Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
179179c68d94ae69e843265e97b829eb2ead32da83c786bbcb76483e59474dfd.exe
Resource
win10v2004-20241007-en
General
-
Target
179179c68d94ae69e843265e97b829eb2ead32da83c786bbcb76483e59474dfd.exe
-
Size
660KB
-
MD5
edfddd0eab2af2e47920d6ec1a8ddc71
-
SHA1
1766887dc2ea985c328b48739307b8289b062c87
-
SHA256
179179c68d94ae69e843265e97b829eb2ead32da83c786bbcb76483e59474dfd
-
SHA512
28ef36d7e9ea2277839e1bde483cc127b994957dffe8982dadfdaddbfc21c3376a73332fd050fc29475bd3268427e2073b7d2035c2471276db02d207b0a4a8f5
-
SSDEEP
12288:gMr3y90Sjj5zmEUTkASJ7h9OFeOo4QgnkJGbcZWQoIraF9OBGXcGWZ:Hy3sySTT1AGbcZ3SLxslZ
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
droz
77.91.124.145:4125
-
auth_value
d099adf6dbf6ccb8e16967104280634a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb3-12.dat healer behavioral1/memory/1788-15-0x0000000000990000-0x000000000099A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr358342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr358342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr358342.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr358342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr358342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr358342.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4200-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x000300000001e5b4-2110.dat family_redline behavioral1/memory/476-2118-0x00000000002A0000-0x00000000002D0000-memory.dmp family_redline behavioral1/files/0x0007000000023cb1-2127.dat family_redline behavioral1/memory/4168-2129-0x0000000000190000-0x00000000001BE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ku520122.exe -
Executes dropped EXE 5 IoCs
pid Process 4620 zisg1007.exe 1788 jr358342.exe 4200 ku520122.exe 476 1.exe 4168 lr604017.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr358342.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 179179c68d94ae69e843265e97b829eb2ead32da83c786bbcb76483e59474dfd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zisg1007.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5728 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5804 4200 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 179179c68d94ae69e843265e97b829eb2ead32da83c786bbcb76483e59474dfd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zisg1007.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku520122.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr604017.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1788 jr358342.exe 1788 jr358342.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1788 jr358342.exe Token: SeDebugPrivilege 4200 ku520122.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4040 wrote to memory of 4620 4040 179179c68d94ae69e843265e97b829eb2ead32da83c786bbcb76483e59474dfd.exe 86 PID 4040 wrote to memory of 4620 4040 179179c68d94ae69e843265e97b829eb2ead32da83c786bbcb76483e59474dfd.exe 86 PID 4040 wrote to memory of 4620 4040 179179c68d94ae69e843265e97b829eb2ead32da83c786bbcb76483e59474dfd.exe 86 PID 4620 wrote to memory of 1788 4620 zisg1007.exe 87 PID 4620 wrote to memory of 1788 4620 zisg1007.exe 87 PID 4620 wrote to memory of 4200 4620 zisg1007.exe 95 PID 4620 wrote to memory of 4200 4620 zisg1007.exe 95 PID 4620 wrote to memory of 4200 4620 zisg1007.exe 95 PID 4200 wrote to memory of 476 4200 ku520122.exe 96 PID 4200 wrote to memory of 476 4200 ku520122.exe 96 PID 4200 wrote to memory of 476 4200 ku520122.exe 96 PID 4040 wrote to memory of 4168 4040 179179c68d94ae69e843265e97b829eb2ead32da83c786bbcb76483e59474dfd.exe 101 PID 4040 wrote to memory of 4168 4040 179179c68d94ae69e843265e97b829eb2ead32da83c786bbcb76483e59474dfd.exe 101 PID 4040 wrote to memory of 4168 4040 179179c68d94ae69e843265e97b829eb2ead32da83c786bbcb76483e59474dfd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\179179c68d94ae69e843265e97b829eb2ead32da83c786bbcb76483e59474dfd.exe"C:\Users\Admin\AppData\Local\Temp\179179c68d94ae69e843265e97b829eb2ead32da83c786bbcb76483e59474dfd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisg1007.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisg1007.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr358342.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr358342.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku520122.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku520122.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 13764⤵
- Program crash
PID:5804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr604017.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr604017.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4200 -ip 42001⤵PID:5584
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5728
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD59dacfe99bd2e423ac26c9204007d3c56
SHA1ee58328a6bcf19db3dc2a25515a54691a0955ccd
SHA256d0ca4b693dd8aeea2bd19cf27eaa10fee9d2d4498fc023e4f9dc6b90009f33fb
SHA512ac1f0f9ea3240db7c5f6d4054bb2b9d5fedb46e4bea04e8b2d1767083189c5d604d698f63d098ca39dd75086317ca88564652e87e61f81dbccd029b29fadf74a
-
Filesize
507KB
MD57e4fa6745ce518d4dfb9337a29b07d9a
SHA1ccf63f91ec98e855b704cd599641af0fe215ea26
SHA256f4ce776cbbfdfcfbc5f083bb4ae05e6bb8b30ef45b07e6ab325f73a7c957a94c
SHA512239b4fb333e6db0357f859bb1223f58b310db09fa4c13ea09efe9800ac6530268c6e2653ec7fe4007666059f7edf5ad73e2fdf58b708148ab0a473011764b091
-
Filesize
14KB
MD5b516526c6da6f8f5d12892e2cb223888
SHA109dcc30c84751a4bdc74bf998324a5045c72d611
SHA2564b3921aaede4b1a4b79819975ed1122824864bf230669f0631e255715c8042f7
SHA512b687d2fb6c52335562c652b2b1ef5a0b71ebd282010150134aba1bdcec115f7869778048701af237de45f3f1daa84bab493d3f2e866b090d855f33f0114d565d
-
Filesize
426KB
MD506e51203f9f4a6a416852e7cae549c4b
SHA168c6b361fe1e827c6573b4f420646ace586defb1
SHA256393e6099da0c312e913ff78cd32ffdce7b4636098dea031ebc5583e69599ba68
SHA512294db78b470318b7980eebf516f9b884e24acaa5e5155711910dec7aa33268d99f9023ca192e8c966f39b8cd3b4dc7f73fff105e1329c3f0e9c205c7443d58d5
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0