Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 00:10
Static task
static1
Behavioral task
behavioral1
Sample
758e1a65ca3890bf7eab681e856f27e493d914ee40b3a0b1e4ebdf502c0f6c28.exe
Resource
win10v2004-20241007-en
General
-
Target
758e1a65ca3890bf7eab681e856f27e493d914ee40b3a0b1e4ebdf502c0f6c28.exe
-
Size
654KB
-
MD5
9df930ed1860f7b351f16831d2fefefa
-
SHA1
acbe9341a7d6c4f35c33c8a9e2e212880c9f6be1
-
SHA256
758e1a65ca3890bf7eab681e856f27e493d914ee40b3a0b1e4ebdf502c0f6c28
-
SHA512
5ef3e0d56af1445b0f4a00449cb61cf14884b8b6d0a744423406f45f29ace80c51fb3e2e24a1e5c5922636a6a201cb5cb55d50f8ac24a4fd813c379788567a1f
-
SSDEEP
12288:FMrXy90S8VmKwATGTQY6DlsCrVTTR9NoCuzwdgwTEAPTZUs82gG+VPzS9W:6yvkmKlGTH6fjuwdg6EA7ZUs8NNzS9W
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cbc-12.dat healer behavioral1/memory/4508-15-0x0000000000CC0000-0x0000000000CCA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr875184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr875184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr875184.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr875184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr875184.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr875184.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4760-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x0010000000023b79-2110.dat family_redline behavioral1/memory/3940-2118-0x0000000000480000-0x00000000004B0000-memory.dmp family_redline behavioral1/files/0x0007000000023cba-2127.dat family_redline behavioral1/memory/1284-2129-0x0000000000F20000-0x0000000000F4E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation ku235661.exe -
Executes dropped EXE 5 IoCs
pid Process 2076 ziah3595.exe 4508 jr875184.exe 4760 ku235661.exe 3940 1.exe 1284 lr117010.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr875184.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 758e1a65ca3890bf7eab681e856f27e493d914ee40b3a0b1e4ebdf502c0f6c28.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziah3595.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5392 4760 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 758e1a65ca3890bf7eab681e856f27e493d914ee40b3a0b1e4ebdf502c0f6c28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziah3595.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku235661.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr117010.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4508 jr875184.exe 4508 jr875184.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4508 jr875184.exe Token: SeDebugPrivilege 4760 ku235661.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 720 wrote to memory of 2076 720 758e1a65ca3890bf7eab681e856f27e493d914ee40b3a0b1e4ebdf502c0f6c28.exe 83 PID 720 wrote to memory of 2076 720 758e1a65ca3890bf7eab681e856f27e493d914ee40b3a0b1e4ebdf502c0f6c28.exe 83 PID 720 wrote to memory of 2076 720 758e1a65ca3890bf7eab681e856f27e493d914ee40b3a0b1e4ebdf502c0f6c28.exe 83 PID 2076 wrote to memory of 4508 2076 ziah3595.exe 84 PID 2076 wrote to memory of 4508 2076 ziah3595.exe 84 PID 2076 wrote to memory of 4760 2076 ziah3595.exe 93 PID 2076 wrote to memory of 4760 2076 ziah3595.exe 93 PID 2076 wrote to memory of 4760 2076 ziah3595.exe 93 PID 4760 wrote to memory of 3940 4760 ku235661.exe 94 PID 4760 wrote to memory of 3940 4760 ku235661.exe 94 PID 4760 wrote to memory of 3940 4760 ku235661.exe 94 PID 720 wrote to memory of 1284 720 758e1a65ca3890bf7eab681e856f27e493d914ee40b3a0b1e4ebdf502c0f6c28.exe 98 PID 720 wrote to memory of 1284 720 758e1a65ca3890bf7eab681e856f27e493d914ee40b3a0b1e4ebdf502c0f6c28.exe 98 PID 720 wrote to memory of 1284 720 758e1a65ca3890bf7eab681e856f27e493d914ee40b3a0b1e4ebdf502c0f6c28.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\758e1a65ca3890bf7eab681e856f27e493d914ee40b3a0b1e4ebdf502c0f6c28.exe"C:\Users\Admin\AppData\Local\Temp\758e1a65ca3890bf7eab681e856f27e493d914ee40b3a0b1e4ebdf502c0f6c28.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziah3595.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziah3595.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr875184.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr875184.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku235661.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku235661.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 11964⤵
- Program crash
PID:5392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr117010.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr117010.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1284
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4760 -ip 47601⤵PID:5336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5316c0c86c824f69bf2ac18f1d0a1c4bb
SHA18aedb6be0bb3f4a4273788c0512e465ed270b26f
SHA256909f710405100f8249c9d8035b8f2378d8b0a5126f237ab8f2a65c74d72c272e
SHA512b93607b0ffb9eb3d166914d3fe584af804ef132462713b4a3e16338745071d3cfd201a3f62c66c06e3ee770020f52c2d82203729e1c7b5291ceb6f4f63e16c70
-
Filesize
501KB
MD55fcf00edf5ca89a156f40a59e8df3727
SHA1ae63919c611748fa5ccdc4ab06a5668dd2f959a1
SHA256e1488c8797500af980108e77690a50dbcef5d1d6c6faaceb77cc763d31effd66
SHA5128d9c9a1b560f9c99c4abc19da000c75bce556d66415ed176d0f67af5aba3b580d6a03f5330899744d703ff62f348022e18820b52783c04a106f2c32e5247ae08
-
Filesize
11KB
MD57b0fbe84d3289ab5d4eafcdd03198943
SHA133709765de8f868a98ee45d7d3fe2c06b7477e50
SHA2561aff1121f22fe59c0ef62b97752cfc01a3d9f2e81a70b1c25923f6396b93c941
SHA512eba92b31ce02b2c9e0800392eebc5ddf587f6253c359cd4e0a02371e0a3dd0768aba70e3d2c582280b10e903a80e479d1a8fd2ed62c7e8d82678b8342a92abe1
-
Filesize
424KB
MD515064b683eced1893ddd67d2d2d66c04
SHA1223fa955d73d8377c6b9573da16ac2f05eb2ee67
SHA256bf40521c2265b76bb02bc7fac3aeb5963b6a45c86624b03df7bb3389a49d396f
SHA51223dde41f1415f1f97502ac4c99689e8ebaef89c16015eb5fe0277f5fbb5d177f34ad8c2c78521017f450ae4222bc37cdef5e0e7af98a1fd9e5f934640593d856
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0