Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/11/2024, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe
Resource
win10v2004-20241007-en
General
-
Target
4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe
-
Size
661KB
-
MD5
e9830cbd245f7699210f585703ab2a90
-
SHA1
1a97c7228e7b90ea4c074fd642ead65ed65441e8
-
SHA256
4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196
-
SHA512
7b5c5837cf158ff16221ad5d585169768e0be5f126301496cbf774e0a2ed43ad12d449b976b1ff458077e47044be58374a85af605e3bff6c3ec01e2a47e440c1
-
SSDEEP
12288:tMr3y90SH5XQo4oyvt9Igti2ulY/rkEhEHqnT8LcEyPyhZpk8o:myv5A4FLgWHHfy6hho
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c62-12.dat healer behavioral1/memory/4808-15-0x0000000000270000-0x000000000027A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr926906.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr926906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr926906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr926906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr926906.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr926906.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/5100-2105-0x0000000005530000-0x0000000005562000-memory.dmp family_redline behavioral1/files/0x000e000000023b1a-2110.dat family_redline behavioral1/memory/228-2118-0x00000000006F0000-0x0000000000720000-memory.dmp family_redline behavioral1/files/0x0007000000023c60-2127.dat family_redline behavioral1/memory/2488-2129-0x00000000001F0000-0x000000000021E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ku368169.exe -
Executes dropped EXE 5 IoCs
pid Process 3208 ziLP1118.exe 4808 jr926906.exe 5100 ku368169.exe 228 1.exe 2488 lr906014.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr926906.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziLP1118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5096 5100 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziLP1118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku368169.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr906014.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4808 jr926906.exe 4808 jr926906.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4808 jr926906.exe Token: SeDebugPrivilege 5100 ku368169.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4224 wrote to memory of 3208 4224 4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe 84 PID 4224 wrote to memory of 3208 4224 4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe 84 PID 4224 wrote to memory of 3208 4224 4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe 84 PID 3208 wrote to memory of 4808 3208 ziLP1118.exe 86 PID 3208 wrote to memory of 4808 3208 ziLP1118.exe 86 PID 3208 wrote to memory of 5100 3208 ziLP1118.exe 89 PID 3208 wrote to memory of 5100 3208 ziLP1118.exe 89 PID 3208 wrote to memory of 5100 3208 ziLP1118.exe 89 PID 5100 wrote to memory of 228 5100 ku368169.exe 90 PID 5100 wrote to memory of 228 5100 ku368169.exe 90 PID 5100 wrote to memory of 228 5100 ku368169.exe 90 PID 4224 wrote to memory of 2488 4224 4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe 94 PID 4224 wrote to memory of 2488 4224 4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe 94 PID 4224 wrote to memory of 2488 4224 4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe"C:\Users\Admin\AppData\Local\Temp\4c7f84119d824df29812b84b3c67fd580d211842724220524a268a0dd0e41196.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLP1118.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLP1118.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr926906.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr926906.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku368169.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku368169.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 15364⤵
- Program crash
PID:5096
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr906014.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr906014.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5100 -ip 51001⤵PID:960
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD56c86284fca70fd48009b132cadf4d95d
SHA13d4b74035d0592dc8b163d1b47f4e9d28eb77065
SHA25618dd191f94f2d4b5167cabd01a6fa0503e520d505afddc7cec462b74c545b1f0
SHA5128704b474e8d015b8e7a6ccba6d794c50cbf4a8fddd4f06d38ab1b704fe7a60b171ff6af9f4c5eaabc15ee97b9e8e0910e0a0e8f3bae0c8dd32a5a2fca421ff9c
-
Filesize
507KB
MD58419f26de726b551bdc24468a65c5468
SHA1003fed476b2b525f162ca50f7a37a21fc804a858
SHA256d699eaaaf09870d9da28760fff4f7156760cb515ffeedcc7e3ef25a680de6d83
SHA51299289b1f0f499b3018ea4f8e03e412727eba76388d7a057b926ac42580b60a74ef6d5a2bc572e47b7839048304e472c8ce0722d05e70691092aba2e0c04fdb86
-
Filesize
15KB
MD5b77360b9b68b6977d9a61e7861530af9
SHA174845ec857ef1de7c0296c67c90737077e2588db
SHA256fe41df9ec8d02e205e013a4ca7117885ef049199a584ec7c249e856aeceb53c7
SHA512e44816c3e570d5e446f8fef0710c77b8f4837d6b543d75c2a6b561c1613d17d00b539959b421f7c5702a855540d6d4f89e0c68a772c4c8837ad53022d67a6054
-
Filesize
426KB
MD5dd10c790024e5ce0b7bf1df123554482
SHA1f7e90adc73a20f7ceed789e31526d11f7e1c2816
SHA256cad3a6fc7e18354ed12f55355ba4ac1d91882f183bec5d14bdf43a14e0dafaa0
SHA51218da3815f84bccc607a7939eb070ca7803e1c54c81cb282726bb485bd9af77aa7265532483ba41295152a1b7d2dc99bc97938ecb88d33b3b1b65275e292c37a1
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0