Analysis
-
max time kernel
95s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 04:29
Static task
static1
Behavioral task
behavioral1
Sample
34206bb8204852a1f187938ee4d59e672b4291f660290beb7fe664d15d5510a8.exe
Resource
win10v2004-20241007-en
General
-
Target
34206bb8204852a1f187938ee4d59e672b4291f660290beb7fe664d15d5510a8.exe
-
Size
496KB
-
MD5
219896037575f09c1c0e0e379c479491
-
SHA1
d5c26872ddbd254010d536773f0aacd7eb8897cd
-
SHA256
34206bb8204852a1f187938ee4d59e672b4291f660290beb7fe664d15d5510a8
-
SHA512
9d375f49d99a5ac110a609357bf5fe46e07ed8eeaf3cb3fd049d5a8ff6080afc9bf25de1e87560ccc9787c4bc93554ca76a10e88f0f6a8cfa6a51dd7115106e6
-
SSDEEP
12288:HMrWy90sVsQmT8u9mK4fzPF3YU1pdw8um0FVP5:VyPVuIu9mK4fjF3Y4DumoVP5
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023c88-5.dat healer behavioral1/memory/3972-8-0x0000000000980000-0x000000000098A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr448285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr448285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr448285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr448285.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr448285.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr448285.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/4512-2101-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x0007000000023c8e-2106.dat family_redline behavioral1/memory/352-2114-0x0000000000360000-0x0000000000390000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ku944527.exe -
Executes dropped EXE 3 IoCs
pid Process 3972 jr448285.exe 4512 ku944527.exe 352 1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr448285.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 34206bb8204852a1f187938ee4d59e672b4291f660290beb7fe664d15d5510a8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4048 4512 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34206bb8204852a1f187938ee4d59e672b4291f660290beb7fe664d15d5510a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku944527.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3972 jr448285.exe 3972 jr448285.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3972 jr448285.exe Token: SeDebugPrivilege 4512 ku944527.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3176 wrote to memory of 3972 3176 34206bb8204852a1f187938ee4d59e672b4291f660290beb7fe664d15d5510a8.exe 83 PID 3176 wrote to memory of 3972 3176 34206bb8204852a1f187938ee4d59e672b4291f660290beb7fe664d15d5510a8.exe 83 PID 3176 wrote to memory of 4512 3176 34206bb8204852a1f187938ee4d59e672b4291f660290beb7fe664d15d5510a8.exe 98 PID 3176 wrote to memory of 4512 3176 34206bb8204852a1f187938ee4d59e672b4291f660290beb7fe664d15d5510a8.exe 98 PID 3176 wrote to memory of 4512 3176 34206bb8204852a1f187938ee4d59e672b4291f660290beb7fe664d15d5510a8.exe 98 PID 4512 wrote to memory of 352 4512 ku944527.exe 104 PID 4512 wrote to memory of 352 4512 ku944527.exe 104 PID 4512 wrote to memory of 352 4512 ku944527.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\34206bb8204852a1f187938ee4d59e672b4291f660290beb7fe664d15d5510a8.exe"C:\Users\Admin\AppData\Local\Temp\34206bb8204852a1f187938ee4d59e672b4291f660290beb7fe664d15d5510a8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr448285.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr448285.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ku944527.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ku944527.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:352
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 13123⤵
- Program crash
PID:4048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4512 -ip 45121⤵PID:644
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD54edc5f5447ec10028c4cd5c94b8f9c28
SHA1c43b5b72c214ef5c31cbc777fa325f91d692be22
SHA256e94afc4f53415ac2feb6dda80d5820ec64f0af1a94781cd3c7e7743e31e7fa09
SHA512a11426332ff00b0168b8c64c8d450d975d263a34d5733b28343db2a0ec36df9b780d6be57bafafef73804701e12040628cd193b559dd627916b57d443c5a3ac9
-
Filesize
414KB
MD5d8cd606404625d6f28bb982f7d8aed76
SHA113997033b3be64d5d1469fc727dd15283960f22c
SHA25684d6a3f7dee986a0ff275a1950cbd50d569e20c7000cbb66416b4967a59baeb5
SHA512424b8bae6a194de09ae5dae79ce73616f23f6c4524e869d5d4baf6992e0192dda5b45190fff016785351cd20e002910568a469b84e27db60c6f8cd466ab3c5f8
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0