Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:12
Static task
static1
Behavioral task
behavioral1
Sample
62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5.exe
Resource
win10v2004-20241007-en
General
-
Target
62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5.exe
-
Size
684KB
-
MD5
9cedecac80429e4e2548899236e2a3fd
-
SHA1
ee3e85c72236b246220178803b67fdd12e454808
-
SHA256
62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5
-
SHA512
eb5cf75655c7ce10089a87731f40c97d29eb7a9c8f05a27b5dfd79f6f798805c68b59b1f08e10dc3fa27f6fc07bfaa2dd0a8a4c635a9abcf0c1937e6c6eb1453
-
SSDEEP
12288:uMrMy90qgkP6CWn2yMjfirWFLz73eMiWgXSLOZKwB2OQ0qVks+6B:+y4h1MjZLHetrrN2OQ0qVr
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c7f-12.dat healer behavioral1/memory/3060-15-0x0000000000EC0000-0x0000000000ECA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr825588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr825588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr825588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr825588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr825588.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr825588.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1116-2105-0x0000000005750000-0x0000000005782000-memory.dmp family_redline behavioral1/files/0x0008000000023c7a-2110.dat family_redline behavioral1/memory/5672-2118-0x0000000000EC0000-0x0000000000EF0000-memory.dmp family_redline behavioral1/files/0x0007000000023c7d-2128.dat family_redline behavioral1/memory/6088-2129-0x0000000000300000-0x000000000032E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ku594362.exe -
Executes dropped EXE 5 IoCs
pid Process 3792 ziyO9688.exe 3060 jr825588.exe 1116 ku594362.exe 5672 1.exe 6088 lr591939.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr825588.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziyO9688.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4944 1116 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr591939.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziyO9688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku594362.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3060 jr825588.exe 3060 jr825588.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3060 jr825588.exe Token: SeDebugPrivilege 1116 ku594362.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4736 wrote to memory of 3792 4736 62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5.exe 84 PID 4736 wrote to memory of 3792 4736 62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5.exe 84 PID 4736 wrote to memory of 3792 4736 62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5.exe 84 PID 3792 wrote to memory of 3060 3792 ziyO9688.exe 86 PID 3792 wrote to memory of 3060 3792 ziyO9688.exe 86 PID 3792 wrote to memory of 1116 3792 ziyO9688.exe 96 PID 3792 wrote to memory of 1116 3792 ziyO9688.exe 96 PID 3792 wrote to memory of 1116 3792 ziyO9688.exe 96 PID 1116 wrote to memory of 5672 1116 ku594362.exe 97 PID 1116 wrote to memory of 5672 1116 ku594362.exe 97 PID 1116 wrote to memory of 5672 1116 ku594362.exe 97 PID 4736 wrote to memory of 6088 4736 62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5.exe 102 PID 4736 wrote to memory of 6088 4736 62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5.exe 102 PID 4736 wrote to memory of 6088 4736 62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5.exe"C:\Users\Admin\AppData\Local\Temp\62917ac66abdd9be003f44d7fe9e753cc4206594922eb49ee27ee0c80bc31bd5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyO9688.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyO9688.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr825588.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr825588.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku594362.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku594362.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 14644⤵
- Program crash
PID:4944
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr591939.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr591939.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6088
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1116 -ip 11161⤵PID:5528
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD5ac399733950c2126fdfe98af8194e59c
SHA106a24ecfcd56a23194009e1b307208e64e692ede
SHA2562f395f538a789e26922ac6afba50f0da22bf3282a047c8c2757a5907d8fcc5d9
SHA5125d875792da66d8393ad5c168254d9c6466b92b9c57698828a41abed8442204c24409e6c0cea822f5ff1f71d17b1131fa37862cca0e2a1dea68e47b103a675a93
-
Filesize
529KB
MD5b9fa5defacf10ee00ecbec8bc2739348
SHA1c6e8d6dff4aa6731eeb7d1074ad08f8e53d2eff3
SHA25614a9cb23c505cb8d73288443944ade402df86805921fff4d45468dfedf4caa1f
SHA512af83ab48b103ccf623cc9136ce26ef18e1f01c81feb9738348c579b2f854a9bfb1e637d756bf4f5bfeaa07bf179ce18b8b9f40d934031e62b3ff447f82020bc2
-
Filesize
12KB
MD58aebcf014a7e2895abbfed7d935f8dc6
SHA1dca9e83155232ed61582503d134c4af104b36f49
SHA256329325fe79f93b385d9bfc5f6dadef38ca9e2bf2a5d88a48ada602b2ae939c2e
SHA51279bcaeb94b6bd7b5c2aad824b5ed865905430679b468ef2d64e3140448898725ac7189eb71c4a1b8b619292157254920783a514f384b2a8730dc7ab81f7e7838
-
Filesize
495KB
MD5ded28a1f67edb71f234d96615f54090d
SHA1cf66d37524609cae6cfb4e946bb6e3a1498720b3
SHA2567208f55b621aedc61c2df18a6804088673d5d52b35d329e6cb1e9e7a29869a45
SHA512b472194611904d659021a00a28db5e29f48d1bd631f9c14b50cca038097419a3b6810fbc6a346201fbf7e6556d16cbb76eea35419df1df7db78eac4715b629d3
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0