Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 01:27
Static task
static1
Behavioral task
behavioral1
Sample
bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da.exe
Resource
win10v2004-20241007-en
General
-
Target
bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da.exe
-
Size
660KB
-
MD5
b9c50134ae66184428df705ba1335532
-
SHA1
d2d019bfcbc232994bf3ec28344a0c6cbe483757
-
SHA256
bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da
-
SHA512
e6ef16fbe8333b448c2d74ef13cefb054e92efcf9621d3849df0a7b97c542e27bbc4353a2a9e4ee0dd41f0e8a7a0c9515df665b22380936c930ea1d66e843799
-
SSDEEP
12288:xMrYy90LHftREy8eth75zWYzecAGXOI2e/lJslgT074HzoYn3sd/:1ymlREyVnpALne/lDuWUjd/
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b66-12.dat healer behavioral1/memory/212-15-0x0000000000070000-0x000000000007A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr725422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr725422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr725422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr725422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr725422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr725422.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/976-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x000d000000023a37-2110.dat family_redline behavioral1/memory/716-2118-0x00000000008B0000-0x00000000008E0000-memory.dmp family_redline behavioral1/files/0x000a000000023b64-2127.dat family_redline behavioral1/memory/3780-2129-0x0000000000A30000-0x0000000000A5E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ku025178.exe -
Executes dropped EXE 5 IoCs
pid Process 516 ziZg9487.exe 212 jr725422.exe 976 ku025178.exe 716 1.exe 3780 lr778676.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr725422.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziZg9487.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4020 976 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziZg9487.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku025178.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr778676.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 212 jr725422.exe 212 jr725422.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 212 jr725422.exe Token: SeDebugPrivilege 976 ku025178.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2732 wrote to memory of 516 2732 bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da.exe 85 PID 2732 wrote to memory of 516 2732 bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da.exe 85 PID 2732 wrote to memory of 516 2732 bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da.exe 85 PID 516 wrote to memory of 212 516 ziZg9487.exe 86 PID 516 wrote to memory of 212 516 ziZg9487.exe 86 PID 516 wrote to memory of 976 516 ziZg9487.exe 92 PID 516 wrote to memory of 976 516 ziZg9487.exe 92 PID 516 wrote to memory of 976 516 ziZg9487.exe 92 PID 976 wrote to memory of 716 976 ku025178.exe 93 PID 976 wrote to memory of 716 976 ku025178.exe 93 PID 976 wrote to memory of 716 976 ku025178.exe 93 PID 2732 wrote to memory of 3780 2732 bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da.exe 97 PID 2732 wrote to memory of 3780 2732 bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da.exe 97 PID 2732 wrote to memory of 3780 2732 bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da.exe"C:\Users\Admin\AppData\Local\Temp\bb1e32eef66ed02b3bffaccb6c15c07458118ec59be0cbf0914f37e123dd09da.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZg9487.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZg9487.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr725422.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr725422.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku025178.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku025178.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:716
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 976 -s 13684⤵
- Program crash
PID:4020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr778676.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr778676.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 976 -ip 9761⤵PID:1328
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD51ece4e8371d99c43bf9d2393a175bc8e
SHA18da63368e27a0a8e42ecc13dbedff152ad77c4aa
SHA256e7bef8b084986e727c1f7733a9bcfaca0fae98e10421921d70bd47d3e81ae36d
SHA5124773ad4c6d4a73279ce2a5386fdb7a2ede1b64a537869b603b04793eec4602a2c114225b44e6414f574862f24b0d7eef239b5d30337a1d0fae527901a272e546
-
Filesize
506KB
MD5f79052d90f2ad52eb956579a7b23412d
SHA11f225e66fe2e02aacca382041ee1005613c1d383
SHA2560bdbfea72eb983490e820b162fd19c8437a6065b87f98db924dc24d7a654db50
SHA51228e0effbb39e49a0ac10f89162983fdff46dca15c9a254c93c69fa5f56bd8947ed8dd6a2cc6d19382c6bf11ac9e56688f7ac863c93321e6b889df02134909051
-
Filesize
15KB
MD515b78af0dfd3bfb44a0b2b0ad333782c
SHA1a628694736c31071fc1fb58ae39a97a834c3ed31
SHA256f8545e82baab5a4c4d157be1cda106169ba58edc4d6326b3beee78ecf1809579
SHA512899bd43daa85f6fe53c5c55429a112ae9ea81327acee626dd3fb3b0b8b208fc87a6b6b633cdb0bdf7bef20b3bfdf8ea5a6914bd3e95c0cd91aaae93ef1857241
-
Filesize
426KB
MD5ae3d9fc92fc91b39bb3ec4a75fb2672d
SHA1089128ff0a584ab4821bfe15e4bcc2f8d01b78b8
SHA2562bfe0c3f74070ae4bb7d02177c784269ee64f26659f8c6eb36b92c92e99506fd
SHA51274f2d7a3c5731238beadd9414b73e722964870782d9fe21608b045e08d7058595392a226444375070296769a162e6d456a7f1e29944b0e1ac41fc0bc17033ac0
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0