Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
65fe2b22139325beec26a478b82c8f0a408fbcdb0fc370534fc594e9d4f07ef0.exe
Resource
win10v2004-20241007-en
General
-
Target
65fe2b22139325beec26a478b82c8f0a408fbcdb0fc370534fc594e9d4f07ef0.exe
-
Size
654KB
-
MD5
fc4868c256cb1fead7ef8990636a2948
-
SHA1
bcbc6c97f7beca9ce2c207e174140dc13b3efa6c
-
SHA256
65fe2b22139325beec26a478b82c8f0a408fbcdb0fc370534fc594e9d4f07ef0
-
SHA512
4faa9bc2e70739b103f071c43f9da15548aa5d9e9eca79b6f4bbb42d067ccd0d5a01cf91f6248d26cf55866535d125ed9678c8df91ba4b541438dfbbec22c810
-
SSDEEP
12288:MMrty90HY2Jj+eumMojCrVTPJ9pQCuMwddwTyysiZkUKzl0a+KrePkKQ7iVF:ZyUjhuQy79wdd6yy1ZkUda+KaPcUF
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023bd0-12.dat healer behavioral1/memory/3696-15-0x00000000004B0000-0x00000000004BA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr820363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr820363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr820363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr820363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr820363.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr820363.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/1236-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x000a000000023bc3-2110.dat family_redline behavioral1/memory/6532-2118-0x0000000000190000-0x00000000001C0000-memory.dmp family_redline behavioral1/files/0x0009000000023bca-2127.dat family_redline behavioral1/memory/6220-2129-0x0000000000DF0000-0x0000000000E1E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation ku399008.exe -
Executes dropped EXE 5 IoCs
pid Process 3068 zilz1701.exe 3696 jr820363.exe 1236 ku399008.exe 6532 1.exe 6220 lr116289.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr820363.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 65fe2b22139325beec26a478b82c8f0a408fbcdb0fc370534fc594e9d4f07ef0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zilz1701.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 6332 1236 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr116289.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65fe2b22139325beec26a478b82c8f0a408fbcdb0fc370534fc594e9d4f07ef0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zilz1701.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku399008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3696 jr820363.exe 3696 jr820363.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3696 jr820363.exe Token: SeDebugPrivilege 1236 ku399008.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3068 2908 65fe2b22139325beec26a478b82c8f0a408fbcdb0fc370534fc594e9d4f07ef0.exe 83 PID 2908 wrote to memory of 3068 2908 65fe2b22139325beec26a478b82c8f0a408fbcdb0fc370534fc594e9d4f07ef0.exe 83 PID 2908 wrote to memory of 3068 2908 65fe2b22139325beec26a478b82c8f0a408fbcdb0fc370534fc594e9d4f07ef0.exe 83 PID 3068 wrote to memory of 3696 3068 zilz1701.exe 84 PID 3068 wrote to memory of 3696 3068 zilz1701.exe 84 PID 3068 wrote to memory of 1236 3068 zilz1701.exe 93 PID 3068 wrote to memory of 1236 3068 zilz1701.exe 93 PID 3068 wrote to memory of 1236 3068 zilz1701.exe 93 PID 1236 wrote to memory of 6532 1236 ku399008.exe 94 PID 1236 wrote to memory of 6532 1236 ku399008.exe 94 PID 1236 wrote to memory of 6532 1236 ku399008.exe 94 PID 2908 wrote to memory of 6220 2908 65fe2b22139325beec26a478b82c8f0a408fbcdb0fc370534fc594e9d4f07ef0.exe 98 PID 2908 wrote to memory of 6220 2908 65fe2b22139325beec26a478b82c8f0a408fbcdb0fc370534fc594e9d4f07ef0.exe 98 PID 2908 wrote to memory of 6220 2908 65fe2b22139325beec26a478b82c8f0a408fbcdb0fc370534fc594e9d4f07ef0.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\65fe2b22139325beec26a478b82c8f0a408fbcdb0fc370534fc594e9d4f07ef0.exe"C:\Users\Admin\AppData\Local\Temp\65fe2b22139325beec26a478b82c8f0a408fbcdb0fc370534fc594e9d4f07ef0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilz1701.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilz1701.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr820363.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr820363.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku399008.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku399008.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6532
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 13804⤵
- Program crash
PID:6332
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr116289.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr116289.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6220
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1236 -ip 12361⤵PID:6376
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD58646347cd4970c0fc909db367174ab5d
SHA1c6fec0b7139d43ecb8da2a0438323334854e7eb9
SHA256d35718637e84702c42c61b990390b1dca585d5694cfdca5a640eb7165bb8f708
SHA5127f7308399a8b78f4f7f087d02419568be8b9c92818ea47d2860edab148e0cc34654fa58a0b47cb4c8e466277ed9e02b3050a22eca04fa2cd68b03e4e5eacac47
-
Filesize
501KB
MD53540acd21fb6db6578406ea3ac51058f
SHA19e5a47cce9e7ee1eac2940b2b3a51f1c60c8c0c3
SHA256af836a5ae93b20bfa1944d133f91938ac8724e1b15e9f9837287b2f02f11a781
SHA51289323f3ed205b2a6dd138e5ea4d361a50440b11eb2f21fa0537e4bc8974b66141e8976c117fbdb8df61549fef734e037b4d5ed3a6485af3cc37eea9ffd72b0b0
-
Filesize
11KB
MD5cb00eda64ad9b4e9fcab3ea68a1bc83a
SHA163029a065a8cd6d2f58fe94bacbb8558bd1eb433
SHA2561589b9e10c869d89774f54a5b02135ab80393e5bd3e060e2be0eb121893cd4d7
SHA5125346bcdd31e776efa25962294a81a0bd3a9354f5653872009a20a46f8ec9ee1c25ddfec526017e4dcd09470a958b3f55c1b465b82605e4eb7d494cc174be42b8
-
Filesize
424KB
MD59df8265819b56c4cfc8c5e67e11a2e7f
SHA1bf2ba2e12e10a78397178a449db3a940df168d82
SHA256d2d9c7b7881c46baa6f7163fdffdc570ade0a17a6bb727793b470015e39df7be
SHA512b57a23ac8f7b6c4e3e4b3917dd7a7d2ce348ff8b1e10597cdfdca3410c13b237cd4ccee5f6c285bf9c026483b7d2a26010ebe2c034e1cf59d9ebfba4cfcafe9f
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0