Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 11:19
Static task
static1
Behavioral task
behavioral1
Sample
05627d1e8108e5c9e548c7d039248e365f141c1ddcef8effa9214380842bcf02.exe
Resource
win10v2004-20241007-en
General
-
Target
05627d1e8108e5c9e548c7d039248e365f141c1ddcef8effa9214380842bcf02.exe
-
Size
661KB
-
MD5
4529910be4895313f6c63f65307e15fa
-
SHA1
6165f9e81010f0438ddfdf54ad480ebde0ac27c5
-
SHA256
05627d1e8108e5c9e548c7d039248e365f141c1ddcef8effa9214380842bcf02
-
SHA512
4b4bf4cfdfb686bff0817dc6b41d0d1f5bf7a70ce902bcb1a9fd766fe46ea3b2816dba296eddbae2f165ec31f623ee4e8c081c909888c4ef36640845a79df858
-
SSDEEP
12288:VMr+y90jI7exlHWAuUTrsrOkXPyYALM/CPTeceysaBC2yqbcT8Ic3YomOCXX:ry/AlHVvm6YXMkW/yQzzCH
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c93-12.dat healer behavioral1/memory/2328-15-0x0000000000130000-0x000000000013A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr557100.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr557100.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr557100.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr557100.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr557100.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr557100.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1348-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x0007000000023c96-2110.dat family_redline behavioral1/memory/5720-2118-0x0000000000DD0000-0x0000000000E00000-memory.dmp family_redline behavioral1/files/0x0007000000023c91-2127.dat family_redline behavioral1/memory/6108-2129-0x0000000000040000-0x000000000006E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ku094559.exe -
Executes dropped EXE 5 IoCs
pid Process 4348 zifP8281.exe 2328 jr557100.exe 1348 ku094559.exe 5720 1.exe 6108 lr477679.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr557100.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05627d1e8108e5c9e548c7d039248e365f141c1ddcef8effa9214380842bcf02.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zifP8281.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5984 1348 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05627d1e8108e5c9e548c7d039248e365f141c1ddcef8effa9214380842bcf02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zifP8281.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku094559.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr477679.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2328 jr557100.exe 2328 jr557100.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2328 jr557100.exe Token: SeDebugPrivilege 1348 ku094559.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4192 wrote to memory of 4348 4192 05627d1e8108e5c9e548c7d039248e365f141c1ddcef8effa9214380842bcf02.exe 84 PID 4192 wrote to memory of 4348 4192 05627d1e8108e5c9e548c7d039248e365f141c1ddcef8effa9214380842bcf02.exe 84 PID 4192 wrote to memory of 4348 4192 05627d1e8108e5c9e548c7d039248e365f141c1ddcef8effa9214380842bcf02.exe 84 PID 4348 wrote to memory of 2328 4348 zifP8281.exe 85 PID 4348 wrote to memory of 2328 4348 zifP8281.exe 85 PID 4348 wrote to memory of 1348 4348 zifP8281.exe 97 PID 4348 wrote to memory of 1348 4348 zifP8281.exe 97 PID 4348 wrote to memory of 1348 4348 zifP8281.exe 97 PID 1348 wrote to memory of 5720 1348 ku094559.exe 102 PID 1348 wrote to memory of 5720 1348 ku094559.exe 102 PID 1348 wrote to memory of 5720 1348 ku094559.exe 102 PID 4192 wrote to memory of 6108 4192 05627d1e8108e5c9e548c7d039248e365f141c1ddcef8effa9214380842bcf02.exe 107 PID 4192 wrote to memory of 6108 4192 05627d1e8108e5c9e548c7d039248e365f141c1ddcef8effa9214380842bcf02.exe 107 PID 4192 wrote to memory of 6108 4192 05627d1e8108e5c9e548c7d039248e365f141c1ddcef8effa9214380842bcf02.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\05627d1e8108e5c9e548c7d039248e365f141c1ddcef8effa9214380842bcf02.exe"C:\Users\Admin\AppData\Local\Temp\05627d1e8108e5c9e548c7d039248e365f141c1ddcef8effa9214380842bcf02.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifP8281.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifP8281.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr557100.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr557100.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku094559.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku094559.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1348 -s 14924⤵
- Program crash
PID:5984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr477679.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr477679.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1348 -ip 13481⤵PID:5912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5567e2be6e14cbb177cc9d6f50f1fd980
SHA166c847afd48d7ee566bc3317f2f77032ebf8c902
SHA2562bd359a25f8b96e81f66e320c22e6eeccc2f431015f8bbb9f2eeb5b57dabff17
SHA5128d003f0befc16e3c93ec6f05f0ffe419661192aa19955cbb223083b4662e1ea01126af462f0099341f2bd29beb075e0e46941598e4f973d406fbb590828c24fe
-
Filesize
507KB
MD58bbe689d9597984d233e2baad530ba99
SHA1766c180848a9cb30bbf46b3687db74241429eb08
SHA256660b7ffda1c0e90a5a686d831daab7df1ba78bccb108476262f9b90d205e703a
SHA512f7cf7314514dc3802f4535d3c1123a8f1e8efcb1624713971800ae72050c9f501b970289242384d52fad6230497bdf3f730326e707f75899b14a56c316d52dc1
-
Filesize
14KB
MD5c2c1d32e3e7b094e10eced1d44a3392b
SHA1e933bb256cef0a730386098dac111744db4760bb
SHA256cb15742aeb0438721184b137a7d5406b291ef92ca4b12b73f516606c725a0dd7
SHA51220b0cf3885c65b0dbf1d1ca4478f03be4c663b112835033d45007dc07edf9b378ca499688bd4d41e8b5f4d95dedc61f9803d3e51d945ff3b6cec99107f2d63aa
-
Filesize
426KB
MD51c076e4b5d0f428e0efeb1db33b02ad6
SHA14846f8abeaa5fbc4039e22170b23f8f4227eabda
SHA256cb00ff8077003a3c4f09f7885ad439900f4563c983f0d8e349e11838c79d0607
SHA5120578f8ef1c2624355ccbe3198c2f17377f85c177a0c9812aa10e082a1e198d7e4f0bae1a94b408d94fcd49c5d2fac04286f0fda22c0822348eacc0214cc0794b
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0