Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe
Resource
win10v2004-20241007-en
General
-
Target
98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe
-
Size
655KB
-
MD5
db306cef50cf3bce054abba0a38e46d0
-
SHA1
bfe4b81824cc8f3f95b9d255d7a29ef5cdb1b90b
-
SHA256
98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4
-
SHA512
569d5be29a7f8f13299134849b4710f9a779d876d9e090dc18e989bd7b40b73a7e1d337265bd0f8ef75d4dc68734aa214246bee4796b395ec3013e018278d197
-
SSDEEP
12288:IMr2y90RamjgMuMDamGiQy3AcSnY84t44E5KZXEqEFMe/NPzMtcNIfFqw2igWS3q:+y0gfMmbiFQVnYn/E5KZ/EPPzjNIEwcq
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca3-12.dat healer behavioral1/memory/1576-15-0x0000000000480000-0x000000000048A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr827019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr827019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr827019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr827019.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr827019.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr827019.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/4996-2104-0x00000000027C0000-0x00000000027F2000-memory.dmp family_redline behavioral1/files/0x0007000000023ca7-2109.dat family_redline behavioral1/memory/4812-2117-0x0000000000080000-0x00000000000B0000-memory.dmp family_redline behavioral1/files/0x0007000000023ca1-2126.dat family_redline behavioral1/memory/3552-2128-0x0000000000180000-0x00000000001AE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ku508394.exe -
Executes dropped EXE 5 IoCs
pid Process 1356 zijA3401.exe 1576 jr827019.exe 4996 ku508394.exe 4812 1.exe 3552 lr372262.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr827019.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zijA3401.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 388 4996 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zijA3401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku508394.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr372262.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1576 jr827019.exe 1576 jr827019.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1576 jr827019.exe Token: SeDebugPrivilege 4996 ku508394.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1780 wrote to memory of 1356 1780 98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe 83 PID 1780 wrote to memory of 1356 1780 98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe 83 PID 1780 wrote to memory of 1356 1780 98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe 83 PID 1356 wrote to memory of 1576 1356 zijA3401.exe 84 PID 1356 wrote to memory of 1576 1356 zijA3401.exe 84 PID 1356 wrote to memory of 4996 1356 zijA3401.exe 96 PID 1356 wrote to memory of 4996 1356 zijA3401.exe 96 PID 1356 wrote to memory of 4996 1356 zijA3401.exe 96 PID 4996 wrote to memory of 4812 4996 ku508394.exe 97 PID 4996 wrote to memory of 4812 4996 ku508394.exe 97 PID 4996 wrote to memory of 4812 4996 ku508394.exe 97 PID 1780 wrote to memory of 3552 1780 98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe 102 PID 1780 wrote to memory of 3552 1780 98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe 102 PID 1780 wrote to memory of 3552 1780 98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe"C:\Users\Admin\AppData\Local\Temp\98878911bab5f15f6669d96fb70a46dd778f23916a38ec9957e0fd45e71736a4N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zijA3401.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zijA3401.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr827019.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr827019.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508394.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508394.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4812
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4996 -s 13724⤵
- Program crash
PID:388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr372262.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr372262.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4996 -ip 49961⤵PID:4516
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5b03e110c14c8e0efa8c3e5ac8f6bf956
SHA1f468bcf7e9ecc5f3e2dec63a1d5e5af4caaae887
SHA25642ca8ef8069d613e4ea50ca1a789c8a250d2384db29c62c24d8dfc4ca746016b
SHA512c906927305e59a5ee4529eebf54bf2b4f63064d9299fdacb012bcbf4dbd8f8a3ed2561c8346cdac1e715a86ed81f9f02d1a1dd05953979364e38e7fde826dcb6
-
Filesize
502KB
MD5239814d207a2e61bd6dd1c10abedf9cb
SHA1ad21f455c2e670c149021df9b348bcacb83059b7
SHA256f0ad2f8ebef4cd16dc2eb4ed914a93390483f712e7c56da0b79fc7de9b2c4d3d
SHA512bc6e41b252ea90c293b21341f1706d0be7c98e07d02b38246c5da0c4a71ee47742d0fa47f4736c86cef4b9cb594a3fcfa5fc732942fdda9d2e0ce151dac3bc23
-
Filesize
11KB
MD5dfa58f6c40c794e3454b9ab7d7024ab1
SHA141282d193f600b4d07353b8989afa0428c46e469
SHA2566c068871144f3ab3a67b0c67cbbb1eb23434154166028e3d012f4703582dba68
SHA512f53f6a0e2d2b5dbc4c579557a1400d792d66643b3e54ff05c1dbfe11a0780b76b40e42adfcfd93f2d87c9f65d0fb448c3a77c9a9adb2b1375aada1101a467800
-
Filesize
424KB
MD58a940e3e925f449298a4ad9afd38f012
SHA19cb491fdc66acf6e517d885d2f8494494cc6edde
SHA2561583e963ab140cc5a8704f3f1dd39c1d9fa9b804ee35a59484ffc2f7e516b430
SHA5121602fae5dd3d3bc0b915ca73dc29b88c47b6bb5cbf620059ca75597d9fea0df40b2085b2bea0eab326f8d589d299d4859483bdf30e4f7219b6cd048eeb3d2693
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0