Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 13:28
Static task
static1
Behavioral task
behavioral1
Sample
c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exe
Resource
win10v2004-20241007-en
General
-
Target
c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exe
-
Size
651KB
-
MD5
585fd23fea8b83c40dce7571ecfd0f8f
-
SHA1
8bf0710bb708ac58ef2ca5ee0b4d2ccaf91f723b
-
SHA256
c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa
-
SHA512
33097c242c18795d8f1a75145a2809e05a89da12fea3ab0599302f07984f490a534abe9fa64d5d5d37d163e5d6bf2a80823e1f841dd2fdcf9479428c19112a1e
-
SSDEEP
12288:sMrby90kO2lTeNIAwHOrGuGToWI7Y3ApgGoqHr8vxcEXU6JbGN:nyyeK2dOHGMWZGJGx5k60N
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr415793.exe healer behavioral1/memory/4888-15-0x00000000000B0000-0x00000000000BA000-memory.dmp healer -
Healer family
-
Processes:
jr415793.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr415793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr415793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr415793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr415793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr415793.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr415793.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/376-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/5492-2118-0x00000000006D0000-0x0000000000700000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr479832.exe family_redline behavioral1/memory/3892-2129-0x00000000000E0000-0x000000000010E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ku526972.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ku526972.exe -
Executes dropped EXE 5 IoCs
Processes:
ziGS4755.exejr415793.exeku526972.exe1.exelr479832.exepid process 1124 ziGS4755.exe 4888 jr415793.exe 376 ku526972.exe 5492 1.exe 3892 lr479832.exe -
Processes:
jr415793.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr415793.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exeziGS4755.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziGS4755.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4184 376 WerFault.exe ku526972.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1.exelr479832.exec5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exeziGS4755.exeku526972.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr479832.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziGS4755.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku526972.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr415793.exepid process 4888 jr415793.exe 4888 jr415793.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr415793.exeku526972.exedescription pid process Token: SeDebugPrivilege 4888 jr415793.exe Token: SeDebugPrivilege 376 ku526972.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exeziGS4755.exeku526972.exedescription pid process target process PID 5004 wrote to memory of 1124 5004 c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exe ziGS4755.exe PID 5004 wrote to memory of 1124 5004 c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exe ziGS4755.exe PID 5004 wrote to memory of 1124 5004 c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exe ziGS4755.exe PID 1124 wrote to memory of 4888 1124 ziGS4755.exe jr415793.exe PID 1124 wrote to memory of 4888 1124 ziGS4755.exe jr415793.exe PID 1124 wrote to memory of 376 1124 ziGS4755.exe ku526972.exe PID 1124 wrote to memory of 376 1124 ziGS4755.exe ku526972.exe PID 1124 wrote to memory of 376 1124 ziGS4755.exe ku526972.exe PID 376 wrote to memory of 5492 376 ku526972.exe 1.exe PID 376 wrote to memory of 5492 376 ku526972.exe 1.exe PID 376 wrote to memory of 5492 376 ku526972.exe 1.exe PID 5004 wrote to memory of 3892 5004 c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exe lr479832.exe PID 5004 wrote to memory of 3892 5004 c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exe lr479832.exe PID 5004 wrote to memory of 3892 5004 c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exe lr479832.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exe"C:\Users\Admin\AppData\Local\Temp\c5a13a79baa8b98ab11e0ef6c33691733fd884e26587e48333137e4ba3b78faa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGS4755.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGS4755.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr415793.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr415793.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku526972.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku526972.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 15124⤵
- Program crash
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr479832.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr479832.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 376 -ip 3761⤵PID:4556
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5d97a8410207c68e9f57056a90f865324
SHA1833d9d279ea2c12d7389080b653b5b6694bd83e3
SHA2569aeab388339a58a7dadf1fe501062ce2c2c187d835eeebf2c2fb3683d4bba9a0
SHA51208b79e9211a4ff9dc8f0cde1fcaa63cc9f86c3e2be6b1ba5980a0730aae89aacf28cf614715654cbfb51cb527ac1c3c0981b3bb1b53c9d8e58f580dbd0529c6e
-
Filesize
497KB
MD57aeef699ae2e25f73e6866d67574e97f
SHA13b856599cc7eb88c9b1499bf4453028fad7a3890
SHA2565cf94896fd366fa9ce5df7b09b6b621de00a49416f60c39de1606ec1cc4fa112
SHA5125e4a272aabeda0fba3c8a746c50cd1c5b71545f5757f9b7e52fb83b446a52819ff1e286eca91993e603d3f39dbd49f077d2b0633051971d4ccff844fbd47b226
-
Filesize
11KB
MD569ad867775a6a8ab7e6d8f23a9272752
SHA1fcbf04c68d445e51b3e4b4dc1e9ac941c405f0c4
SHA256618a768268787cd4acd54ed9047d14f042ca66d1ee6b631fecd3776560d51aa0
SHA512d39b0b56faf4dbdfe5082f91818aae45cabef3c774f334823099cd31fca00a3a2c0d9d4f853dce7af7d723046f88d049041a720eb4f7f4b039a8d2b2c370e6c5
-
Filesize
415KB
MD55458a426bef9c7ec2ba92aaeeed01893
SHA1a86e34684abbfcfe615ef5893a4986034a7af918
SHA25663e1e2be73887760b1915e4f82fd2868c911263f937855256b6acfbe098554ca
SHA512a1e1cebf6d603853b26e91b3de24bd2149eb2c4dc17e4cb832be3db1c69892a04a49b67698f63d370a31b0f84ae9e2a766285ce283209c5ddcbcafc33f34576b
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0