Analysis
-
max time kernel
147s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:32
Static task
static1
Behavioral task
behavioral1
Sample
fe6e93bf05d128deda248626343b079860b9b01bf37fa0fad0ff054efbe54940.exe
Resource
win10v2004-20241007-en
General
-
Target
fe6e93bf05d128deda248626343b079860b9b01bf37fa0fad0ff054efbe54940.exe
-
Size
660KB
-
MD5
ebf5c16113ae4e3af163a31484985321
-
SHA1
43b6d192fd7f98472e79a2e55ae0ea15e941bbac
-
SHA256
fe6e93bf05d128deda248626343b079860b9b01bf37fa0fad0ff054efbe54940
-
SHA512
c21637a17044444b6256cc697c5e69507636c8c4d28ff63c6e562919fc4c967e2e458f5f5508edc4555ed2fa3e6d97f0b394a2ceca265b8a179b07562175f3c6
-
SSDEEP
12288:OMr8y90EMUGYMHcVTrBk+rf2mhwTev8y51Nsy7oiohDuErRp:myFMPQdwg8y51Nsy7kha0v
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
dozt
77.91.124.145:4125
-
auth_value
857bdfe4fa14711025859d89f18b32cb
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b7e-12.dat healer behavioral1/memory/3552-15-0x0000000000690000-0x000000000069A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr568771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr568771.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr568771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr568771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr568771.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr568771.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3524-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x001d000000023aaf-2110.dat family_redline behavioral1/memory/872-2118-0x0000000000450000-0x0000000000480000-memory.dmp family_redline behavioral1/files/0x000a000000023b7c-2127.dat family_redline behavioral1/memory/2896-2129-0x0000000000200000-0x0000000000230000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ku852678.exe -
Executes dropped EXE 5 IoCs
pid Process 2008 ziiS5158.exe 3552 jr568771.exe 3524 ku852678.exe 872 1.exe 2896 lr088633.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr568771.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziiS5158.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe6e93bf05d128deda248626343b079860b9b01bf37fa0fad0ff054efbe54940.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3732 3524 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe6e93bf05d128deda248626343b079860b9b01bf37fa0fad0ff054efbe54940.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziiS5158.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku852678.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr088633.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3552 jr568771.exe 3552 jr568771.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3552 jr568771.exe Token: SeDebugPrivilege 3524 ku852678.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2008 1956 fe6e93bf05d128deda248626343b079860b9b01bf37fa0fad0ff054efbe54940.exe 83 PID 1956 wrote to memory of 2008 1956 fe6e93bf05d128deda248626343b079860b9b01bf37fa0fad0ff054efbe54940.exe 83 PID 1956 wrote to memory of 2008 1956 fe6e93bf05d128deda248626343b079860b9b01bf37fa0fad0ff054efbe54940.exe 83 PID 2008 wrote to memory of 3552 2008 ziiS5158.exe 84 PID 2008 wrote to memory of 3552 2008 ziiS5158.exe 84 PID 2008 wrote to memory of 3524 2008 ziiS5158.exe 94 PID 2008 wrote to memory of 3524 2008 ziiS5158.exe 94 PID 2008 wrote to memory of 3524 2008 ziiS5158.exe 94 PID 3524 wrote to memory of 872 3524 ku852678.exe 95 PID 3524 wrote to memory of 872 3524 ku852678.exe 95 PID 3524 wrote to memory of 872 3524 ku852678.exe 95 PID 1956 wrote to memory of 2896 1956 fe6e93bf05d128deda248626343b079860b9b01bf37fa0fad0ff054efbe54940.exe 100 PID 1956 wrote to memory of 2896 1956 fe6e93bf05d128deda248626343b079860b9b01bf37fa0fad0ff054efbe54940.exe 100 PID 1956 wrote to memory of 2896 1956 fe6e93bf05d128deda248626343b079860b9b01bf37fa0fad0ff054efbe54940.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe6e93bf05d128deda248626343b079860b9b01bf37fa0fad0ff054efbe54940.exe"C:\Users\Admin\AppData\Local\Temp\fe6e93bf05d128deda248626343b079860b9b01bf37fa0fad0ff054efbe54940.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiS5158.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiS5158.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr568771.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr568771.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku852678.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku852678.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:872
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3524 -s 13844⤵
- Program crash
PID:3732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr088633.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr088633.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3524 -ip 35241⤵PID:336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
169KB
MD548d899c78b6a11712b1a7d9b5ad91ed9
SHA1e77017d8ed555e3aca5e8141b4f9b8fa4541f97a
SHA256997279b9763b0ecd6f538dfca8944a77c74373751cef94369b1c156c64f21760
SHA512c3d578850071bcf5abdd2de2c912bd9c4f2e34c2db4c3a0e007d15bc11b1168a29b79ed27c7d97b4595eaf7649f025de9e8e3edc4c7477f27d873bb7d722c81a
-
Filesize
506KB
MD5fe6d7ad43b4cfe7815c87c108387a3e7
SHA17793b6615bc6e2a513ed152eed381fe5dd3e3f64
SHA256a1f5f9573aa936bbb65a9b8cd3d1238be877201a3e3be91bacb7a8d5bfd26b39
SHA51237c096eb842aa4755280fbe2c2d73eeadfa737452847a07b1e2b1d604270546a8a49980ae6d2066094bddcfdff322c19eb6c257e50e008696ab5b5e8faeffeb3
-
Filesize
13KB
MD55cd7e091ef7862668b483707f84cacc9
SHA1a38d6f2572f13b91c935dd3ea7143b90cb78b46e
SHA25601feb1937213353eeaf6bf1fa927f499b9c626338af265ea3d85c4ce0270f5ae
SHA5123be85ad28bbb3e9a572e850c16027173a8eb587f725146db7d827849ccc6d0adc2c0725ebfb17cae9eb008a2f7b20e112e7fe55bdd167d74390789a9e203ff4d
-
Filesize
426KB
MD5e3d5edba831ff6d8ba29ac9e29414a76
SHA1891f566b553c5cb42e0ee1784a056edae8c9bd8c
SHA2562a085a060ad6419342b4a560509ba07b08f0c84fc3b1cdc0f642bd8ee5b72893
SHA51244bfab17d2df3c740291acb70518fd31ea30542011c17d25044cdc4b5b80ac10c9bb1552f4e3d916af9fd48c6a36c309c40a32b5dae7d3bfcca2aeefc184af9d
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0