Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/11/2024, 07:00
Static task
static1
Behavioral task
behavioral1
Sample
ad9fd6e19a8dfc0be7f07e8d1b83ba814e153cca113df2296b9103bc33c48a2f.exe
Resource
win10v2004-20241007-en
General
-
Target
ad9fd6e19a8dfc0be7f07e8d1b83ba814e153cca113df2296b9103bc33c48a2f.exe
-
Size
661KB
-
MD5
34c2011643fd7e40bb07a70872277c54
-
SHA1
fca7471369d3dc937e844515c2f085ef33730508
-
SHA256
ad9fd6e19a8dfc0be7f07e8d1b83ba814e153cca113df2296b9103bc33c48a2f
-
SHA512
f2974750c2af34ab16f16d41be30fc3f44db03f548f7a0c3d1c0d9e8cf6f3567d42ed49bb5bf5697453cc68ca9a6431443a4f0253f81cecb8510037d1d650257
-
SSDEEP
12288:KMr+y90AcvhDHJ/oiQo3Xd+/8QG//hPTecA+Az0CuyqboT8+Q/KFkH+0l:YydcJHx1Qo3Xd+EQmhoAPyMoW
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c96-12.dat healer behavioral1/memory/4044-15-0x00000000000C0000-0x00000000000CA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr610885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr610885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr610885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr610885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr610885.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr610885.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4168-2104-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x0010000000023b54-2109.dat family_redline behavioral1/memory/5128-2117-0x0000000000F00000-0x0000000000F30000-memory.dmp family_redline behavioral1/files/0x0007000000023c94-2126.dat family_redline behavioral1/memory/916-2128-0x0000000000C40000-0x0000000000C6E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ku872119.exe -
Executes dropped EXE 5 IoCs
pid Process 1508 ziAi3251.exe 4044 jr610885.exe 4168 ku872119.exe 5128 1.exe 916 lr239432.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr610885.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ad9fd6e19a8dfc0be7f07e8d1b83ba814e153cca113df2296b9103bc33c48a2f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAi3251.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5360 4168 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad9fd6e19a8dfc0be7f07e8d1b83ba814e153cca113df2296b9103bc33c48a2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziAi3251.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku872119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr239432.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4044 jr610885.exe 4044 jr610885.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4044 jr610885.exe Token: SeDebugPrivilege 4168 ku872119.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4332 wrote to memory of 1508 4332 ad9fd6e19a8dfc0be7f07e8d1b83ba814e153cca113df2296b9103bc33c48a2f.exe 83 PID 4332 wrote to memory of 1508 4332 ad9fd6e19a8dfc0be7f07e8d1b83ba814e153cca113df2296b9103bc33c48a2f.exe 83 PID 4332 wrote to memory of 1508 4332 ad9fd6e19a8dfc0be7f07e8d1b83ba814e153cca113df2296b9103bc33c48a2f.exe 83 PID 1508 wrote to memory of 4044 1508 ziAi3251.exe 84 PID 1508 wrote to memory of 4044 1508 ziAi3251.exe 84 PID 1508 wrote to memory of 4168 1508 ziAi3251.exe 95 PID 1508 wrote to memory of 4168 1508 ziAi3251.exe 95 PID 1508 wrote to memory of 4168 1508 ziAi3251.exe 95 PID 4168 wrote to memory of 5128 4168 ku872119.exe 96 PID 4168 wrote to memory of 5128 4168 ku872119.exe 96 PID 4168 wrote to memory of 5128 4168 ku872119.exe 96 PID 4332 wrote to memory of 916 4332 ad9fd6e19a8dfc0be7f07e8d1b83ba814e153cca113df2296b9103bc33c48a2f.exe 101 PID 4332 wrote to memory of 916 4332 ad9fd6e19a8dfc0be7f07e8d1b83ba814e153cca113df2296b9103bc33c48a2f.exe 101 PID 4332 wrote to memory of 916 4332 ad9fd6e19a8dfc0be7f07e8d1b83ba814e153cca113df2296b9103bc33c48a2f.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad9fd6e19a8dfc0be7f07e8d1b83ba814e153cca113df2296b9103bc33c48a2f.exe"C:\Users\Admin\AppData\Local\Temp\ad9fd6e19a8dfc0be7f07e8d1b83ba814e153cca113df2296b9103bc33c48a2f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAi3251.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAi3251.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr610885.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr610885.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku872119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku872119.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4168 -s 13804⤵
- Program crash
PID:5360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239432.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239432.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4168 -ip 41681⤵PID:5284
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5d5d379a46e47a22cf516c447f69173d7
SHA18a697cae9aafe41b8288a1de0c5c1c0cf9df8427
SHA2567433d17615736d18764c79a1e9cfdf7ba3a3f595eba16c838ce21e187110e5bf
SHA512bd33c2941e866f42cb170f461965e1230fbdc201fdceac2304fc0e5e520353057497d1c884925665228b395b13f6d1a578751eb89b018b98317cd4a75fc7084a
-
Filesize
507KB
MD582892765e63a75a4cafbd14d0866046c
SHA1f14046f293176642d4d0c15391cccda6f37d166c
SHA256ea90a87738393e10e4950f114dda791bc611cff414b48568d61e92fa9ae6a9cd
SHA512d6b057d87cee8097c12fe1e83f7a0b2b1e016c823fc2f4fd305b4eb7133dbf1340bf19f4ec62c4cab725c0e42a1957f57a7da92aa93a573c050860bef6149878
-
Filesize
14KB
MD59a32ab61dbe1ffcf8d6103f62f107052
SHA14e0fe052bf20b1ea318665f154ca22b0ea62a2c4
SHA2566c95a0589b35d3e1f35e418b7f1978b19303633ddb75c740b0d5bd32d1ddf1b5
SHA512da2b9502abf2e494b587bad2948822f8cb1a749a94b969e7daba23129b1b920aec68b5a0ca5d3f5e4f9910536cef431df995161dcf41f5368d033c4e2a01a8fe
-
Filesize
426KB
MD50672bac2318875c8739cc359502276b1
SHA140f0fb5d8bf25cdd4ac655a476038408ad52b8cc
SHA256ff8571a45edb0fb966143dc3413210b1bf6afe74a633d6b68f2f56116f550d5c
SHA512cd7b7d3c8b9a4a22416577296fe64cd794303c5847b8f194ea7e1104db51604aed7f9e01ad984a7e19fd0c35bcd58f3c9376ee9b0529d9345db0c2472bcd012b
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0