Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-11-2024 00:06
Static task
static1
Behavioral task
behavioral1
Sample
87a310a0a5a79122e813dfe265e8456aeb2d5ca77c3a15b9ddd4a312c9d8e66b.exe
Resource
win10v2004-20241007-en
General
-
Target
87a310a0a5a79122e813dfe265e8456aeb2d5ca77c3a15b9ddd4a312c9d8e66b.exe
-
Size
655KB
-
MD5
d62cbe897661d6f6d29565777c8d776e
-
SHA1
435f921b283368529ab2985f1a5a788b63a0585c
-
SHA256
87a310a0a5a79122e813dfe265e8456aeb2d5ca77c3a15b9ddd4a312c9d8e66b
-
SHA512
fc1f71f9c64c73753b4339168a04d4acf8cc6ec10fe63861b425356bb88d9700e759787261dbf37a23ab9af83b0980a59bd9f44bdc8652e38d2c1c2500dd32f4
-
SSDEEP
12288:PMrUy90hTG2huVook7johurSnY8et44QqwZ1BqMBOe/NP3/tmJFndGrck:7yk62GooGj8u+nYN/QqwZiMxP3/tmjdU
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Extracted
redline
diza
77.91.124.145:4125
-
auth_value
bbab0d2f0ae4d4fdd6b17077d93b3e80
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c67-12.dat healer behavioral1/memory/4480-15-0x0000000000490000-0x000000000049A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr269770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr269770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr269770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr269770.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr269770.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr269770.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/5100-2105-0x0000000005540000-0x0000000005572000-memory.dmp family_redline behavioral1/files/0x000d000000023b24-2110.dat family_redline behavioral1/memory/3916-2118-0x0000000000040000-0x0000000000070000-memory.dmp family_redline behavioral1/files/0x0007000000023c65-2128.dat family_redline behavioral1/memory/5664-2129-0x0000000000CD0000-0x0000000000CFE000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation ku712082.exe -
Executes dropped EXE 5 IoCs
pid Process 4564 zidV4423.exe 4480 jr269770.exe 5100 ku712082.exe 3916 1.exe 5664 lr807702.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr269770.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 87a310a0a5a79122e813dfe265e8456aeb2d5ca77c3a15b9ddd4a312c9d8e66b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidV4423.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5864 5100 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lr807702.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87a310a0a5a79122e813dfe265e8456aeb2d5ca77c3a15b9ddd4a312c9d8e66b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zidV4423.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku712082.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4480 jr269770.exe 4480 jr269770.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4480 jr269770.exe Token: SeDebugPrivilege 5100 ku712082.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2356 wrote to memory of 4564 2356 87a310a0a5a79122e813dfe265e8456aeb2d5ca77c3a15b9ddd4a312c9d8e66b.exe 83 PID 2356 wrote to memory of 4564 2356 87a310a0a5a79122e813dfe265e8456aeb2d5ca77c3a15b9ddd4a312c9d8e66b.exe 83 PID 2356 wrote to memory of 4564 2356 87a310a0a5a79122e813dfe265e8456aeb2d5ca77c3a15b9ddd4a312c9d8e66b.exe 83 PID 4564 wrote to memory of 4480 4564 zidV4423.exe 84 PID 4564 wrote to memory of 4480 4564 zidV4423.exe 84 PID 4564 wrote to memory of 5100 4564 zidV4423.exe 94 PID 4564 wrote to memory of 5100 4564 zidV4423.exe 94 PID 4564 wrote to memory of 5100 4564 zidV4423.exe 94 PID 5100 wrote to memory of 3916 5100 ku712082.exe 95 PID 5100 wrote to memory of 3916 5100 ku712082.exe 95 PID 5100 wrote to memory of 3916 5100 ku712082.exe 95 PID 2356 wrote to memory of 5664 2356 87a310a0a5a79122e813dfe265e8456aeb2d5ca77c3a15b9ddd4a312c9d8e66b.exe 100 PID 2356 wrote to memory of 5664 2356 87a310a0a5a79122e813dfe265e8456aeb2d5ca77c3a15b9ddd4a312c9d8e66b.exe 100 PID 2356 wrote to memory of 5664 2356 87a310a0a5a79122e813dfe265e8456aeb2d5ca77c3a15b9ddd4a312c9d8e66b.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\87a310a0a5a79122e813dfe265e8456aeb2d5ca77c3a15b9ddd4a312c9d8e66b.exe"C:\Users\Admin\AppData\Local\Temp\87a310a0a5a79122e813dfe265e8456aeb2d5ca77c3a15b9ddd4a312c9d8e66b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidV4423.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidV4423.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr269770.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr269770.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4480
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku712082.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku712082.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3916
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 11924⤵
- Program crash
PID:5864
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr807702.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr807702.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5664
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5100 -ip 51001⤵PID:5992
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5e7c2793c874d6b34aba422a807570cae
SHA1cbd6d95011b58b33877f377eaa6394c3242e279f
SHA2562aeb8f69391fcedaba22fb55a5635f15ba8ebfdd9eb4547b64c89af6a4055b9c
SHA512ae1fbfb9d24d5210820af5c441e00a4fc28cd417578d7a0914d510c641cf7f78d7f569ddf9d20400a3eed82c9c9ee1e2f48790cef9be8f4b1957e8dbd4a9164b
-
Filesize
502KB
MD56b28771c753f536bcd5dc7ba4c539473
SHA15269a43ef9d45cc7ce2a10b17d9243c63e3325e2
SHA25639516a5f637ba00c03232bee127cffbce422665a8cf5c40e7ab1c6321b9df492
SHA512cfd1489f2a6dbafb0548d952338fe81c582627bb3d3eb03f02446e3519ac331695e84958d19ef6f3a4c79be51446b3cf70a3ae5ae1182e1d0abe3eb1ee6167ac
-
Filesize
11KB
MD5ab494c8e359b9e9025d5b9fa7c5ae36e
SHA16450ee09d86e9be587e81532e161a6580653d30d
SHA2567528ad8d806765594efe5f3b5c4888ad7b473c6e3dce4f5c69c58724e573c038
SHA512148bc75170271de5cb49bc32d0a6ca6e61e662a69aea948709dc5c9329609f5d62810433691ce1859b0e7453ed1b36dcae124623b11d489b93c3f2680c0c4a64
-
Filesize
424KB
MD579e7c47b96e082854fbf12ab6625cbcf
SHA11ecde063d2966289d18c415d1c4249574e600d5f
SHA2563bb9d5a11572a36519352505e9054cf3a9809a88a40e357a282fa86707673719
SHA5124c86336903169f93bf288215b2adc9ffd323358721824b408397256b94de651f772bf56fe82d01d3c8118fcc6a2bbaba40d2ef40500cd28effa38d5e45ff4217
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0