Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 03:36
Static task
static1
Behavioral task
behavioral1
Sample
372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee.exe
Resource
win10v2004-20241007-en
General
-
Target
372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee.exe
-
Size
660KB
-
MD5
6397dc4c8cf60c893c2b0b3db01db72a
-
SHA1
2a48640b3eb35af2a5757793937fb487bd6a6e5f
-
SHA256
372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee
-
SHA512
7a482937070a0896f4ce2277995f98e31a1c6aea00306661c6cf6cd5f130d6ec089adbc7a1f85f54c2bad57bdfbb92c32af3f556d101fc434193da07fcb1b229
-
SSDEEP
12288:dMrky9097j1IDt9/FpE/RPTecl/+MMCWyqbET8zxCpriJ3lT:NycsvbUx8VTyuCa
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b99-12.dat healer behavioral1/memory/1452-15-0x0000000000E80000-0x0000000000E8A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr219281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr219281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr219281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr219281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr219281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr219281.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2692-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x000d000000023ab7-2110.dat family_redline behavioral1/memory/5216-2118-0x0000000000CE0000-0x0000000000D10000-memory.dmp family_redline behavioral1/files/0x000a000000023b97-2127.dat family_redline behavioral1/memory/4412-2129-0x0000000000BB0000-0x0000000000BDE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation ku919026.exe -
Executes dropped EXE 5 IoCs
pid Process 2020 ziLG1883.exe 1452 jr219281.exe 2692 ku919026.exe 5216 1.exe 4412 lr352888.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr219281.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziLG1883.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4868 2692 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr352888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziLG1883.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku919026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1452 jr219281.exe 1452 jr219281.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1452 jr219281.exe Token: SeDebugPrivilege 2692 ku919026.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2020 2116 372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee.exe 83 PID 2116 wrote to memory of 2020 2116 372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee.exe 83 PID 2116 wrote to memory of 2020 2116 372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee.exe 83 PID 2020 wrote to memory of 1452 2020 ziLG1883.exe 84 PID 2020 wrote to memory of 1452 2020 ziLG1883.exe 84 PID 2020 wrote to memory of 2692 2020 ziLG1883.exe 92 PID 2020 wrote to memory of 2692 2020 ziLG1883.exe 92 PID 2020 wrote to memory of 2692 2020 ziLG1883.exe 92 PID 2692 wrote to memory of 5216 2692 ku919026.exe 93 PID 2692 wrote to memory of 5216 2692 ku919026.exe 93 PID 2692 wrote to memory of 5216 2692 ku919026.exe 93 PID 2116 wrote to memory of 4412 2116 372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee.exe 97 PID 2116 wrote to memory of 4412 2116 372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee.exe 97 PID 2116 wrote to memory of 4412 2116 372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee.exe"C:\Users\Admin\AppData\Local\Temp\372eeb13046cef20e7789cec3e9df2b425d5b7dfe52d84571ca0c79b8edf0eee.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLG1883.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLG1883.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr219281.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr219281.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku919026.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku919026.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 9924⤵
- Program crash
PID:4868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr352888.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr352888.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4412
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2692 -ip 26921⤵PID:856
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a6baef5eb33b48f89cb56a5b6c54b48f
SHA1e44f6bb779e04062b72001b7be64fa8ff22cd89c
SHA2561456b24815ea701e50ef0c336b7587bd26a0704e58cbf645548723df5dff872f
SHA512b33afab6ed8f867772e965350ce6b3d05923af1c3253d7d1424389b6cfbdc25aa7b210ee25ff4b355f6c57e341d8a6c844ce83ed3860d69ffca6047cc900ac4f
-
Filesize
506KB
MD596c0c448a8d42c9227d3cce9957c8865
SHA11f9dc3f38dbae1224813d1bf94f1cd0d5108910f
SHA256fba1d029ee947cb0a3268bec63ac38e917ee84a22915bdcc50ec73f641211206
SHA5122cd5e7703c1c1eaad41310f9941d16537140030c1c9fdb3ea1863904d1c5c8c13390d6bd6ca2aecfe6a9b002637af59083f507545dbea4471d39c657893f1b64
-
Filesize
14KB
MD5f457cfe4065b23f58d0f7fb6798ba375
SHA19854143e2e10b8fa1457ef2c6c8816c69b84d0a1
SHA256f98799b33cd0356743c9ca746b782b36cdf4bda86c77b2af486c0f0e0599a851
SHA51220207849342b215a1a7b16f2b5236562cfe43d313a6f31093d96e2f852a33cfa9a8f1746ada9d718eda92dd38c1b511fbcffcc77df40f536eb5b76f17a0a3b33
-
Filesize
426KB
MD587a5be06f8b35534b67023088fb6208a
SHA1994a125ed40d44c7f32b83232fbc8fc80c57c30d
SHA256026c1e763411d705b634c1d93cfc62a029075acf93f1ce7b5b6ce3564068345e
SHA5123e253496baf212232f45d6567c510e72679646e96718e2d9237f2090aa5779ecdffde54177d3512f8cb093d51b702d88d6a8f4f88b64dc769da83e885de1a329
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0