Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
905362e49129dcc4aae95252d47cecd56df17a6027c9aed8563d651072075721.exe
Resource
win10v2004-20241007-en
General
-
Target
905362e49129dcc4aae95252d47cecd56df17a6027c9aed8563d651072075721.exe
-
Size
650KB
-
MD5
441d0acd89b784f8b7d6d0d88cbea44d
-
SHA1
baa12f76b0c1d2e54f09f9945399a9684e1dad35
-
SHA256
905362e49129dcc4aae95252d47cecd56df17a6027c9aed8563d651072075721
-
SHA512
f077cd148cff7fdec8e3ebfc99ce59c81da97dcc94a35477f26e39712a467cc7b776399151cf6c0b7166023d3646122f4818ec20fbf9356b20b32f34c03ce98c
-
SSDEEP
12288:kMrZy907Hrjgk1vFZ97rxv+4A7v/7qxmRZwlkv8MD4iPLDHk:dyqrjF1NZBxv+4ADUmTRUMD4iDDE
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca2-12.dat healer behavioral1/memory/4004-15-0x0000000000D80000-0x0000000000D8A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr570694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr570694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr570694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr570694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr570694.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr570694.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4316-2105-0x0000000005410000-0x0000000005442000-memory.dmp family_redline behavioral1/files/0x0008000000022719-2110.dat family_redline behavioral1/memory/640-2118-0x0000000000630000-0x0000000000660000-memory.dmp family_redline behavioral1/files/0x0007000000023ca0-2127.dat family_redline behavioral1/memory/1592-2129-0x00000000003B0000-0x00000000003DE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ku641706.exe -
Executes dropped EXE 5 IoCs
pid Process 3556 ziLu1025.exe 4004 jr570694.exe 4316 ku641706.exe 640 1.exe 1592 lr875526.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr570694.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 905362e49129dcc4aae95252d47cecd56df17a6027c9aed8563d651072075721.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziLu1025.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2056 4316 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku641706.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr875526.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 905362e49129dcc4aae95252d47cecd56df17a6027c9aed8563d651072075721.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziLu1025.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4004 jr570694.exe 4004 jr570694.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4004 jr570694.exe Token: SeDebugPrivilege 4316 ku641706.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4500 wrote to memory of 3556 4500 905362e49129dcc4aae95252d47cecd56df17a6027c9aed8563d651072075721.exe 83 PID 4500 wrote to memory of 3556 4500 905362e49129dcc4aae95252d47cecd56df17a6027c9aed8563d651072075721.exe 83 PID 4500 wrote to memory of 3556 4500 905362e49129dcc4aae95252d47cecd56df17a6027c9aed8563d651072075721.exe 83 PID 3556 wrote to memory of 4004 3556 ziLu1025.exe 84 PID 3556 wrote to memory of 4004 3556 ziLu1025.exe 84 PID 3556 wrote to memory of 4316 3556 ziLu1025.exe 95 PID 3556 wrote to memory of 4316 3556 ziLu1025.exe 95 PID 3556 wrote to memory of 4316 3556 ziLu1025.exe 95 PID 4316 wrote to memory of 640 4316 ku641706.exe 96 PID 4316 wrote to memory of 640 4316 ku641706.exe 96 PID 4316 wrote to memory of 640 4316 ku641706.exe 96 PID 4500 wrote to memory of 1592 4500 905362e49129dcc4aae95252d47cecd56df17a6027c9aed8563d651072075721.exe 101 PID 4500 wrote to memory of 1592 4500 905362e49129dcc4aae95252d47cecd56df17a6027c9aed8563d651072075721.exe 101 PID 4500 wrote to memory of 1592 4500 905362e49129dcc4aae95252d47cecd56df17a6027c9aed8563d651072075721.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\905362e49129dcc4aae95252d47cecd56df17a6027c9aed8563d651072075721.exe"C:\Users\Admin\AppData\Local\Temp\905362e49129dcc4aae95252d47cecd56df17a6027c9aed8563d651072075721.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLu1025.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLu1025.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr570694.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr570694.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku641706.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku641706.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4316 -s 13724⤵
- Program crash
PID:2056
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr875526.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr875526.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4316 -ip 43161⤵PID:4780
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5827d9dc7141f079175897aaa3ed4888b
SHA1ee8e0a9aeaba066cdb97ed83dfa58e335fc7f3ce
SHA256abc4a7f0009876f31c45b9c95a4b2f20400f57d87d22e94d6e2e9b411b50d1fe
SHA51259ccb4a813d009ea2541c02dbd8a059a040fa97cea59e7c8edb94c09695d9456321f3e72e2b789715b42b56e9a27d67ba96690da74b05b0024531c01d69f29c3
-
Filesize
496KB
MD5ae55e034cb9e71868cfe7af5c8324ad1
SHA1602295fb8030f7b8df844317a3017c1a1b55896d
SHA2564bbe5541b509e628d89a97cb25365ec0ce86615a9d701e6783e1ee4cab3ef3d2
SHA512ba8e4245a78e22b0ec06a1f6ef9af663350026fcbd30f1413c62c47e7871e4edd67feef67a0405e7834213c78acadab937d11639c17e7d067feab77a6c3f338f
-
Filesize
11KB
MD5b77c61a2115fcb003fa9e4e0d9115a18
SHA1c338f5492f7fb20d0a2f459c0878e931fd686262
SHA2568aa50884e3ea612f2d6b310e6a62120229e3c1cbcccf7fa963d1deeb5de7c190
SHA512597fccad38a4948c6df809198b310c65a685c899e2b1ae5bc3badc584118dca1db9069999ef9bae901c6c4552bdc17566cf5e5507bfc3ee767bfdfe5f211cdb8
-
Filesize
414KB
MD583d20e805e574dc14494a55f4bfc5598
SHA187405e922425a0c31087fff42b0a9ee3f4dc06ba
SHA256b6ef0f9d9eb20f778d8127eb82d3674ed372e705837f2385f2de4900054e77bb
SHA51238269b9ae90561a6485a0bf7ebe83e24bda212eadd16c8448d77fe39566278f20e0943024f908499206526f4b14d9c78d8ad5370780c74ee38387514a3eb62d8
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0