Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
de4f1858fdc8ef3abd92a43b880e39c70dfc22461c56de3bfd5fa9e3dc0f510f.exe
Resource
win10v2004-20241007-en
General
-
Target
de4f1858fdc8ef3abd92a43b880e39c70dfc22461c56de3bfd5fa9e3dc0f510f.exe
-
Size
660KB
-
MD5
4aa6b289320206ec6512f2a282408fc9
-
SHA1
17e984a300ef69661a999da032dcadc403094c65
-
SHA256
de4f1858fdc8ef3abd92a43b880e39c70dfc22461c56de3bfd5fa9e3dc0f510f
-
SHA512
8c9364d557eb319e0bb2b94fbcd2a90e3170c76012ddf67dd9ced22420b72d60bea7de89a0b2dd44e4555c9710274ed7bdee6b277f509e36e8fff1f11ec661cd
-
SSDEEP
12288:KMrey908cHgZl5PVwhIwej2hhwTeP8V51h8yX1JQHnQ1qVdkWC+jdnA:oyNc2lErwW8V51h8yX7UnQ1Kdk0dA
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
dozt
77.91.124.145:4125
-
auth_value
857bdfe4fa14711025859d89f18b32cb
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0017000000023c2b-12.dat healer behavioral1/memory/2932-15-0x0000000000E70000-0x0000000000E7A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr719814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr719814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr719814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr719814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr719814.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr719814.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/212-2105-0x0000000005420000-0x0000000005452000-memory.dmp family_redline behavioral1/files/0x000e000000023af6-2110.dat family_redline behavioral1/memory/5252-2118-0x00000000005B0000-0x00000000005E0000-memory.dmp family_redline behavioral1/files/0x0008000000023c15-2127.dat family_redline behavioral1/memory/3172-2129-0x0000000000160000-0x0000000000190000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ku627454.exe -
Executes dropped EXE 5 IoCs
pid Process 1388 zitH6739.exe 2932 jr719814.exe 212 ku627454.exe 5252 1.exe 3172 lr910275.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr719814.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" de4f1858fdc8ef3abd92a43b880e39c70dfc22461c56de3bfd5fa9e3dc0f510f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zitH6739.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1048 212 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zitH6739.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku627454.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr910275.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de4f1858fdc8ef3abd92a43b880e39c70dfc22461c56de3bfd5fa9e3dc0f510f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2932 jr719814.exe 2932 jr719814.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2932 jr719814.exe Token: SeDebugPrivilege 212 ku627454.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1388 2992 de4f1858fdc8ef3abd92a43b880e39c70dfc22461c56de3bfd5fa9e3dc0f510f.exe 83 PID 2992 wrote to memory of 1388 2992 de4f1858fdc8ef3abd92a43b880e39c70dfc22461c56de3bfd5fa9e3dc0f510f.exe 83 PID 2992 wrote to memory of 1388 2992 de4f1858fdc8ef3abd92a43b880e39c70dfc22461c56de3bfd5fa9e3dc0f510f.exe 83 PID 1388 wrote to memory of 2932 1388 zitH6739.exe 84 PID 1388 wrote to memory of 2932 1388 zitH6739.exe 84 PID 1388 wrote to memory of 212 1388 zitH6739.exe 95 PID 1388 wrote to memory of 212 1388 zitH6739.exe 95 PID 1388 wrote to memory of 212 1388 zitH6739.exe 95 PID 212 wrote to memory of 5252 212 ku627454.exe 96 PID 212 wrote to memory of 5252 212 ku627454.exe 96 PID 212 wrote to memory of 5252 212 ku627454.exe 96 PID 2992 wrote to memory of 3172 2992 de4f1858fdc8ef3abd92a43b880e39c70dfc22461c56de3bfd5fa9e3dc0f510f.exe 101 PID 2992 wrote to memory of 3172 2992 de4f1858fdc8ef3abd92a43b880e39c70dfc22461c56de3bfd5fa9e3dc0f510f.exe 101 PID 2992 wrote to memory of 3172 2992 de4f1858fdc8ef3abd92a43b880e39c70dfc22461c56de3bfd5fa9e3dc0f510f.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\de4f1858fdc8ef3abd92a43b880e39c70dfc22461c56de3bfd5fa9e3dc0f510f.exe"C:\Users\Admin\AppData\Local\Temp\de4f1858fdc8ef3abd92a43b880e39c70dfc22461c56de3bfd5fa9e3dc0f510f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitH6739.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitH6739.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr719814.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr719814.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku627454.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku627454.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 13844⤵
- Program crash
PID:1048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr910275.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr910275.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3172
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 212 -ip 2121⤵PID:4428
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5b5cc1b6f15bf590c184f331aee61d36d
SHA1ffe19b7aaddacc1609e0e69d3fd1ec8c48f94d18
SHA256571adf8b286b61e981a23e46c9fae5d677ece94d58dbe488bb101f36e23359c8
SHA512defa1698559ab66cd11e550d9e392cf8988cb7862f60ff9913f97223bd9f87e7cdd24b42f85568f7d94775690049710383267403eefcebd0e86e82c50c331b58
-
Filesize
506KB
MD5909ca9d23c65e7dc4497695b909f2118
SHA10eba79e6d40e2f64ba88a92aa26f799bbe1058fd
SHA2566d92095ccfd7f03aefbecd6c29aae130b38c088fc490fef17c7f7f17a363839d
SHA512eb53ef88da6ddcc1420a3ef9e9906fc2cde375894a825904a7550046c5ea6df871c3fbc29f4337e3dde0f79fe3ab43df04a28e11c985ca169091fa4ecc6280af
-
Filesize
13KB
MD5a93b11c93ac15c3d4394427295ddb6ce
SHA171ba00c1f0ca56eb02361ef02c047a13910c9245
SHA2568e2a36f8635f6aff714ffb53dfba8b7a2280ab425bca95bae9c4d44fa606cb5b
SHA5122b83e33aa19a94090e6555200b936d185842041e91011aa44ab188cb443c808f3d5176ace70b00d4bee73d2b4e2ac3b17332bc5ffba5e2617e7ab1630c15c0e2
-
Filesize
426KB
MD5893182dec92252eb437f8f843dc8f466
SHA156da1a5835e46e80b5f5c587f356696363e08994
SHA25669978d848fc096bd342347e9ffac2684451f6da15538951ddf0b82850511dd8f
SHA512571318e1b8fce77ee271523038e7b5401e924ad888564bf1db1c299d75d1f6488bbef580393a64658294781e24d601de0baacf09e61029f70a0f024f99a668c6
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0