Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
09fda53217e1c4b5bdba073b192ae8633201f7f0df3b0b3701c88c7b142c61bc.exe
Resource
win10v2004-20241007-en
General
-
Target
09fda53217e1c4b5bdba073b192ae8633201f7f0df3b0b3701c88c7b142c61bc.exe
-
Size
660KB
-
MD5
4500d2a0fdf37a7651608fb1dafe4521
-
SHA1
250a3269164e9c1e03d50f686db615490c536081
-
SHA256
09fda53217e1c4b5bdba073b192ae8633201f7f0df3b0b3701c88c7b142c61bc
-
SHA512
cfb41aefb9431b76569e44a967d708c2ee1d58aa34b85ca1d0787979f8802f7a967c1aa4827e2b2205541fe7c3a88b64de896070cd7c6e7f19137e30184c9bfd
-
SSDEEP
12288:GMrgy90JMVgLTnq5rSmYlD4lysnge4IdpihJpnqgsxYbTaE:qyr6TnqBqlD4lyXe4IWpqhY3aE
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b59-12.dat healer behavioral1/memory/732-15-0x00000000009B0000-0x00000000009BA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr406674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr406674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr406674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr406674.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr406674.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr406674.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2364-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x000b000000023b54-2110.dat family_redline behavioral1/memory/3588-2118-0x0000000000D40000-0x0000000000D70000-memory.dmp family_redline behavioral1/files/0x000a000000023b57-2127.dat family_redline behavioral1/memory/5600-2129-0x0000000000610000-0x000000000063E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation ku785985.exe -
Executes dropped EXE 5 IoCs
pid Process 460 ziMz7581.exe 732 jr406674.exe 2364 ku785985.exe 3588 1.exe 5600 lr557208.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr406674.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 09fda53217e1c4b5bdba073b192ae8633201f7f0df3b0b3701c88c7b142c61bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziMz7581.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6380 2364 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 09fda53217e1c4b5bdba073b192ae8633201f7f0df3b0b3701c88c7b142c61bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziMz7581.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku785985.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr557208.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 732 jr406674.exe 732 jr406674.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 732 jr406674.exe Token: SeDebugPrivilege 2364 ku785985.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1056 wrote to memory of 460 1056 09fda53217e1c4b5bdba073b192ae8633201f7f0df3b0b3701c88c7b142c61bc.exe 83 PID 1056 wrote to memory of 460 1056 09fda53217e1c4b5bdba073b192ae8633201f7f0df3b0b3701c88c7b142c61bc.exe 83 PID 1056 wrote to memory of 460 1056 09fda53217e1c4b5bdba073b192ae8633201f7f0df3b0b3701c88c7b142c61bc.exe 83 PID 460 wrote to memory of 732 460 ziMz7581.exe 84 PID 460 wrote to memory of 732 460 ziMz7581.exe 84 PID 460 wrote to memory of 2364 460 ziMz7581.exe 92 PID 460 wrote to memory of 2364 460 ziMz7581.exe 92 PID 460 wrote to memory of 2364 460 ziMz7581.exe 92 PID 2364 wrote to memory of 3588 2364 ku785985.exe 93 PID 2364 wrote to memory of 3588 2364 ku785985.exe 93 PID 2364 wrote to memory of 3588 2364 ku785985.exe 93 PID 1056 wrote to memory of 5600 1056 09fda53217e1c4b5bdba073b192ae8633201f7f0df3b0b3701c88c7b142c61bc.exe 97 PID 1056 wrote to memory of 5600 1056 09fda53217e1c4b5bdba073b192ae8633201f7f0df3b0b3701c88c7b142c61bc.exe 97 PID 1056 wrote to memory of 5600 1056 09fda53217e1c4b5bdba073b192ae8633201f7f0df3b0b3701c88c7b142c61bc.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\09fda53217e1c4b5bdba073b192ae8633201f7f0df3b0b3701c88c7b142c61bc.exe"C:\Users\Admin\AppData\Local\Temp\09fda53217e1c4b5bdba073b192ae8633201f7f0df3b0b3701c88c7b142c61bc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMz7581.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMz7581.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr406674.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr406674.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:732
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku785985.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku785985.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3588
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 13684⤵
- Program crash
PID:6380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr557208.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr557208.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2364 -ip 23641⤵PID:6316
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD55b523456bfc0eef16842b8e444d3b844
SHA173c685bc153aefc8ed91279960fed7902d4ad7c3
SHA2563dc9c0d4470a63fe039520b0551784c68fa2c50801f4f8c33dcf4ca4d0510a9f
SHA5122852e790766e196887b421d738f2bc835b69f9d6b9510d616d3f01e109f7ae6470c7ef2826ef37f83957c1289cefedf9c32f6a5712b950ff40cdd331515981c7
-
Filesize
507KB
MD5cad150c431ff91ab70dad8d261779664
SHA11ece760b42d097c3ea2c781db926c651a8ae57b4
SHA256b587f2ef7f1637f8eb4e6ca281596b0bc4076821cb61299c1925e50d4032cd5e
SHA5126f4f00e6392997f6acee047cae08f97ab090119d6f9ad65dea1a80555cf8e8a690d5f8fb29ff3e89364d67629db607019b4cde70073e4b9de57ef7ec55901b17
-
Filesize
15KB
MD51cae015cd6157bbcdf513917afac9492
SHA1a038b6efb38a630060b65150037e11d87fe3b478
SHA2564f57231194b5400a2622145aa8ddd8bb1db4fd045ed79c3c3bfc90554e8683f8
SHA512037a4aa34638443fc3969153ec17463a37e716d2485b59e9cc9a2599451a0680ed53cd0d9f93d33787de802e7140fe4492015c7d1748534ed5219051bcb4f874
-
Filesize
426KB
MD505ce8c1928c48bde37c510d11fa32dbb
SHA109b5f275e901f73f0d771e8c5addca0da95fb5e6
SHA256890caf7371408851361c9373cfab90829c10df48618cba0acf472082ea07404a
SHA512650e14682febe992bf6cfa3506767c0df88361a9d55d079624df2369f1a3bef45c245a6175074e363044d55f7e6032e1137b645e41a07d6f29de0f8386de5505
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0