Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 03:24
Static task
static1
Behavioral task
behavioral1
Sample
7ce1203acae42ff974616ca0a297d684ab49e37142d7eb9a19b61c385823aeda.exe
Resource
win10v2004-20241007-en
General
-
Target
7ce1203acae42ff974616ca0a297d684ab49e37142d7eb9a19b61c385823aeda.exe
-
Size
660KB
-
MD5
425f1eb08f2db23ff3a4bbbeccd7c4e2
-
SHA1
e56822318a8b046519daf094957798525b164fa5
-
SHA256
7ce1203acae42ff974616ca0a297d684ab49e37142d7eb9a19b61c385823aeda
-
SHA512
3c2dd3b9929ed2246dbd763b534cb7662dd6bdc5d3be458de04769317b813c84c1d9329d0f3ccd1c040ed39426c89a33768b8bcf1435155b46339a64db7c490d
-
SSDEEP
12288:KMryy90SeEu7sDwilng7P+cyYWkQeah+MmUoe+cPy5PfmhMPf:Ey/eT7svlng7WcyHkQeM+9Uord5XmhCf
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c96-12.dat healer behavioral1/memory/4084-15-0x0000000000C30000-0x0000000000C3A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr311857.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr311857.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr311857.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr311857.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr311857.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr311857.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4056-2105-0x0000000004C50000-0x0000000004C82000-memory.dmp family_redline behavioral1/files/0x000f000000023b64-2110.dat family_redline behavioral1/memory/1752-2118-0x0000000000ED0000-0x0000000000F00000-memory.dmp family_redline behavioral1/files/0x0007000000023c94-2128.dat family_redline behavioral1/memory/4212-2129-0x0000000000BA0000-0x0000000000BCE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation ku403540.exe -
Executes dropped EXE 5 IoCs
pid Process 4448 ziLg7100.exe 4084 jr311857.exe 4056 ku403540.exe 1752 1.exe 4212 lr953796.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr311857.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziLg7100.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7ce1203acae42ff974616ca0a297d684ab49e37142d7eb9a19b61c385823aeda.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 6116 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3968 4056 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ce1203acae42ff974616ca0a297d684ab49e37142d7eb9a19b61c385823aeda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziLg7100.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku403540.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr953796.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4084 jr311857.exe 4084 jr311857.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4084 jr311857.exe Token: SeDebugPrivilege 4056 ku403540.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1372 wrote to memory of 4448 1372 7ce1203acae42ff974616ca0a297d684ab49e37142d7eb9a19b61c385823aeda.exe 83 PID 1372 wrote to memory of 4448 1372 7ce1203acae42ff974616ca0a297d684ab49e37142d7eb9a19b61c385823aeda.exe 83 PID 1372 wrote to memory of 4448 1372 7ce1203acae42ff974616ca0a297d684ab49e37142d7eb9a19b61c385823aeda.exe 83 PID 4448 wrote to memory of 4084 4448 ziLg7100.exe 84 PID 4448 wrote to memory of 4084 4448 ziLg7100.exe 84 PID 4448 wrote to memory of 4056 4448 ziLg7100.exe 93 PID 4448 wrote to memory of 4056 4448 ziLg7100.exe 93 PID 4448 wrote to memory of 4056 4448 ziLg7100.exe 93 PID 4056 wrote to memory of 1752 4056 ku403540.exe 94 PID 4056 wrote to memory of 1752 4056 ku403540.exe 94 PID 4056 wrote to memory of 1752 4056 ku403540.exe 94 PID 1372 wrote to memory of 4212 1372 7ce1203acae42ff974616ca0a297d684ab49e37142d7eb9a19b61c385823aeda.exe 98 PID 1372 wrote to memory of 4212 1372 7ce1203acae42ff974616ca0a297d684ab49e37142d7eb9a19b61c385823aeda.exe 98 PID 1372 wrote to memory of 4212 1372 7ce1203acae42ff974616ca0a297d684ab49e37142d7eb9a19b61c385823aeda.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ce1203acae42ff974616ca0a297d684ab49e37142d7eb9a19b61c385823aeda.exe"C:\Users\Admin\AppData\Local\Temp\7ce1203acae42ff974616ca0a297d684ab49e37142d7eb9a19b61c385823aeda.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLg7100.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLg7100.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr311857.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr311857.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku403540.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku403540.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 9884⤵
- Program crash
PID:3968
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr953796.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr953796.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4212
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4056 -ip 40561⤵PID:1108
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:6116
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD57d160fd1e16f05e84181ab7a2c1b2c5b
SHA139ddb97ad098e0d14690332934a1dd687bcb8e54
SHA25614bc1b95832cbe088e17ae9d9a64b84b4faf1231eed14bfcd6abfec52384ee98
SHA512b31cc0eb3ff491d5e482a44f47e83d24dd436936201e5e18d1367fd53cbeed15bcd7df08186ecdd80e788b23a19b36433417bdf8777bd6c43b361ede89196607
-
Filesize
507KB
MD55c500328002a66ae71d469bdf3505a69
SHA1df4e46d92357dabab88ae0cea59c8186649e5b58
SHA256c5877eb9bfaf85109a9a20032c6807503242d5e853621059038ebd8c34d49ecd
SHA512b3fc7e43cf2128274ba6a5266c313a3800cf84ae134e68dec34353086226197393e7b4aac1e59ad223c92b0a5dc365407fbf3d86272ab7eba8a097320b1afadf
-
Filesize
16KB
MD50361ab6d591d178ee268e6227da76374
SHA1d458e78dddd77cd809c54ff2508b4e73eb700f9f
SHA2561d047bc46b072614b606b4881a89bca9d7e6b50bc379ec1a303946fef5ea57b0
SHA51258f821b2fb65e4f35f4639def6a56206d85212a207c16e1f383fe28a24a0af4d208a0e191b0ad96f4fa2fe07e3d83ce3726f3f02ba3de0d50fe39fd1d6a47000
-
Filesize
426KB
MD50ad0a3a1fcc107eab1f35ad4f53e4cee
SHA1dbd21bec51540e7e42149fec160ff7be012c0702
SHA256f189777a3bdef1bb67bc8f7b0133e14562e0c7ea091380a660244bb16039ce15
SHA512b79256e723d356eb9abe22a1030fd01ae87a8164d115d6b00b066e9eda055f1f9971d56525fcf77fa47789367838210b4d04e7e75afae918786f691eb73356ba
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0