Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 01:49
Static task
static1
Behavioral task
behavioral1
Sample
0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215.exe
Resource
win10v2004-20241007-en
General
-
Target
0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215.exe
-
Size
660KB
-
MD5
b690c129436c5053f3386213a8cf113d
-
SHA1
b70f2fcecd46e9d0e00042b094bad798bf63c9b2
-
SHA256
0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215
-
SHA512
b6a8f90ba56fb341a924ebf5d3f5f7b7707212470d9dc2b748bfd30114d9e5483288cc1c60f4bb6660890f48d347b2df6ac20210625558ac89e5603f8be13797
-
SSDEEP
12288:KMrGy90cxwV8CuMwrEF22kAu/vPTecw5f+1CnyqbGT8nMZBaX8tCobD:YyrIDuMwk6/nYKayvXD
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c7a-12.dat healer behavioral1/memory/224-15-0x00000000007A0000-0x00000000007AA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr075605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr075605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr075605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr075605.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr075605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr075605.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/924-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x0008000000023c75-2110.dat family_redline behavioral1/memory/1920-2118-0x0000000000210000-0x0000000000240000-memory.dmp family_redline behavioral1/files/0x0007000000023c78-2127.dat family_redline behavioral1/memory/1416-2129-0x0000000000900000-0x000000000092E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ku358389.exe -
Executes dropped EXE 5 IoCs
pid Process 3088 zirp6382.exe 224 jr075605.exe 924 ku358389.exe 1920 1.exe 1416 lr398063.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr075605.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zirp6382.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4436 924 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr398063.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zirp6382.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku358389.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 224 jr075605.exe 224 jr075605.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 224 jr075605.exe Token: SeDebugPrivilege 924 ku358389.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5072 wrote to memory of 3088 5072 0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215.exe 86 PID 5072 wrote to memory of 3088 5072 0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215.exe 86 PID 5072 wrote to memory of 3088 5072 0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215.exe 86 PID 3088 wrote to memory of 224 3088 zirp6382.exe 87 PID 3088 wrote to memory of 224 3088 zirp6382.exe 87 PID 3088 wrote to memory of 924 3088 zirp6382.exe 95 PID 3088 wrote to memory of 924 3088 zirp6382.exe 95 PID 3088 wrote to memory of 924 3088 zirp6382.exe 95 PID 924 wrote to memory of 1920 924 ku358389.exe 96 PID 924 wrote to memory of 1920 924 ku358389.exe 96 PID 924 wrote to memory of 1920 924 ku358389.exe 96 PID 5072 wrote to memory of 1416 5072 0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215.exe 101 PID 5072 wrote to memory of 1416 5072 0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215.exe 101 PID 5072 wrote to memory of 1416 5072 0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215.exe"C:\Users\Admin\AppData\Local\Temp\0f5df33e1fb1092f6aa4808a361d6197c63f4522c0e59e1c9fa75debefcee215.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirp6382.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirp6382.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr075605.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr075605.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku358389.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku358389.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 924 -s 13684⤵
- Program crash
PID:4436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr398063.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr398063.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 924 -ip 9241⤵PID:4312
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5bbc1b5fc3e41b7e26444081b039a2015
SHA1747a36d5d2928a9974928dc38f0bfb0f58f11456
SHA2561c5995ac91ce85415d6449f2a2e22282afa4ccf3ec910012b4b2c84e63182092
SHA5123ea492647a7a9455ca9df1ca2f7b52e83061b1fd90a9c017f70731793a2f9d69e9f4b6d8e885c56ec1b7a9781c3f45174603dda5a789326ea3faf8edc71d21f9
-
Filesize
507KB
MD55921ec2912093cca9bb3a52e61468370
SHA1fa9d0ee686078e0cb80f7c20911199d755e701eb
SHA2567625912ecd831d3bb8a486c386562ca7fad1e3fc029d7270eeb125b6ac15c806
SHA5128d6e65b559a8fb61cefef9932a0b10585ad201ca0440db03217b73d5081c00e48e74f7396fc9623350d82d53b75d219070d71d1b30bb3b94eb00fcfb73c8f980
-
Filesize
14KB
MD5b01107f8699a646b7884f03c7c19e752
SHA17590d4d83273412783bb8335c07e1099cdd67f5a
SHA25615c61dc6a356bb90cb7e1697e02dc5973ffc093113e7da9f50a39067d73be99d
SHA512dd2339d51bdcf40bb0e4a7463a50634eacbd24f6f4765c6d006c2fae2dbb63606f519b7b56ad4d52ce898ba7eac5caae3b57055c3fd3035bb2742dacdce00752
-
Filesize
426KB
MD5446163b11e008644e5b46df7f3532a3c
SHA15531f9c1144160384bcab00c798cff9165e2273c
SHA256ba8f833715b3f75b712816cc50cac97c3ff00d530ae8f84be511545d323f6696
SHA51244971600dd83a917bb6519750a6002f11ce5ff1086ebad398bb1454b69b762dfbf3d5b98eb0c80a52ad955862ff106833825b8ed966683b0245a89073c5bacd6
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0