Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 23:23
Static task
static1
Behavioral task
behavioral1
Sample
da39aa675d81692ffcfff22b1225e4fda49be361a1e5e5f4485c232bfc2a7bf8.exe
Resource
win10v2004-20241007-en
General
-
Target
da39aa675d81692ffcfff22b1225e4fda49be361a1e5e5f4485c232bfc2a7bf8.exe
-
Size
661KB
-
MD5
ae0b7cae7fa2c6cde48a76fee825a3b1
-
SHA1
b112f068a97e5a08b4766a1ef154314bfef6d23f
-
SHA256
da39aa675d81692ffcfff22b1225e4fda49be361a1e5e5f4485c232bfc2a7bf8
-
SHA512
5cf1abda49c52daadba25bd3a30ab7d2e029a8725e3c0ae6bddd763f8a4565aaef4a439f08406a7f213f66d3468ba259f9001fd2d04eb818edd29c43fda9018f
-
SSDEEP
12288:gMrIy90aRzJjT0j/yWc2sBps2llIRikyhEjkRT8LSFWgGen3R883h:Yy1vj4j/K8AF+jnk230
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b99-13.dat healer behavioral1/memory/3652-15-0x00000000008D0000-0x00000000008DA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr658449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr658449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr658449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr658449.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr658449.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr658449.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2056-2104-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x000d000000023acf-2109.dat family_redline behavioral1/memory/2028-2117-0x0000000000010000-0x0000000000040000-memory.dmp family_redline behavioral1/files/0x000a000000023b90-2126.dat family_redline behavioral1/memory/2200-2128-0x0000000000ED0000-0x0000000000EFE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ku368920.exe -
Executes dropped EXE 5 IoCs
pid Process 1980 zizp6987.exe 3652 jr658449.exe 2056 ku368920.exe 2028 1.exe 2200 lr632025.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr658449.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zizp6987.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" da39aa675d81692ffcfff22b1225e4fda49be361a1e5e5f4485c232bfc2a7bf8.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5900 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3500 2056 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da39aa675d81692ffcfff22b1225e4fda49be361a1e5e5f4485c232bfc2a7bf8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zizp6987.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku368920.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr632025.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3652 jr658449.exe 3652 jr658449.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3652 jr658449.exe Token: SeDebugPrivilege 2056 ku368920.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2740 wrote to memory of 1980 2740 da39aa675d81692ffcfff22b1225e4fda49be361a1e5e5f4485c232bfc2a7bf8.exe 83 PID 2740 wrote to memory of 1980 2740 da39aa675d81692ffcfff22b1225e4fda49be361a1e5e5f4485c232bfc2a7bf8.exe 83 PID 2740 wrote to memory of 1980 2740 da39aa675d81692ffcfff22b1225e4fda49be361a1e5e5f4485c232bfc2a7bf8.exe 83 PID 1980 wrote to memory of 3652 1980 zizp6987.exe 84 PID 1980 wrote to memory of 3652 1980 zizp6987.exe 84 PID 1980 wrote to memory of 2056 1980 zizp6987.exe 96 PID 1980 wrote to memory of 2056 1980 zizp6987.exe 96 PID 1980 wrote to memory of 2056 1980 zizp6987.exe 96 PID 2056 wrote to memory of 2028 2056 ku368920.exe 97 PID 2056 wrote to memory of 2028 2056 ku368920.exe 97 PID 2056 wrote to memory of 2028 2056 ku368920.exe 97 PID 2740 wrote to memory of 2200 2740 da39aa675d81692ffcfff22b1225e4fda49be361a1e5e5f4485c232bfc2a7bf8.exe 102 PID 2740 wrote to memory of 2200 2740 da39aa675d81692ffcfff22b1225e4fda49be361a1e5e5f4485c232bfc2a7bf8.exe 102 PID 2740 wrote to memory of 2200 2740 da39aa675d81692ffcfff22b1225e4fda49be361a1e5e5f4485c232bfc2a7bf8.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\da39aa675d81692ffcfff22b1225e4fda49be361a1e5e5f4485c232bfc2a7bf8.exe"C:\Users\Admin\AppData\Local\Temp\da39aa675d81692ffcfff22b1225e4fda49be361a1e5e5f4485c232bfc2a7bf8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizp6987.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizp6987.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr658449.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr658449.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku368920.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku368920.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2028
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2056 -s 13844⤵
- Program crash
PID:3500
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr632025.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr632025.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2200
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2056 -ip 20561⤵PID:3608
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5900
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD57c392246a6da6775c5c9d06159a0f2ec
SHA165dc7350bc5a11e5086ed3d16823fb83ba1c5143
SHA2562e389aa92b49616cde3d685361df002c240471b92bb3201309a9a093df63018e
SHA512843a8b947a8565aaeee03f06c819e618761a4d31828d7e6eb34bab1e7964a3e344d36bd98354963629e4bf59a8870559656cb69911a6475e186724727af6a764
-
Filesize
507KB
MD5926c447ee2948904366a087605472ed1
SHA1c6ddf0f7884a005aeb2c26fe6604c7dab7385f6b
SHA2565841270125964e2deffe9b8d96d83e3722ce114e4eb448c14ed16ed31efb5498
SHA5122db75115cd40302d7cad2f0ee4da5a2ce7bbd49ec546a557ce3933050e61eebfff7f251e8fee75a2f123eb856ab13172bce82ccb76662c03f33459b33e1a9c1a
-
Filesize
15KB
MD5c8b0f18a9eda8a10136ca0cafc2d371c
SHA1593c5c5918dcb7e920b8af216270a31a5af37730
SHA256e978357201bdccea8eeb607126d705995c6995a6354c36087c03ef4aa580b0ec
SHA51276eec157b1eea13fa0595be8d8d36a52d29b62bbc7fb1c32ad249a79b4f243f369d62347bcec9661d4a25248e8d5ef1dde0ea86ff2eee6d1cbddfee92ac22941
-
Filesize
426KB
MD55b8338da054cc5d794de3a687c2fc3e8
SHA1b356d2f872cfe96f3a41a2426490886e12d89131
SHA256dcc5fd00aba43f12bd503a0815f3c3ed0b1ea25eb52ebd3f1187f8ae024191d0
SHA512b3f3d5069754cd909e9ffad13cb6c5bb38eab708c377982499e1e518ae5c578e2b636be1a8fb80b02686788bbeda71a83542c58423ac9ae78106f475a5ee5340
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0