Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:42
Static task
static1
Behavioral task
behavioral1
Sample
82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5.exe
Resource
win10v2004-20241007-en
General
-
Target
82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5.exe
-
Size
660KB
-
MD5
3ca3b3ab00c86782dac5bf45b2f4fdc6
-
SHA1
06fecff11bd5b8a3c388a4373b272eb14f449bfa
-
SHA256
82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5
-
SHA512
b1c9ec0d4cb369eb14909efee88de72bc78f32da74d02099458863665714a2d35833b58d0021bc053ef2695b58ceda4d43ac4700993425b1f8339ec3a6f7aebb
-
SSDEEP
12288:tMrgy90bkOsNvFSYQC0OqF9r+awB/MPTecS8ZicC9yqbQT8n5bEh3XLGDS5:NyGapwM05r+awO/n6ySg3h5
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cc2-12.dat healer behavioral1/memory/4592-15-0x0000000000380000-0x000000000038A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr953709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr953709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr953709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr953709.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr953709.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr953709.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3484-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x000d000000023b79-2110.dat family_redline behavioral1/memory/5464-2118-0x00000000007D0000-0x0000000000800000-memory.dmp family_redline behavioral1/files/0x0007000000023cbf-2127.dat family_redline behavioral1/memory/5084-2129-0x0000000000BC0000-0x0000000000BEE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku346861.exe -
Executes dropped EXE 5 IoCs
pid Process 2164 zirV4059.exe 4592 jr953709.exe 3484 ku346861.exe 5464 1.exe 5084 lr765870.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr953709.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zirV4059.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5636 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 888 3484 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zirV4059.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku346861.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr765870.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4592 jr953709.exe 4592 jr953709.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4592 jr953709.exe Token: SeDebugPrivilege 3484 ku346861.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1016 wrote to memory of 2164 1016 82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5.exe 83 PID 1016 wrote to memory of 2164 1016 82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5.exe 83 PID 1016 wrote to memory of 2164 1016 82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5.exe 83 PID 2164 wrote to memory of 4592 2164 zirV4059.exe 84 PID 2164 wrote to memory of 4592 2164 zirV4059.exe 84 PID 2164 wrote to memory of 3484 2164 zirV4059.exe 96 PID 2164 wrote to memory of 3484 2164 zirV4059.exe 96 PID 2164 wrote to memory of 3484 2164 zirV4059.exe 96 PID 3484 wrote to memory of 5464 3484 ku346861.exe 97 PID 3484 wrote to memory of 5464 3484 ku346861.exe 97 PID 3484 wrote to memory of 5464 3484 ku346861.exe 97 PID 1016 wrote to memory of 5084 1016 82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5.exe 102 PID 1016 wrote to memory of 5084 1016 82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5.exe 102 PID 1016 wrote to memory of 5084 1016 82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5.exe"C:\Users\Admin\AppData\Local\Temp\82cffc7e907e7acab6c016b62af914d064dfb40573d3f7987dda837e5f3ec5d5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirV4059.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirV4059.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr953709.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr953709.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku346861.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku346861.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 11964⤵
- Program crash
PID:888
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr765870.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr765870.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3484 -ip 34841⤵PID:4560
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5636
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5a8bfafbbedb318b7475192ba17d9e07f
SHA105cbd9be409935afabaceb0b672a623040b7697a
SHA25601f00937d5e3ddc06f7ac431016ee21a23cc27d611eddd0cd1d5224db4411274
SHA512a762ffaa36f6f42599aeda622a88a41231b61465a0afd7da7f71d52d0d8e006e0596bd07733be4dff3a064aa6aad4a53bdc1d99d0aa50c77e4f01a91eb08006f
-
Filesize
507KB
MD556a9b130309a217626598f6a56edc5fd
SHA130de2a53f73ac2554085887b18e48ae8e707ac9b
SHA256305aa841b5331451e6da31adc5404883bd6f7ca5a1ff3e713abda9f632ecbf0c
SHA5122848bd66f0db3322224507c68db41ddc4264658ac246197e87deb9761c2ede6f97cffafdd05bc00739d2e340d8f8520f9932ba49baba29c51179aa72abfb24a7
-
Filesize
14KB
MD550373a1af4642effcab6608acde25220
SHA14d3af9a7ee223756aecdf41666070073117b102a
SHA2564a13661f066a0578cb9c5475afb58f8c310c1698c59b5b7dc334157f94623d87
SHA512b19a32122c55a9f55f2663a9305f35ad306c8078f621c645bef18c02973deb3abada2281b9c5ea917820facbf6e4b6258f0f9c574414b4f81cf3d6b29c89c00b
-
Filesize
426KB
MD53a6e38ead50942cd23d7e9c3ddd57300
SHA16a9e6d8e0112478c211284522cca473fb53013b0
SHA2569c1a3ee599a227b3d027f90c7a17a974025ae318ce4260277922c016afc19107
SHA51208f73b7335b6ce200c97481e04191f97e61f76e0d526aa817ba0cc10b49fbff9b7916c408873b14647374d12251c81e5cde6df4b86f99b6f0e0c227fc2e2cef1
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0