Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-11-2024 20:15
Static task
static1
Behavioral task
behavioral1
Sample
cf13b86841f1a7a664dcdb650aa724bfb43ff66a492479e7c4f2e95ffa7deff6.exe
Resource
win10v2004-20241007-en
General
-
Target
cf13b86841f1a7a664dcdb650aa724bfb43ff66a492479e7c4f2e95ffa7deff6.exe
-
Size
660KB
-
MD5
31b6f1a3e63523f54bb7ce168fe641e8
-
SHA1
a44b4cf0aa6240265b4dc0fff0c7f53e8b01a5b9
-
SHA256
cf13b86841f1a7a664dcdb650aa724bfb43ff66a492479e7c4f2e95ffa7deff6
-
SHA512
1d888f2474d98ac57bb1f1d5c4d17233df5e74a34838ba733c5f9075ef52d406f5041b33b37b1085400c613c496452df1fcca3c0cef1ceb83e3cce76f74903ff
-
SSDEEP
12288:xMrqy90mKfGPAprOUkuphDFi95SbjqG9hUzXRo2D/lLslKTo7b+zSeqmQUo:jy5KfQ6lpXDeSbjFzUVHD/l/KKueqd
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b92-12.dat healer behavioral1/memory/2184-15-0x0000000000F60000-0x0000000000F6A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr463431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr463431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr463431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr463431.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr463431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr463431.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/64-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x000d000000023add-2110.dat family_redline behavioral1/memory/5532-2118-0x00000000006A0000-0x00000000006D0000-memory.dmp family_redline behavioral1/files/0x000a000000023b90-2127.dat family_redline behavioral1/memory/4448-2129-0x00000000006D0000-0x00000000006FE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ku331369.exe -
Executes dropped EXE 5 IoCs
pid Process 4028 zixL3026.exe 2184 jr463431.exe 64 ku331369.exe 5532 1.exe 4448 lr271149.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr463431.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf13b86841f1a7a664dcdb650aa724bfb43ff66a492479e7c4f2e95ffa7deff6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zixL3026.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4368 64 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zixL3026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku331369.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr271149.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf13b86841f1a7a664dcdb650aa724bfb43ff66a492479e7c4f2e95ffa7deff6.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2184 jr463431.exe 2184 jr463431.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2184 jr463431.exe Token: SeDebugPrivilege 64 ku331369.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1976 wrote to memory of 4028 1976 cf13b86841f1a7a664dcdb650aa724bfb43ff66a492479e7c4f2e95ffa7deff6.exe 84 PID 1976 wrote to memory of 4028 1976 cf13b86841f1a7a664dcdb650aa724bfb43ff66a492479e7c4f2e95ffa7deff6.exe 84 PID 1976 wrote to memory of 4028 1976 cf13b86841f1a7a664dcdb650aa724bfb43ff66a492479e7c4f2e95ffa7deff6.exe 84 PID 4028 wrote to memory of 2184 4028 zixL3026.exe 86 PID 4028 wrote to memory of 2184 4028 zixL3026.exe 86 PID 4028 wrote to memory of 64 4028 zixL3026.exe 96 PID 4028 wrote to memory of 64 4028 zixL3026.exe 96 PID 4028 wrote to memory of 64 4028 zixL3026.exe 96 PID 64 wrote to memory of 5532 64 ku331369.exe 97 PID 64 wrote to memory of 5532 64 ku331369.exe 97 PID 64 wrote to memory of 5532 64 ku331369.exe 97 PID 1976 wrote to memory of 4448 1976 cf13b86841f1a7a664dcdb650aa724bfb43ff66a492479e7c4f2e95ffa7deff6.exe 102 PID 1976 wrote to memory of 4448 1976 cf13b86841f1a7a664dcdb650aa724bfb43ff66a492479e7c4f2e95ffa7deff6.exe 102 PID 1976 wrote to memory of 4448 1976 cf13b86841f1a7a664dcdb650aa724bfb43ff66a492479e7c4f2e95ffa7deff6.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf13b86841f1a7a664dcdb650aa724bfb43ff66a492479e7c4f2e95ffa7deff6.exe"C:\Users\Admin\AppData\Local\Temp\cf13b86841f1a7a664dcdb650aa724bfb43ff66a492479e7c4f2e95ffa7deff6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixL3026.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixL3026.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr463431.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr463431.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku331369.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku331369.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 13804⤵
- Program crash
PID:4368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr271149.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr271149.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 64 -ip 641⤵PID:2404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5d231aa618f231b3d86f4e1faec4864b6
SHA19860522eba6856b37aee3394956226b67268d5c3
SHA2568791e02fe84648fdd426d6184b600159222506a1c7d304fcb6c222144720cdf5
SHA51248f2ffd4de06cc044f61b1929be60b2c069d2f4fc2a6540368cb368e7b20c4f64c914b4d00320c1990205cccd2796b0136f558f5d8b849303d824c1a28a613b7
-
Filesize
506KB
MD535a083fe5b760dc3ef59e9a70d6a281f
SHA1616acf7e69ee8a951f4800beb92ca058ac328683
SHA25613a92e5e6957e9b50dff1406c7fea5c84afcf08e2f3fb5bef6db9df8c55d4514
SHA512bce0e5f1c8540ff02533b9c2341d04248d50497b72934e426c3c8dda320840c10d233f4ca9a5a75191dc8ad727dba63c11d8f1b36d92830afc0cd4cdef261cc8
-
Filesize
15KB
MD50efcd2708eeace5cf67c1dd2dd9c3076
SHA137d57dac2b805a687a15ca95031f92ec6759c2cd
SHA256f8ab0a5785272acaba7bd849e79c069ab956a9982e071e11c9ff29cfac019620
SHA512c4ff83e45bab96fc6ed898124403e74f427e4863f153089e2e99de8b988872b93b1e5af12cd437f8b37ffd1db5cb41160e90d9435d3b1c73846af37185377968
-
Filesize
426KB
MD57ab9eec7ef941da900e7c178fc88a46c
SHA1b9bf8b03a1bdddf3a6b40ad216d2ce0f2f11d2b1
SHA2566c8d687d800176105282515c260d56bf78189951c2f46bff1f373468de546413
SHA512c9d12b5024c40bb8c243d4e978a25a27a8c218f0b85778510ec5756212d5a49d1d541bc3722f3911b809eaeb5f9fc9bb6b2fbd1448bcec74e2826e2842215c49
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0