Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 21:50
Static task
static1
Behavioral task
behavioral1
Sample
f2387c0a6117ae237876eb8292b9670fb86dff7235789bd36f81179b6a2cbb66.exe
Resource
win10v2004-20241007-en
General
-
Target
f2387c0a6117ae237876eb8292b9670fb86dff7235789bd36f81179b6a2cbb66.exe
-
Size
661KB
-
MD5
0278835b92e523f0836af6234dc559c2
-
SHA1
f64b5f6fd33ca11509cedb7b1754a2ff0b6e26b9
-
SHA256
f2387c0a6117ae237876eb8292b9670fb86dff7235789bd36f81179b6a2cbb66
-
SHA512
bc79900647414a462be8a4534be6f1d55b58c47e983c8813ab3819f67de0dec24b4152eeae043598b5831e7dcdc3fc8a71738b25e1b6e2b83896add43b1a6d7d
-
SSDEEP
12288:sMrsy90K2puSKXglWegswRYlJ92Fn4IKpiiJGSl5MqWaoTXT2:Yy+pRrlTtlJYn4IMGw6qWhT2
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c94-12.dat healer behavioral1/memory/5032-15-0x00000000001E0000-0x00000000001EA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr475960.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr475960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr475960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr475960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr475960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr475960.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/700-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x000c000000023b47-2110.dat family_redline behavioral1/memory/4728-2118-0x0000000000530000-0x0000000000560000-memory.dmp family_redline behavioral1/files/0x0007000000023c92-2127.dat family_redline behavioral1/memory/4124-2129-0x0000000000040000-0x000000000006E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ku838833.exe -
Executes dropped EXE 5 IoCs
pid Process 644 ziVN7145.exe 5032 jr475960.exe 700 ku838833.exe 4728 1.exe 4124 lr490801.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr475960.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f2387c0a6117ae237876eb8292b9670fb86dff7235789bd36f81179b6a2cbb66.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVN7145.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5576 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 656 700 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr490801.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2387c0a6117ae237876eb8292b9670fb86dff7235789bd36f81179b6a2cbb66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziVN7145.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku838833.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5032 jr475960.exe 5032 jr475960.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5032 jr475960.exe Token: SeDebugPrivilege 700 ku838833.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4088 wrote to memory of 644 4088 f2387c0a6117ae237876eb8292b9670fb86dff7235789bd36f81179b6a2cbb66.exe 83 PID 4088 wrote to memory of 644 4088 f2387c0a6117ae237876eb8292b9670fb86dff7235789bd36f81179b6a2cbb66.exe 83 PID 4088 wrote to memory of 644 4088 f2387c0a6117ae237876eb8292b9670fb86dff7235789bd36f81179b6a2cbb66.exe 83 PID 644 wrote to memory of 5032 644 ziVN7145.exe 84 PID 644 wrote to memory of 5032 644 ziVN7145.exe 84 PID 644 wrote to memory of 700 644 ziVN7145.exe 95 PID 644 wrote to memory of 700 644 ziVN7145.exe 95 PID 644 wrote to memory of 700 644 ziVN7145.exe 95 PID 700 wrote to memory of 4728 700 ku838833.exe 96 PID 700 wrote to memory of 4728 700 ku838833.exe 96 PID 700 wrote to memory of 4728 700 ku838833.exe 96 PID 4088 wrote to memory of 4124 4088 f2387c0a6117ae237876eb8292b9670fb86dff7235789bd36f81179b6a2cbb66.exe 101 PID 4088 wrote to memory of 4124 4088 f2387c0a6117ae237876eb8292b9670fb86dff7235789bd36f81179b6a2cbb66.exe 101 PID 4088 wrote to memory of 4124 4088 f2387c0a6117ae237876eb8292b9670fb86dff7235789bd36f81179b6a2cbb66.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2387c0a6117ae237876eb8292b9670fb86dff7235789bd36f81179b6a2cbb66.exe"C:\Users\Admin\AppData\Local\Temp\f2387c0a6117ae237876eb8292b9670fb86dff7235789bd36f81179b6a2cbb66.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVN7145.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVN7145.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr475960.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr475960.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5032
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku838833.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku838833.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4728
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 700 -s 14644⤵
- Program crash
PID:656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr490801.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr490801.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 700 -ip 7001⤵PID:4948
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5576
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5430506f18d6d188c26c67ec18488b354
SHA1ea67ee21b5dd0d285bcc1adae90ca9d16aacc128
SHA256116a6d2a2081c9c5f69604994a8309081ca2a81a9441b88997f67d7bd0eaa381
SHA5127c2f3bed3398ab0f8d85dcec8f09bc61738009aade626828f2e90806a646fd4a36e986d10d15e6817711aa4331aa47329a67d2a02d8106eaf8df0a706516b195
-
Filesize
507KB
MD5cc3e91087b30eb1539256eace4ee8778
SHA1a0d82e1be31e2a8a7a5512551030bc7f475239a0
SHA2566ddaba5a53f80d2d0487d529661eac9380bff6bfb2e6dd43fb85ac2337e2787e
SHA5121cdfb014e1e74b4623baca253976dddb6daa091c6d8ae9510b5d2824b52cf8f9b34a2dbabf3472b12719c0d4691d84bb9f4e101a2f939ecbf9b9fabb423c98e8
-
Filesize
15KB
MD536cf41440d8ce602349f8b9d79c62110
SHA1ad37909438feac96f44accbdbf715f83fb263acf
SHA25666565657043ebbc961974fa402117e8cfb8e67b56d4efdd80085a05f3568c288
SHA5125ae75e9022027d710a4a0bab13ac77087e956fa73f1731340fdd9b75bc8afb19f24722127f8bc59bb7a0ab19dc7b4a4716788181071c1fb47c360b96a0d7f528
-
Filesize
426KB
MD5933d327d4e3f2e4d69c960238853a51f
SHA1f08974ba6ab75b63edfde419c50802dd10263950
SHA256cbb0d3a5a9bd52a6cfd679c9bf35a8214f62393382501154b9cc7fe8be381df7
SHA51240a3a4410d660725a90f981253371f4e269ce29dca1bddd7ca5e1ca5630d1ebf177f042c625522d12abe595a86506828d6709794162b0d0f34a002de36589c47
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0