Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:07
Static task
static1
Behavioral task
behavioral1
Sample
a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe
Resource
win10v2004-20241007-en
General
-
Target
a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe
-
Size
660KB
-
MD5
5923df8e8b775fbf8b8b77b978eab294
-
SHA1
a3819d424ab21510321036c3007f82f548993493
-
SHA256
a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a
-
SHA512
034c75e4641e57df1b9e6be907776b7def255aa44b5e79b856750e1f67ed32d39051883580e29ce1b519df059f24f641bf3470a4ac6bef60418eb1086c1043e1
-
SSDEEP
12288:tMrIy90ebh5o2QsrS5lFiTxCr9a2nFG5kwL0NFbFuEabNsovNj1:Zy9he2QsrS5n2CRaQG5kwUdF7kJ
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
dizon
77.91.124.145:4125
-
auth_value
047038ed6238aaee09c368831591e935
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b7c-12.dat healer behavioral1/memory/3984-15-0x0000000000A10000-0x0000000000A1A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it538817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it538817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it538817.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it538817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it538817.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it538817.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/2680-2105-0x0000000005560000-0x0000000005592000-memory.dmp family_redline behavioral1/files/0x000d000000023b6f-2110.dat family_redline behavioral1/memory/3668-2118-0x00000000000F0000-0x0000000000120000-memory.dmp family_redline behavioral1/files/0x000a000000023b7a-2127.dat family_redline behavioral1/memory/5008-2129-0x00000000008D0000-0x0000000000900000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation jr437173.exe -
Executes dropped EXE 5 IoCs
pid Process 1720 ziwZ4689.exe 3984 it538817.exe 2680 jr437173.exe 3668 1.exe 5008 kp728888.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it538817.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziwZ4689.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1352 2680 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziwZ4689.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr437173.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp728888.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3984 it538817.exe 3984 it538817.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3984 it538817.exe Token: SeDebugPrivilege 2680 jr437173.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4044 wrote to memory of 1720 4044 a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe 83 PID 4044 wrote to memory of 1720 4044 a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe 83 PID 4044 wrote to memory of 1720 4044 a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe 83 PID 1720 wrote to memory of 3984 1720 ziwZ4689.exe 84 PID 1720 wrote to memory of 3984 1720 ziwZ4689.exe 84 PID 1720 wrote to memory of 2680 1720 ziwZ4689.exe 96 PID 1720 wrote to memory of 2680 1720 ziwZ4689.exe 96 PID 1720 wrote to memory of 2680 1720 ziwZ4689.exe 96 PID 2680 wrote to memory of 3668 2680 jr437173.exe 97 PID 2680 wrote to memory of 3668 2680 jr437173.exe 97 PID 2680 wrote to memory of 3668 2680 jr437173.exe 97 PID 4044 wrote to memory of 5008 4044 a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe 102 PID 4044 wrote to memory of 5008 4044 a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe 102 PID 4044 wrote to memory of 5008 4044 a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe"C:\Users\Admin\AppData\Local\Temp\a9b8b59cf11d957043b9c745419ba281b371149116c06af547f55d8bc59eae0a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwZ4689.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwZ4689.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it538817.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it538817.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr437173.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr437173.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 13764⤵
- Program crash
PID:1352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kp728888.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kp728888.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2680 -ip 26801⤵PID:3972
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD58eecb6f8baaf2454bc6669f848bd59d9
SHA1a062da5a1bded7ef2a32d0f42f931166c5c1ea97
SHA256a8136a4d250f19a6544650f7c0455ba9fe3485f78dec419b88afa6a2a1200324
SHA512064bb11c6997377967948a36e15302d7b2c3ac6d623854590673bdc2eff911384a6b7848c41cf82999372cfb587e0529cc203a4c8937daeb4d2661c5d1e138af
-
Filesize
506KB
MD523fd6f3326608fca5b0709e6afaba405
SHA1a0275b2863c932744eee961501f843484b9bc6da
SHA2567b950738fdf62909e6b771820e09221a9a26018248f526ed65558e9d12f8ee4d
SHA5128783ac813f99408dafb2d6a32f5687352f0cbad3b55ca1a5d5d2982e05e59a06ede4ac06b75dff2dd66eecf9aeb0254c6ca42b3baccfa8e2391f9a062bb43e97
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
419KB
MD5243fefe2ceae60dda68216b4c07688b1
SHA151f7dea3fd14f3337047dd5c5878838b590c383d
SHA25683a28a58c1450055c2a24e52c5cf473f8cb4dea085967f35bb137649f97a711f
SHA512d1a45165341bb9a352db53f2d9656b27d6a2b6e8cdf006ac5c757585c8b056993520cbd589dc8c46e8198a60c2b6063956354e5443eaf1d456c8bff8f69b6059
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0