Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 18:49
Static task
static1
Behavioral task
behavioral1
Sample
7cfb7d1bcf3f911530054c4264ae32091587bc22a1d085e87de93706adc23be9.exe
Resource
win10v2004-20241007-en
General
-
Target
7cfb7d1bcf3f911530054c4264ae32091587bc22a1d085e87de93706adc23be9.exe
-
Size
507KB
-
MD5
de92e53eb361a828c6dcfc14e65e600a
-
SHA1
c041cd726e40de9036ea590f5c0f1ccbd96ba9c9
-
SHA256
7cfb7d1bcf3f911530054c4264ae32091587bc22a1d085e87de93706adc23be9
-
SHA512
0d82af3e6bfedc02b5519a13e432e4fb3d43ece1e4ab6032b93d758ea2b614e767f5738860e8b2b81ae04fc1ad049c543a213a95030a4f7d963fa508d3908ae2
-
SSDEEP
12288:qMrny90Qr4nx0OS4RZFjBfgfyt+Yzl21xSzcXYFWXxUHN+:dyexNSKZFjBl1R21xEeYFWBk+
Malware Config
Extracted
redline
norm
77.91.124.145:4125
-
auth_value
1514e6c0ec3d10a36f68f61b206f5759
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023c84-5.dat healer behavioral1/memory/380-8-0x00000000007E0000-0x00000000007EA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr204965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr204965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr204965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr204965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr204965.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr204965.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/3676-2101-0x0000000005400000-0x0000000005432000-memory.dmp family_redline behavioral1/files/0x0008000000023c85-2106.dat family_redline behavioral1/memory/3600-2114-0x0000000000100000-0x0000000000130000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation ku580490.exe -
Executes dropped EXE 3 IoCs
pid Process 380 jr204965.exe 3676 ku580490.exe 3600 1.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr204965.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7cfb7d1bcf3f911530054c4264ae32091587bc22a1d085e87de93706adc23be9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5240 3676 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cfb7d1bcf3f911530054c4264ae32091587bc22a1d085e87de93706adc23be9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku580490.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 380 jr204965.exe 380 jr204965.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 380 jr204965.exe Token: SeDebugPrivilege 3676 ku580490.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 652 wrote to memory of 380 652 7cfb7d1bcf3f911530054c4264ae32091587bc22a1d085e87de93706adc23be9.exe 83 PID 652 wrote to memory of 380 652 7cfb7d1bcf3f911530054c4264ae32091587bc22a1d085e87de93706adc23be9.exe 83 PID 652 wrote to memory of 3676 652 7cfb7d1bcf3f911530054c4264ae32091587bc22a1d085e87de93706adc23be9.exe 92 PID 652 wrote to memory of 3676 652 7cfb7d1bcf3f911530054c4264ae32091587bc22a1d085e87de93706adc23be9.exe 92 PID 652 wrote to memory of 3676 652 7cfb7d1bcf3f911530054c4264ae32091587bc22a1d085e87de93706adc23be9.exe 92 PID 3676 wrote to memory of 3600 3676 ku580490.exe 95 PID 3676 wrote to memory of 3600 3676 ku580490.exe 95 PID 3676 wrote to memory of 3600 3676 ku580490.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cfb7d1bcf3f911530054c4264ae32091587bc22a1d085e87de93706adc23be9.exe"C:\Users\Admin\AppData\Local\Temp\7cfb7d1bcf3f911530054c4264ae32091587bc22a1d085e87de93706adc23be9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr204965.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr204965.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:380
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ku580490.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ku580490.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 15083⤵
- Program crash
PID:5240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3676 -ip 36761⤵PID:5196
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5752ffae25ec19d97283402bd59a9c254
SHA1483fa90f9794e47373b9322930c0764c03cba7e9
SHA25691b6b4fb54c40b91733ab4106d727e6944277dc2e6245a9d8d8bce9269a7b7a4
SHA51215ae32b9d76483287548a5d8c2924cbbfe1cfdccbd46998a2f17893eff7615cae44efdd2368d17f0c50c1e34e49bd16e972f404651135becafc500f7cc5c05fa
-
Filesize
435KB
MD5064ff5b0e4800b3dae96dc31cc5a5703
SHA1f09d74f3d195df32c285de1500b462d91e23bb8f
SHA2566abf2857b46b5cba6200d1d293b7984ba7a330649073590592b9294ebafb4416
SHA51211f27ae400139ba68c752fabeb67486a6dde36f4cb9640fbca84bf1c2aa14a2cd6af9e3cca3f2c175be96881fc8a4d23d846e9c54556aced568c708d810517a3
-
Filesize
168KB
MD51073b2e7f778788852d3f7bb79929882
SHA17f5ca4d69e0fcaf8fe6de2e80455a8b90eb6e2c4
SHA256c46ef7b768c697e57d379ddfdfd3fb4931bf3d535730ef60feca9332e7a19feb
SHA51290cacc509128f9dfb4d96ae9e847ed61b2062297f39d03f481fb1f798b45b36a2d3a8fe2e6415bdc8ce363cf21decee5a9e080f23270395712da1fea9f4952d0