Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 13:24
Static task
static1
Behavioral task
behavioral1
Sample
baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927.exe
Resource
win10v2004-20241007-en
General
-
Target
baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927.exe
-
Size
926KB
-
MD5
f3cf278ffa35c6e51b0e0456f262bd5d
-
SHA1
ba52d58108f1b9aad7b47a56401f0aff22455543
-
SHA256
baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927
-
SHA512
a952e86b9a51163bccab10d206e8d3ce3f269fc3694b1d0b4bc427bf801200a674070921934f7597f68cf9cb3000e3219898d4c77461d9e493f2c07976504442
-
SSDEEP
12288:WMrfy90NrpsDzbShf46qZUDAKmg7jNlPU9Xi4Izpi/Jg+HOb9Jjp1c47lmCnjdvQ:1yuCDz2OG/NlPyi4IYgjP1FvnJv//el
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cd4-19.dat healer behavioral1/memory/2404-22-0x0000000000AD0000-0x0000000000ADA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it926349.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it926349.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it926349.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it926349.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it926349.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it926349.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4568-2112-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x0008000000023ccb-2117.dat family_redline behavioral1/memory/1620-2125-0x0000000000930000-0x0000000000960000-memory.dmp family_redline behavioral1/files/0x0007000000023cd2-2134.dat family_redline behavioral1/memory/5996-2136-0x00000000006E0000-0x000000000070E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation jr086413.exe -
Executes dropped EXE 6 IoCs
pid Process 2308 zicF8422.exe 2104 ziec0537.exe 2404 it926349.exe 4568 jr086413.exe 1620 1.exe 5996 kp486233.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it926349.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zicF8422.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziec0537.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3908 4568 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zicF8422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziec0537.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr086413.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp486233.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2404 it926349.exe 2404 it926349.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2404 it926349.exe Token: SeDebugPrivilege 4568 jr086413.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3968 wrote to memory of 2308 3968 baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927.exe 85 PID 3968 wrote to memory of 2308 3968 baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927.exe 85 PID 3968 wrote to memory of 2308 3968 baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927.exe 85 PID 2308 wrote to memory of 2104 2308 zicF8422.exe 87 PID 2308 wrote to memory of 2104 2308 zicF8422.exe 87 PID 2308 wrote to memory of 2104 2308 zicF8422.exe 87 PID 2104 wrote to memory of 2404 2104 ziec0537.exe 88 PID 2104 wrote to memory of 2404 2104 ziec0537.exe 88 PID 2104 wrote to memory of 4568 2104 ziec0537.exe 94 PID 2104 wrote to memory of 4568 2104 ziec0537.exe 94 PID 2104 wrote to memory of 4568 2104 ziec0537.exe 94 PID 4568 wrote to memory of 1620 4568 jr086413.exe 95 PID 4568 wrote to memory of 1620 4568 jr086413.exe 95 PID 4568 wrote to memory of 1620 4568 jr086413.exe 95 PID 2308 wrote to memory of 5996 2308 zicF8422.exe 99 PID 2308 wrote to memory of 5996 2308 zicF8422.exe 99 PID 2308 wrote to memory of 5996 2308 zicF8422.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927.exe"C:\Users\Admin\AppData\Local\Temp\baad5692d4054a4843312d3ce627a97968c8bf03550c23598a70d6767f4fd927.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicF8422.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicF8422.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziec0537.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziec0537.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it926349.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it926349.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr086413.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr086413.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 13805⤵
- Program crash
PID:3908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp486233.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp486233.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4568 -ip 45681⤵PID:2568
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
661KB
MD5cd3d7f95bb4c502001f5ccff1004127e
SHA1678dbf9d6595574316ee893119c87ea3b842c36a
SHA256b23a704ab9d9d3a9dbce3d7d3f90de05d317ca2b3c71d5d7e4448b1426af6901
SHA512201a57cea7e74e8dbf55d216160fdda0028648c76299fccc8ec90e200a19b8cdfa093daeb160edc4afc376a4f1332d478efc749d31ad9c4ae56d3196ce35b11b
-
Filesize
168KB
MD5798bb77a3962145eb0fd9da724234225
SHA1e5bbc445bdb0a7a3305fd196c3e679ef090167e9
SHA25688d715d19b86ca0130115bf9603ef0ab6e5fd585b4ce84de41ff667e1122177a
SHA512db254a8b184fde14d740ff6b298c5a7c9ee5860a71288789c6fc2970091d87a61ba358b1c185b3675931bb7a7e36d765b1acfc0d926d31cd6e722cda86835208
-
Filesize
507KB
MD549d1a5b8e213deb88f93e8fd3106e165
SHA109f0741ec6184cd3df75817e8e21c47b3792d957
SHA2560449585926ce64f2fc4386dc6d2a01779e89f171adc947364156a0649f36eb49
SHA512297a0a8faf6210c33670a6c6806854daf3f3a6353d9730ac8b2231c14b41a188aed89338beb5674ce133dc2164d6b656e5e4baf5186d4c8765905119b86afdb3
-
Filesize
15KB
MD5f75107b4fcda8baa5a5b47b32b5654ab
SHA14bf717141c26ce9e6ad4eb87e015d647af72e158
SHA25636e972c542b11af793658e73f9268cb55ddf032ee0facc345b3879f0a234e180
SHA5126adc3866b673e24b16c52ee58d6f558f8362dbc19041fa58b65a88d7b9ae95f5d41b4f0d514fab4ea7a5d3b982f9366404f30fca5a7310f0e24fb90bc734320a
-
Filesize
426KB
MD5f671e47faac0d081fd861c6ef0bbedc8
SHA145c5780c4463090faeaa03a63be3df2e9e43edf8
SHA256066668b94891e967fd1caf14121ed0427615701ca33d0ed1baf3c9889980a700
SHA512377ce18eb9050e3db19e3baf36251f53896dbf03d866023b0f83fa377ba93b16bdd6c7b78b189be3ca084c207a24cf3a22b6b2d34a532698bae36a4efd4af2c0
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0