Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75.exe
Resource
win10v2004-20241007-en
General
-
Target
39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75.exe
-
Size
651KB
-
MD5
34d192027a953277500570d3a97c0417
-
SHA1
cab046628e7dd1511107ed8727024bb5fd5cc742
-
SHA256
39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75
-
SHA512
8a728df0a79ec82cb6d15df5251aaef4d47e672dad143eedbf1ab4e01ca19911abfcb640a1335b628935d003b6c738c247c1863b08bdf174799f36d216dc073d
-
SSDEEP
12288:cMrBy90YDUkr3wYM15TrtFJhg3epgGAqlr8k+KspwfYzRs/iW:dy6QAn5TcTG3l+Kspwfnd
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023bb8-12.dat healer behavioral1/memory/1120-15-0x0000000000F30000-0x0000000000F3A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr220632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr220632.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr220632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr220632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr220632.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr220632.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4784-2105-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x0011000000023b03-2110.dat family_redline behavioral1/memory/4368-2118-0x00000000001B0000-0x00000000001E0000-memory.dmp family_redline behavioral1/files/0x000b000000023baf-2128.dat family_redline behavioral1/memory/5476-2129-0x0000000000120000-0x000000000014E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku980334.exe -
Executes dropped EXE 5 IoCs
pid Process 4892 ziDs2507.exe 1120 jr220632.exe 4784 ku980334.exe 4368 1.exe 5476 lr282768.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr220632.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziDs2507.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5356 4784 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr282768.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziDs2507.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku980334.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1120 jr220632.exe 1120 jr220632.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1120 jr220632.exe Token: SeDebugPrivilege 4784 ku980334.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3312 wrote to memory of 4892 3312 39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75.exe 84 PID 3312 wrote to memory of 4892 3312 39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75.exe 84 PID 3312 wrote to memory of 4892 3312 39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75.exe 84 PID 4892 wrote to memory of 1120 4892 ziDs2507.exe 85 PID 4892 wrote to memory of 1120 4892 ziDs2507.exe 85 PID 4892 wrote to memory of 4784 4892 ziDs2507.exe 96 PID 4892 wrote to memory of 4784 4892 ziDs2507.exe 96 PID 4892 wrote to memory of 4784 4892 ziDs2507.exe 96 PID 4784 wrote to memory of 4368 4784 ku980334.exe 97 PID 4784 wrote to memory of 4368 4784 ku980334.exe 97 PID 4784 wrote to memory of 4368 4784 ku980334.exe 97 PID 3312 wrote to memory of 5476 3312 39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75.exe 102 PID 3312 wrote to memory of 5476 3312 39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75.exe 102 PID 3312 wrote to memory of 5476 3312 39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75.exe"C:\Users\Admin\AppData\Local\Temp\39e162cf57987e52c3c1bc10410d333378c3086889fa9bbf55fe7b5ed945ec75.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDs2507.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDs2507.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr220632.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr220632.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku980334.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku980334.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4368
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 13844⤵
- Program crash
PID:5356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr282768.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr282768.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4784 -ip 47841⤵PID:5280
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD57d03cb68cae1bd752ac6eaf1797e845c
SHA1d6a61040e993c73b39a01d09bd1983182a485ad9
SHA2562d5a5caca27ef6d11371c18d9a90a9fcea97292ac216c3512d6c348e518ea36d
SHA5121ef7c792946de9592e36f7baeeb0f19be62af46c0286620b6e8de34133fdd79f463442fdde962f93b45277135e0b9e0e230a82067f6f7273c324307ebf6bc0cb
-
Filesize
497KB
MD5672e6553db19a5b43cf185ba47566dec
SHA142088c11bff2c26374b2cec0f0ae3650924bd09f
SHA256b247f6593eee52ef4fd0d4540ad2fca2b4f65c8068bc7375b5128ae35fb759a0
SHA5126a7a9358ec967670bf935686e1ff389ef8e5a4d90ac8e311b6d9968c953556f3f46e23c25d4cdd2a18808ce74f743c9b203d91f60f8f8a47ffb8401f3d7184d2
-
Filesize
11KB
MD5dff5038040942ad7aed5be3d0b19e8b5
SHA10bc90a0c676c8cbcadeb92112436dcc2a00510a1
SHA256649c9522621bcea92c73cacd22b527082d170a37ff28283a5fea5118d6e84451
SHA512f973075e964955dfe099948e7050dda7e7a2a50086a937759e6c657d0b648eda2a2e0da55eb65ff0c4193581e8f8fe317a10f9dcd0def42e6a8c6abc22b44296
-
Filesize
415KB
MD59a6f1a28e3d14400d404ba527f95b5db
SHA1c78d1dd83f56dae3b1659791df8b9433737d1024
SHA25624c2294e723ea14bc6ebddbb2b1bc5e9738a6d1481bd01b34ae945553b8532f2
SHA512af70d38d91f1238d308ae87b80ab52376a5543829a7efe62c3c0a5ba86fd8447158a3d00c8b2e38681ed9cd47203160af001c4e964ed2d27b948d332450e329a
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0