Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
53fee0260fd1d81db4156c53c80861d599c35f340de764d19c5ba12d179e6704.exe
Resource
win10v2004-20241007-en
General
-
Target
53fee0260fd1d81db4156c53c80861d599c35f340de764d19c5ba12d179e6704.exe
-
Size
655KB
-
MD5
c45606cf22f8ae342e05baeb310fda02
-
SHA1
dbf6a7ab88979866968f73f5b0051024cd9c1cfc
-
SHA256
53fee0260fd1d81db4156c53c80861d599c35f340de764d19c5ba12d179e6704
-
SHA512
7ce38a73c37905d7b719fbdb055fc3107ed6e643c856311d7e02233365ee84e5fba7c7779dda3f3773e0be6c0175ba1eeb03ddcd618f57fc3b9ac9d69ad0d878
-
SSDEEP
12288:bMrty90zw9pzl1sHyyr10aCrVT1f9+ACuUwdlwTbgSGZrb4xcOsiCEx15:Kyp/gSk10nINwdl6bgLZrbyoi/D
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b76-12.dat healer behavioral1/memory/3264-15-0x0000000000610000-0x000000000061A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr336973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr336973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr336973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr336973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr336973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr336973.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4752-2105-0x0000000005560000-0x0000000005592000-memory.dmp family_redline behavioral1/files/0x000800000001e58c-2110.dat family_redline behavioral1/memory/4664-2118-0x0000000000E70000-0x0000000000EA0000-memory.dmp family_redline behavioral1/files/0x000a000000023b74-2128.dat family_redline behavioral1/memory/4124-2129-0x0000000000220000-0x000000000024E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ku382274.exe -
Executes dropped EXE 5 IoCs
pid Process 5080 ziVg9803.exe 3264 jr336973.exe 4752 ku382274.exe 4664 1.exe 4124 lr885128.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr336973.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 53fee0260fd1d81db4156c53c80861d599c35f340de764d19c5ba12d179e6704.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVg9803.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2100 4752 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr885128.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53fee0260fd1d81db4156c53c80861d599c35f340de764d19c5ba12d179e6704.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziVg9803.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku382274.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3264 jr336973.exe 3264 jr336973.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3264 jr336973.exe Token: SeDebugPrivilege 4752 ku382274.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3024 wrote to memory of 5080 3024 53fee0260fd1d81db4156c53c80861d599c35f340de764d19c5ba12d179e6704.exe 83 PID 3024 wrote to memory of 5080 3024 53fee0260fd1d81db4156c53c80861d599c35f340de764d19c5ba12d179e6704.exe 83 PID 3024 wrote to memory of 5080 3024 53fee0260fd1d81db4156c53c80861d599c35f340de764d19c5ba12d179e6704.exe 83 PID 5080 wrote to memory of 3264 5080 ziVg9803.exe 84 PID 5080 wrote to memory of 3264 5080 ziVg9803.exe 84 PID 5080 wrote to memory of 4752 5080 ziVg9803.exe 95 PID 5080 wrote to memory of 4752 5080 ziVg9803.exe 95 PID 5080 wrote to memory of 4752 5080 ziVg9803.exe 95 PID 4752 wrote to memory of 4664 4752 ku382274.exe 96 PID 4752 wrote to memory of 4664 4752 ku382274.exe 96 PID 4752 wrote to memory of 4664 4752 ku382274.exe 96 PID 3024 wrote to memory of 4124 3024 53fee0260fd1d81db4156c53c80861d599c35f340de764d19c5ba12d179e6704.exe 101 PID 3024 wrote to memory of 4124 3024 53fee0260fd1d81db4156c53c80861d599c35f340de764d19c5ba12d179e6704.exe 101 PID 3024 wrote to memory of 4124 3024 53fee0260fd1d81db4156c53c80861d599c35f340de764d19c5ba12d179e6704.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\53fee0260fd1d81db4156c53c80861d599c35f340de764d19c5ba12d179e6704.exe"C:\Users\Admin\AppData\Local\Temp\53fee0260fd1d81db4156c53c80861d599c35f340de764d19c5ba12d179e6704.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVg9803.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVg9803.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr336973.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr336973.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku382274.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku382274.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 12084⤵
- Program crash
PID:2100
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr885128.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr885128.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4124
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4752 -ip 47521⤵PID:2876
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD52987b39a0513031f4aea1011136890db
SHA1ef641791adc3a9d15e4e1822d2e48fdc1ea3018d
SHA25632e2227e4d955c0de77ae6c27442b0d740b60b6f8325aff8cf443d3c0a8285a0
SHA512af9fdfee1805759443e5862fd9b293abb9202b038da2dedcff6e66dead6e743a3d71585b8c14966b3138c86385bc87f4a539f08c3c89a5d1669de62ba19c53fe
-
Filesize
501KB
MD5e69d98ec7b64cfdee7fd278db1bc8aa1
SHA1c8f987db1434c8c725d361a765517cbb647efb0e
SHA256c5552887d3afa910c2e83f66045650d2b3426115fc6aa372742a676776716492
SHA51250b36313538252a64bf3acb3e2f635ceef97845435c6981c05c1f2326aa97fb3c2e812382dc6a71f385220de4c5ec576c70158eeaae4a111fa3e3a09dc968f36
-
Filesize
11KB
MD556a28e5cc2b6e3df3b28ef579ac3c17d
SHA185a2f17a51c04f7bfbe8193b7951f7cf921d323d
SHA256ab82578465fde95feccf8025964b5cecc88523790b3f93019981438df0b0b094
SHA512d822d1b02b694bb7ec775dd662ffff1616476deefb0679206b9d024af64f5cd232ddea9a282064f1a8914c392a6672c85469943a0d3812bf519d7c008864d059
-
Filesize
424KB
MD5019c77c7274556bf09a5952723e2d7cb
SHA1795291b0d4440fb22cf52a5f0fe859c149056efd
SHA25661cb6c10f950f314df474e30531ff3a2cf47d0cf1bfc230ab3d121af3b2eeac9
SHA51259bb8e17fa5342c2c6909c712c343dbb66c21d780841039f2aefb8a8904028ad20bd454e21ef6b1ff6c4c8049c61444e739aa3ebabdcd121c88d58460efd738d
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0