Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-11-2024 21:18
Static task
static1
Behavioral task
behavioral1
Sample
2224aba318609ab328dda1f4296d00e2bec1e70e535e83248250970b7abbf46c.exe
Resource
win10v2004-20241007-en
General
-
Target
2224aba318609ab328dda1f4296d00e2bec1e70e535e83248250970b7abbf46c.exe
-
Size
924KB
-
MD5
dac65508688d627ef98f1183274b0675
-
SHA1
31c09c2d2db4e148cd89675dd24afec0d4361842
-
SHA256
2224aba318609ab328dda1f4296d00e2bec1e70e535e83248250970b7abbf46c
-
SHA512
e4fb8ac614231a4ae2936cdafa9f7e6a3c765aa6a9d1a55e4297a69124be2bef3f15ecf9cd75306384a6560e1b0be32d5034af5365e84a3d82049d07db7b4a6d
-
SSDEEP
12288:sMrOy90IFtlDbzJg6jK/uVI5YZPdcz9xBud2Alqr/kNhE3jIT8LAFCPbYzxbqN3o:ayPtl9gsVVaohIZ3bYCTRCJalMZ55
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b8f-19.dat healer behavioral1/memory/2108-22-0x00000000000B0000-0x00000000000BA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it047433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it047433.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it047433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it047433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it047433.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it047433.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4588-2112-0x0000000004DC0000-0x0000000004DF2000-memory.dmp family_redline behavioral1/files/0x000a000000023b94-2117.dat family_redline behavioral1/memory/6704-2125-0x0000000000A00000-0x0000000000A30000-memory.dmp family_redline behavioral1/files/0x000a000000023b8d-2134.dat family_redline behavioral1/memory/7004-2136-0x0000000000CA0000-0x0000000000CCE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation jr150151.exe -
Executes dropped EXE 6 IoCs
pid Process 3972 zipO5264.exe 4432 zinb3761.exe 2108 it047433.exe 4588 jr150151.exe 6704 1.exe 7004 kp294590.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it047433.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" zinb3761.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2224aba318609ab328dda1f4296d00e2bec1e70e535e83248250970b7abbf46c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipO5264.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6904 4588 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zinb3761.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr150151.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp294590.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2224aba318609ab328dda1f4296d00e2bec1e70e535e83248250970b7abbf46c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zipO5264.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2108 it047433.exe 2108 it047433.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2108 it047433.exe Token: SeDebugPrivilege 4588 jr150151.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 540 wrote to memory of 3972 540 2224aba318609ab328dda1f4296d00e2bec1e70e535e83248250970b7abbf46c.exe 83 PID 540 wrote to memory of 3972 540 2224aba318609ab328dda1f4296d00e2bec1e70e535e83248250970b7abbf46c.exe 83 PID 540 wrote to memory of 3972 540 2224aba318609ab328dda1f4296d00e2bec1e70e535e83248250970b7abbf46c.exe 83 PID 3972 wrote to memory of 4432 3972 zipO5264.exe 85 PID 3972 wrote to memory of 4432 3972 zipO5264.exe 85 PID 3972 wrote to memory of 4432 3972 zipO5264.exe 85 PID 4432 wrote to memory of 2108 4432 zinb3761.exe 87 PID 4432 wrote to memory of 2108 4432 zinb3761.exe 87 PID 4432 wrote to memory of 4588 4432 zinb3761.exe 95 PID 4432 wrote to memory of 4588 4432 zinb3761.exe 95 PID 4432 wrote to memory of 4588 4432 zinb3761.exe 95 PID 4588 wrote to memory of 6704 4588 jr150151.exe 98 PID 4588 wrote to memory of 6704 4588 jr150151.exe 98 PID 4588 wrote to memory of 6704 4588 jr150151.exe 98 PID 3972 wrote to memory of 7004 3972 zipO5264.exe 102 PID 3972 wrote to memory of 7004 3972 zipO5264.exe 102 PID 3972 wrote to memory of 7004 3972 zipO5264.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2224aba318609ab328dda1f4296d00e2bec1e70e535e83248250970b7abbf46c.exe"C:\Users\Admin\AppData\Local\Temp\2224aba318609ab328dda1f4296d00e2bec1e70e535e83248250970b7abbf46c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipO5264.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipO5264.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zinb3761.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\zinb3761.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it047433.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it047433.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr150151.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr150151.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6704
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 15325⤵
- Program crash
PID:6904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp294590.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\kp294590.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:7004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4588 -ip 45881⤵PID:6852
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
660KB
MD5ba8ecc2becef4877bf8abcf98a96c570
SHA188a3ceab848152380fcee22648961717ba2a00c9
SHA25674c95812f0733ba30c88c58000a59bcbc8f27d2200b3536ea586ca52d1a23cbf
SHA512b2b1937c1789586453845ee032357e10c5e036e438a251aa149a9333329f0619e5ec2bda3a1a603d004c7ab246387c3de5ba68ab7f379f1f40931a49031f102d
-
Filesize
169KB
MD54dcd5cda15216f2cbeb7d34e4714145a
SHA1376be95b53186349bf870a90bea2fb0f84ab2310
SHA2564851391200a5bf71eb1cbc9d0cf51a90aa3a6fc681894e7fbe96d10d62400de8
SHA512657a5fe15823de92d62a81546480ef666939768a0299de0695ad21295684bb5abf85d38c1e49fea3ae097d46bab61a59c3dd80dd45c798494f8c576720b84bb1
-
Filesize
507KB
MD5554fae1dca86730ec139439aa2527e4a
SHA13482ef4cdd963c4a95d68e3aea92d34811714f1c
SHA256903788516990891d5fe6614066a12046b633acb976b050f288df8b6997c398ef
SHA512a3ed0d5221becf064f99132492ff78832731b84c226da5f3773b49e2510cea50cbbec8f6839b79decfec781a5dd4a74f97b4ca72057893db9a233cf6004c391c
-
Filesize
15KB
MD5d870fe58b56b4c0264f0125e9a5a94ca
SHA19334471e53e903ec9a53727c36ba7fd43b637f00
SHA256701f4a43d54f6a5e66e093d7c9128881d666e00827463bd3e9b12204e3c4189c
SHA5127b2915a9c8ad4a6dd33ddc0a07608980ffd867cdc7172f759baeb0c476183b63504dfbca799c709733e803ccf4df5d9a516a74d92ce1aa0347e186181ae16110
-
Filesize
426KB
MD57224dd28564210ce6346a67364af7c02
SHA17873d2fdf29e5622e6792103374fc949e4fc28cf
SHA256a50d8f695ac8df7a7eb4285f4ebb31e78fc34838a19848dbdda9fa2e4dd5c4a7
SHA512c58080d122f466b6f6bbcd049c8269c1e08371c7d0f035a51048471574457b616f72a049b2d270513195ff6f6744551bdfe477ffe91a0b4f6ccab4d34651bdb3
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0