Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 19:47
Static task
static1
Behavioral task
behavioral1
Sample
94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc.exe
Resource
win10v2004-20241007-en
General
-
Target
94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc.exe
-
Size
661KB
-
MD5
b2f4d0b5b5e1090d39a37d8efd7c0eb6
-
SHA1
c74efa3f75abf7aa1f44423e5624e84da4e5de32
-
SHA256
94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc
-
SHA512
810eb62234fb0aba0763145382c5bbe29eeb92b693230c6eff333b6956d8e952de8264df41c97fbc88d5c1e97974cfe7524977bb0d1b56e5cb8347e05aff4a10
-
SSDEEP
12288:zMrEy90ou2WwxhDlJXTc2vVunFJMSpwUQxj9OVeWh4QFJdJ6bcZy4oNruGnX9h8P:PyvpWClJXT/uB8G7ak36bcZd2tiP
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb0-12.dat healer behavioral1/memory/1388-15-0x0000000000720000-0x000000000072A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr166478.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr166478.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr166478.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr166478.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr166478.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr166478.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4032-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x000d000000023b3d-2110.dat family_redline behavioral1/memory/4840-2118-0x00000000007F0000-0x0000000000820000-memory.dmp family_redline behavioral1/files/0x0007000000023cae-2127.dat family_redline behavioral1/memory/720-2129-0x0000000000550000-0x000000000057E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ku179646.exe -
Executes dropped EXE 5 IoCs
pid Process 900 zigC3989.exe 1388 jr166478.exe 4032 ku179646.exe 4840 1.exe 720 lr238984.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr166478.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zigC3989.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 840 4032 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zigC3989.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku179646.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr238984.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1388 jr166478.exe 1388 jr166478.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1388 jr166478.exe Token: SeDebugPrivilege 4032 ku179646.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3316 wrote to memory of 900 3316 94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc.exe 87 PID 3316 wrote to memory of 900 3316 94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc.exe 87 PID 3316 wrote to memory of 900 3316 94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc.exe 87 PID 900 wrote to memory of 1388 900 zigC3989.exe 88 PID 900 wrote to memory of 1388 900 zigC3989.exe 88 PID 900 wrote to memory of 4032 900 zigC3989.exe 94 PID 900 wrote to memory of 4032 900 zigC3989.exe 94 PID 900 wrote to memory of 4032 900 zigC3989.exe 94 PID 4032 wrote to memory of 4840 4032 ku179646.exe 95 PID 4032 wrote to memory of 4840 4032 ku179646.exe 95 PID 4032 wrote to memory of 4840 4032 ku179646.exe 95 PID 3316 wrote to memory of 720 3316 94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc.exe 100 PID 3316 wrote to memory of 720 3316 94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc.exe 100 PID 3316 wrote to memory of 720 3316 94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc.exe"C:\Users\Admin\AppData\Local\Temp\94feae5e1b840118edb0bb16be769399761887bece75cec3d72e379fda52d3fc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigC3989.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigC3989.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr166478.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr166478.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku179646.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku179646.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 11884⤵
- Program crash
PID:840
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr238984.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr238984.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4032 -ip 40321⤵PID:4904
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5e008de66f131edb4806b6931966baab1
SHA1bdb65a9329feec34bc8f59ae2f13b4c9eb07fd95
SHA2566d7a99e2486e8a78e377969ac671e4c66764e945240e61a21cfea531eeb187d5
SHA512f1ba4caac8bd5c50fc499e2899a1d98b1703d3a00ddc00335f7bddc20472cc1bfe19e84ceb469f2c97173175cc3e5402c9fc5f2a68d611ed8b33ab66c6244988
-
Filesize
507KB
MD5e7e9e86b22d88dfc0c42f9f96d7b3e2d
SHA14d96f1e8e024ed4b97624a59f8ed785c9a913466
SHA2564d9b5a6554c3c0bfcdd600b7ff7a702e6d3a24ac6f91ac2ad7634d7303049c16
SHA512e9510459ec21597f47a1e5c8380f17ba0b4e0cc040163f797da06083280c601b57d3e3a5ea8611a601d375316ec38443bbed4687dc30612a1d232f210b387d8e
-
Filesize
14KB
MD5bee1f8c4dfede1b1da9ed2098e2cd467
SHA16ca9ebfb721612ce97e8bb17fd3a61c8e1ee99f4
SHA25697c5f2536eeb371d1a388327a56954f919e2d97bf9f41f171f7489ab38e979ea
SHA51212b6e60efbdc06dab738ce87646b97bb053f2b7fd7c08231a402fcce4083485804fb56cf45d242ad0426e450f4224fd00f2c376e73ccff330843913b561cadf8
-
Filesize
426KB
MD5630b35a8a1fcdc3dfe6544e5d3eca468
SHA1775ea2badf3020459ee2377286dfd7b8dcbe95ca
SHA256c8110603aa7e1b72d1e4a3ce0cae5d1455ac387e5db4263f53bf32a9cac99ef3
SHA512f8139ea5cee7cb4a0f559543d4a69b4837611d4171277b134958c4dd343d5b3301fcec0fb0096da376cea32503729828dc46f944793eb0c1562db305ab537f9e
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0