Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 14:24
Static task
static1
Behavioral task
behavioral1
Sample
a7cd16d0d78d547b4d19a1065bc3d3faff38c9075323480cdc522efaa0f52cfa.exe
Resource
win10v2004-20241007-en
General
-
Target
a7cd16d0d78d547b4d19a1065bc3d3faff38c9075323480cdc522efaa0f52cfa.exe
-
Size
660KB
-
MD5
896cbcb75d4b2323f9aeaca3c6b0f7c8
-
SHA1
cb3c566b9b0a1d50295e2529cde19d4c69a053fc
-
SHA256
a7cd16d0d78d547b4d19a1065bc3d3faff38c9075323480cdc522efaa0f52cfa
-
SHA512
ac1b159166730a2e6fd629ee9de2c63876b316ce8497a70764c30a61c4f0fc6a94dbc2d0a4ba908b7c99cb8bedd4b73d05c0e4536bc742217136b30a54d40f34
-
SSDEEP
12288:wMrOy90Um8kSOVLZTN2vMRV3vPZlGXoSs1/lbslwTILIw9QmRHh8R:uytMZ2KV3vBlp1/lVI13RBA
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c78-12.dat healer behavioral1/memory/3236-15-0x00000000004E0000-0x00000000004EA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr895808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr895808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr895808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr895808.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr895808.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr895808.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3580-2104-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x000d000000023b45-2109.dat family_redline behavioral1/memory/4556-2117-0x0000000000F30000-0x0000000000F60000-memory.dmp family_redline behavioral1/files/0x0007000000023c76-2126.dat family_redline behavioral1/memory/6008-2128-0x0000000000E00000-0x0000000000E2E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ku463587.exe -
Executes dropped EXE 5 IoCs
pid Process 4968 ziAi8964.exe 3236 jr895808.exe 3580 ku463587.exe 4556 1.exe 6008 lr194609.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr895808.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a7cd16d0d78d547b4d19a1065bc3d3faff38c9075323480cdc522efaa0f52cfa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAi8964.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5824 3580 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku463587.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr194609.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7cd16d0d78d547b4d19a1065bc3d3faff38c9075323480cdc522efaa0f52cfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziAi8964.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3236 jr895808.exe 3236 jr895808.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3236 jr895808.exe Token: SeDebugPrivilege 3580 ku463587.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2184 wrote to memory of 4968 2184 a7cd16d0d78d547b4d19a1065bc3d3faff38c9075323480cdc522efaa0f52cfa.exe 84 PID 2184 wrote to memory of 4968 2184 a7cd16d0d78d547b4d19a1065bc3d3faff38c9075323480cdc522efaa0f52cfa.exe 84 PID 2184 wrote to memory of 4968 2184 a7cd16d0d78d547b4d19a1065bc3d3faff38c9075323480cdc522efaa0f52cfa.exe 84 PID 4968 wrote to memory of 3236 4968 ziAi8964.exe 86 PID 4968 wrote to memory of 3236 4968 ziAi8964.exe 86 PID 4968 wrote to memory of 3580 4968 ziAi8964.exe 96 PID 4968 wrote to memory of 3580 4968 ziAi8964.exe 96 PID 4968 wrote to memory of 3580 4968 ziAi8964.exe 96 PID 3580 wrote to memory of 4556 3580 ku463587.exe 97 PID 3580 wrote to memory of 4556 3580 ku463587.exe 97 PID 3580 wrote to memory of 4556 3580 ku463587.exe 97 PID 2184 wrote to memory of 6008 2184 a7cd16d0d78d547b4d19a1065bc3d3faff38c9075323480cdc522efaa0f52cfa.exe 102 PID 2184 wrote to memory of 6008 2184 a7cd16d0d78d547b4d19a1065bc3d3faff38c9075323480cdc522efaa0f52cfa.exe 102 PID 2184 wrote to memory of 6008 2184 a7cd16d0d78d547b4d19a1065bc3d3faff38c9075323480cdc522efaa0f52cfa.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7cd16d0d78d547b4d19a1065bc3d3faff38c9075323480cdc522efaa0f52cfa.exe"C:\Users\Admin\AppData\Local\Temp\a7cd16d0d78d547b4d19a1065bc3d3faff38c9075323480cdc522efaa0f52cfa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAi8964.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAi8964.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr895808.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr895808.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku463587.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku463587.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4556
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3580 -s 13844⤵
- Program crash
PID:5824
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr194609.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr194609.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3580 -ip 35801⤵PID:5680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD53de44b11896c69c9cd0768975e0ff837
SHA178ace39fb9e37c8ea14abade93397ea8798dc6e1
SHA25661238e17e844d75008c338e6391200721c45f13c704e75dc078eeb8d481cd3b2
SHA5121d6122fd7480fe3cb7c8e02235747953b49edfe2c4fe6caa3a88f2ecb36468f4d80b8597cf46cee2454b9013bf3f99e918dbdc022e7ed35448e35e771d5758c7
-
Filesize
506KB
MD52e03a7880ee5ed3f96dc1eea0f6863d1
SHA1ea2a402983e90669620a46ac20fab5f78bc890cb
SHA2566388a7baf44cfd807319ea4fd2860213cd43bfaee69b74f5f3ace1cf415e9b11
SHA512fbc6de45fd23ef8d47d6f8f949328c74c3578877fe41a711981777c9705183b538853f5abfe347b2b85d94706bd0248af73af5948b65ce79129570279cdbc24b
-
Filesize
15KB
MD5b4ceb154cf5b8b12b8f32f71a0cbf00e
SHA1c075e7d0f0db5fd705e928f0227f963462d8d43c
SHA256c11d0a45a7f5e1d5bc98b596a7ba8d9d88102cc7bc96034569e76aee4cdfd6ea
SHA512a7b866fc74bbf04fef76fb4764634ffd5c562751bd316b2de897da01ef0ded5f27bd6eb1488d1bab808efd6aa97a9bb8eaa5f8f1c6bb6e8ebf7cd9595a6a0929
-
Filesize
426KB
MD57dbc64e5d78bedff1dade812fee62f41
SHA1ba45f2fdc8d60fdfd13c9ffeca7d886883691261
SHA256a27b841f62bce33272ca6169771e9828c6475120564df08adb63527ae97323aa
SHA51241d94fb251dfbbcb36fc8f07cfa14a2eb00233cde3fb8a3f955c1d72f627953c637cc28bd0902f3c62ef016ee89734fd2a7172d17e136d5cf64e25dd05bab332
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0