Analysis
-
max time kernel
146s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 15:31
Static task
static1
Behavioral task
behavioral1
Sample
889e36fd2964ef45faeb33370aa19105c02fc6fdd659048ef34f051a8f771f20.exe
Resource
win10v2004-20241007-en
General
-
Target
889e36fd2964ef45faeb33370aa19105c02fc6fdd659048ef34f051a8f771f20.exe
-
Size
925KB
-
MD5
474e56940b0f4e75e4eee8d381f08203
-
SHA1
d49ced28c12eb57996e36fc94bede25f0041190a
-
SHA256
889e36fd2964ef45faeb33370aa19105c02fc6fdd659048ef34f051a8f771f20
-
SHA512
799b5aa2a6bd3209a3a51e5e116499850ce871ed3a3d04a734465140009281232433f9778ff6e02722e1c01313126bb73c85e65f0856fbe0cb51452182441f5a
-
SSDEEP
24576:Myj7rhSWay/zlu2l/A94IsPeHhpb8QYlG:7/rsW1lu2C9ji0pb
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9d-19.dat healer behavioral1/memory/244-22-0x0000000000470000-0x000000000047A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it711420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it711420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it711420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it711420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it711420.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it711420.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1748-2112-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x000c000000023b57-2117.dat family_redline behavioral1/memory/340-2125-0x00000000003F0000-0x0000000000420000-memory.dmp family_redline behavioral1/files/0x0007000000023c9b-2134.dat family_redline behavioral1/memory/1644-2136-0x00000000009E0000-0x0000000000A0E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation jr469073.exe -
Executes dropped EXE 6 IoCs
pid Process 2064 ziBM3617.exe 828 zicT9675.exe 244 it711420.exe 1748 jr469073.exe 340 1.exe 1644 kp034967.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it711420.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziBM3617.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zicT9675.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 889e36fd2964ef45faeb33370aa19105c02fc6fdd659048ef34f051a8f771f20.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3012 1748 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp034967.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 889e36fd2964ef45faeb33370aa19105c02fc6fdd659048ef34f051a8f771f20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziBM3617.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zicT9675.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr469073.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 244 it711420.exe 244 it711420.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 244 it711420.exe Token: SeDebugPrivilege 1748 jr469073.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3156 wrote to memory of 2064 3156 889e36fd2964ef45faeb33370aa19105c02fc6fdd659048ef34f051a8f771f20.exe 83 PID 3156 wrote to memory of 2064 3156 889e36fd2964ef45faeb33370aa19105c02fc6fdd659048ef34f051a8f771f20.exe 83 PID 3156 wrote to memory of 2064 3156 889e36fd2964ef45faeb33370aa19105c02fc6fdd659048ef34f051a8f771f20.exe 83 PID 2064 wrote to memory of 828 2064 ziBM3617.exe 84 PID 2064 wrote to memory of 828 2064 ziBM3617.exe 84 PID 2064 wrote to memory of 828 2064 ziBM3617.exe 84 PID 828 wrote to memory of 244 828 zicT9675.exe 85 PID 828 wrote to memory of 244 828 zicT9675.exe 85 PID 828 wrote to memory of 1748 828 zicT9675.exe 97 PID 828 wrote to memory of 1748 828 zicT9675.exe 97 PID 828 wrote to memory of 1748 828 zicT9675.exe 97 PID 1748 wrote to memory of 340 1748 jr469073.exe 98 PID 1748 wrote to memory of 340 1748 jr469073.exe 98 PID 1748 wrote to memory of 340 1748 jr469073.exe 98 PID 2064 wrote to memory of 1644 2064 ziBM3617.exe 103 PID 2064 wrote to memory of 1644 2064 ziBM3617.exe 103 PID 2064 wrote to memory of 1644 2064 ziBM3617.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\889e36fd2964ef45faeb33370aa19105c02fc6fdd659048ef34f051a8f771f20.exe"C:\Users\Admin\AppData\Local\Temp\889e36fd2964ef45faeb33370aa19105c02fc6fdd659048ef34f051a8f771f20.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBM3617.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBM3617.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicT9675.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zicT9675.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it711420.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it711420.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:244
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr469073.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr469073.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:340
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1748 -s 13685⤵
- Program crash
PID:3012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp034967.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp034967.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1748 -ip 17481⤵PID:4764
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
660KB
MD5d9bf603bbffdc3e0b95ff685e1e35d18
SHA1576bb1955f003621b05dc5580b16a44d6d7d3062
SHA25611ffcce9bee3728324301c64c86bf3084f1981a0dac59a56491283d1a5a628a1
SHA51284b9d446a4726c78209ba7d35c464ec41a645cf5b4f73d492fa67586bdecc7947df187933c6328e018de6919ec760c98e7893ef3157ee0a95504f6e97622878b
-
Filesize
168KB
MD5fa8785d867d5490cfd1ac14f523c316f
SHA11883ff19ad5ea44de0bae74b1b653ff370e06fb4
SHA2568d9698e73bc4f6da860b1d40029c55c38c9ac61775458abd64649c8cc1b992f6
SHA5128d5c34ef1399bc3fe7ea5e5e8a8ce2f036ab6a1613016b55703fe75d0e2c37d89deb79b4e4077ce4e6684a76edab76c1cb6e659582a10df255f6d5f43bd6fc52
-
Filesize
507KB
MD56c25de20820b37478c489493b150c8e6
SHA1f8a070d3709e416ef0d9c476bf2f057654154267
SHA25673df92c0930148d5799e7b0ef39fb0709ead837c664a08f7c73a0440ca2d81c9
SHA512f29aaa995f9e81c6346068c600c37946a23364367b6abd9071f60cba271d8821bec20054968b8e4014840ba35facf00e41905e112abd3ecfcb133e68ecad2cda
-
Filesize
15KB
MD5ea1e361beb77d0afd3a8039d4b8ba718
SHA108b1c5747c52758789e6d28311a63f0099e8ac0c
SHA256186ce460b5e76458fba413f8a3e275fbb3b2cf723d4f48d2820777bae481441a
SHA512478208478afd0cc65f188c2d7b95efb03e71249c43b36c6310b51ac40a069fbbbeb1c02af0df7c787d644965299403cb990bf42f7e0941c945579fec850ede8b
-
Filesize
426KB
MD5056c546d92dd6336987dfac912611fa7
SHA137332c9b8ae6a1d98a8e6b0c4322e7e6b6f4552e
SHA256d8188c226ae07d3076264589821618112f5cbf1a9db31c46873292546f2d5f21
SHA5127a9cb5ef990597899fc677402788d22f7c132d83be561322e7d82dc90389ea630b6024853fc46ca2162bcef71026b14c569cb64977329d8ff46fdb73d89e7a87
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0