e99c8b473600470
SHA2568471c71fedce80172bc125743d905b5d2071550c99a2a91c2c9ea2435c7e2ca1
SHA5121f5d63145c3e1cf6f5ceb788892aeec618b5c124684010ddd4edd539681bdf725326290992e03702e2505bd57b891e2d89ea18b05dc501f4f21e67d369a3d44d
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0