Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f.exe
Resource
win10v2004-20241007-en
General
-
Target
3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f.exe
-
Size
650KB
-
MD5
3f1c0a4f3be23aa4e95025ad3cca0a83
-
SHA1
3ce9704f135bd2abef5b334580a5006c8f0b1adb
-
SHA256
3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f
-
SHA512
4018d68eea1e2d8400361493e21f8f5799ad198b1fb8f40bafd9bc08af8ae11e3ff7de87bbfba6da1115f3ce7685e2c54b841b59bd5d32ef1912e912702fd995
-
SSDEEP
12288:/Mruy90COcq6aLKb9nVppEqE+YP7d07ZDmtZBlEv8Q4sJtkm:hynCL2EqE+YPSxmvsUfsrkm
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b9d-13.dat healer behavioral1/memory/2240-15-0x0000000000170000-0x000000000017A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr100538.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr100538.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr100538.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr100538.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr100538.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr100538.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1308-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x0008000000022719-2110.dat family_redline behavioral1/memory/5316-2118-0x0000000000F50000-0x0000000000F80000-memory.dmp family_redline behavioral1/files/0x000a000000023b9b-2127.dat family_redline behavioral1/memory/2292-2129-0x0000000000EA0000-0x0000000000ECE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ku125119.exe -
Executes dropped EXE 5 IoCs
pid Process 3768 zizV8803.exe 2240 jr100538.exe 1308 ku125119.exe 5316 1.exe 2292 lr834790.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr100538.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zizV8803.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2952 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6136 1308 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zizV8803.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku125119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr834790.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2240 jr100538.exe 2240 jr100538.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2240 jr100538.exe Token: SeDebugPrivilege 1308 ku125119.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4680 wrote to memory of 3768 4680 3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f.exe 84 PID 4680 wrote to memory of 3768 4680 3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f.exe 84 PID 4680 wrote to memory of 3768 4680 3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f.exe 84 PID 3768 wrote to memory of 2240 3768 zizV8803.exe 85 PID 3768 wrote to memory of 2240 3768 zizV8803.exe 85 PID 3768 wrote to memory of 1308 3768 zizV8803.exe 96 PID 3768 wrote to memory of 1308 3768 zizV8803.exe 96 PID 3768 wrote to memory of 1308 3768 zizV8803.exe 96 PID 1308 wrote to memory of 5316 1308 ku125119.exe 97 PID 1308 wrote to memory of 5316 1308 ku125119.exe 97 PID 1308 wrote to memory of 5316 1308 ku125119.exe 97 PID 4680 wrote to memory of 2292 4680 3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f.exe 102 PID 4680 wrote to memory of 2292 4680 3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f.exe 102 PID 4680 wrote to memory of 2292 4680 3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f.exe"C:\Users\Admin\AppData\Local\Temp\3970d830c60d06255b3a7a0580f18a0f6c85c12874829dc24c686996b294475f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizV8803.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizV8803.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr100538.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr100538.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku125119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku125119.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 13804⤵
- Program crash
PID:6136
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr834790.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr834790.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2292
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1308 -ip 13081⤵PID:5900
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2952
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD57d70ea85bf144baf0a60ed85240b7177
SHA1a885c342fb858acbc96bd9569cf5c1aac3860163
SHA2562fb69b683805ca3757face7338abb2269818bb36b91454a72b2bef55ab598b1d
SHA512092518f3faccae1afa95eafce7879bca36156aba4447f0c05830183056c237f79cb3706671f4b36562ecc287e51c954d8efce645db53bcaae6e9f0ef1d3b10b0
-
Filesize
496KB
MD5186531f39047b233177458a75ba7f0da
SHA127face9d8c164c44c9cff842d15715608ea8d146
SHA256b215b555b14c46b491e850178a349150e3ba2db6f73c98a92a44f0fe04d5ab59
SHA512bd31359b7a7ee80a974191d56ddaa46989cab0dc32a91e51b50464ba1092ab121cb50b5caa784ed683811d57694f9014cffcb161e5944d7fa9e5d9518caf7bb9
-
Filesize
11KB
MD5f53dad119013acb06f4fd3e93a724065
SHA1f22fa1aacedb1d95a7c56b4d570b3a7a88b9f1bf
SHA2564da084c70aac2e578fa72442175d8bcfe21e1fc04446922958c809fd783de34b
SHA512f1b3e9229265d5b0383474a1e2d07c3caee0644ed2e7c44e97637b5a4f4313dd919a175d64b5855a0fb9785f35c68ec610295168250045b6427d45670aee0225
-
Filesize
414KB
MD525914ea6d815cba0994413bad6239d5f
SHA1b293b82434447ada3ea556a4b6a7cca5aeb1bda3
SHA256bb82f2df76f44af1c7e0d8b7d0e26bb380d78548d2c694f9c869afa68e45bf25
SHA51273ed3cb56be9e3f39a98d870ca616dd824a970c5a89d62ea1e953d420bbedb63ebc4fc46fc5214bf728d47f254676292313f16a50c47920272f2c925993e0262
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0