Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 10:04
Static task
static1
Behavioral task
behavioral1
Sample
6b5d6022f8301ac1c6b39bec445dbe1e087e28d251e9e4560f4545f88798ecb6.exe
Resource
win10v2004-20241007-en
General
-
Target
6b5d6022f8301ac1c6b39bec445dbe1e087e28d251e9e4560f4545f88798ecb6.exe
-
Size
926KB
-
MD5
d79dad8803a11421aa13c5521d2537ef
-
SHA1
1f3c2c1db0423b10de168c460b60c31fcd03c164
-
SHA256
6b5d6022f8301ac1c6b39bec445dbe1e087e28d251e9e4560f4545f88798ecb6
-
SHA512
3a11a03641da671e84bedce3d28075e5f1c219c7ae936a591a73217d5ae92e1baf8429aa6a8b7e8cc5e22d9d2cca1b16bf6e64cb0447f41a1111188e9f987610
-
SSDEEP
24576:JyvtTjTC1TlA2h4I61kTCBekAqNme9jjL:8tYTzhj21EY1j
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c8c-19.dat healer behavioral1/memory/2308-22-0x0000000000160000-0x000000000016A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it219589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it219589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it219589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it219589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it219589.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it219589.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4264-2112-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x000e000000023b4e-2117.dat family_redline behavioral1/memory/5964-2125-0x0000000000C00000-0x0000000000C30000-memory.dmp family_redline behavioral1/memory/2288-2136-0x0000000000430000-0x000000000045E000-memory.dmp family_redline behavioral1/files/0x0007000000023c89-2135.dat family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation jr420755.exe -
Executes dropped EXE 6 IoCs
pid Process 3128 zixJ3763.exe 2040 ziQm2710.exe 2308 it219589.exe 4264 jr420755.exe 5964 1.exe 2288 kp304670.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it219589.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6b5d6022f8301ac1c6b39bec445dbe1e087e28d251e9e4560f4545f88798ecb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zixJ3763.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziQm2710.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2764 4264 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zixJ3763.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziQm2710.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr420755.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp304670.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b5d6022f8301ac1c6b39bec445dbe1e087e28d251e9e4560f4545f88798ecb6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2308 it219589.exe 2308 it219589.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2308 it219589.exe Token: SeDebugPrivilege 4264 jr420755.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1312 wrote to memory of 3128 1312 6b5d6022f8301ac1c6b39bec445dbe1e087e28d251e9e4560f4545f88798ecb6.exe 84 PID 1312 wrote to memory of 3128 1312 6b5d6022f8301ac1c6b39bec445dbe1e087e28d251e9e4560f4545f88798ecb6.exe 84 PID 1312 wrote to memory of 3128 1312 6b5d6022f8301ac1c6b39bec445dbe1e087e28d251e9e4560f4545f88798ecb6.exe 84 PID 3128 wrote to memory of 2040 3128 zixJ3763.exe 85 PID 3128 wrote to memory of 2040 3128 zixJ3763.exe 85 PID 3128 wrote to memory of 2040 3128 zixJ3763.exe 85 PID 2040 wrote to memory of 2308 2040 ziQm2710.exe 87 PID 2040 wrote to memory of 2308 2040 ziQm2710.exe 87 PID 2040 wrote to memory of 4264 2040 ziQm2710.exe 97 PID 2040 wrote to memory of 4264 2040 ziQm2710.exe 97 PID 2040 wrote to memory of 4264 2040 ziQm2710.exe 97 PID 4264 wrote to memory of 5964 4264 jr420755.exe 98 PID 4264 wrote to memory of 5964 4264 jr420755.exe 98 PID 4264 wrote to memory of 5964 4264 jr420755.exe 98 PID 3128 wrote to memory of 2288 3128 zixJ3763.exe 103 PID 3128 wrote to memory of 2288 3128 zixJ3763.exe 103 PID 3128 wrote to memory of 2288 3128 zixJ3763.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b5d6022f8301ac1c6b39bec445dbe1e087e28d251e9e4560f4545f88798ecb6.exe"C:\Users\Admin\AppData\Local\Temp\6b5d6022f8301ac1c6b39bec445dbe1e087e28d251e9e4560f4545f88798ecb6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixJ3763.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixJ3763.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQm2710.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQm2710.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it219589.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it219589.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr420755.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr420755.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 9805⤵
- Program crash
PID:2764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp304670.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp304670.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2288
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4264 -ip 42641⤵PID:6120
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661KB
MD5a4e7142c6eb2bf89e26a525d049041ad
SHA1b8c94c0245b57290445403da757e07cebc903e02
SHA25691a14ef7c5392d220b496508c2464b6354d83984376af2461986945c1c10e707
SHA5120265d4c6b4b3fc697af3e3bf762a770883bab0ea924d331baa9e28cf06fe8d307096e1130d6b8dc7fce1a6e9da6a78f19f2ce8c0165e8e689b494502e1ac5591
-
Filesize
168KB
MD517810612b85801a54d066174f0cff5de
SHA15286fd4122612ce07cb1d83dfb49513320f14c9c
SHA256f6636a62bcd5bb5455b1f3c06e1c000c8cfbafb7b3bf02c8af3e90f8c8462e75
SHA512bc54d21994ce00ef0ee8d41ba818de34ee4cc6061a15f838fcaab002ced77892c20aee270e154a1757205bc0cc4b0352fedc17fed03081bd08e5a162929c83c5
-
Filesize
507KB
MD5bbca3a0290868b4fd8afe7c2235fd387
SHA152a44b29e6814e7d3f46e013efeb80bf54abdc2b
SHA2562205d7f988235a9b2fdadfa9ba12c71c929f9ee8a4ade0cb28eb16bbb71832b0
SHA512ce96d33b7b842dfe87d1cb9373b8a2ed8179d89f9b0d36a0826eb303a9a87507d60ead66a721be92e36ba02dedf3f691b9b00f030a463f7f06f3a2d972af29d1
-
Filesize
15KB
MD5708db524f7c5476647fb60d1deffc0ea
SHA1e4d8951d5b1d2fcf0a8ab014369c102ab9a8e615
SHA2569fe5bbd7f2c529714f5d47544a55e82e87d4580ac7107e4057ce862c4729e811
SHA5126a1acc37296ffde30474af6acc706b993c2a6f01b7a7e1bccbce07e216490929c0a6bdaaa5c9c3a7676d1bbe29eb7c86a7cb6cdcb381d8c77c0bf408b4a24310
-
Filesize
426KB
MD5bfe92b7fe0c298e8d8ca9fbd98d65be5
SHA110ffb0cb48706fcb8960c3db9b31ee0f9a78dea6
SHA25614e4ad79523a5b67cc48891fe4c1083ed61d226fe81e5dd2fccf0b53ab614bb5
SHA512c2e195285ec4c05d64bc13ee0861d8ea13100c6df748ec6af7d896c2334eba897fb758b462f60455b29233b0ef764c5ae010e0e8117048cb027b0478ace6d529
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0