Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exe
Resource
win10v2004-20241007-en
General
-
Target
242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exe
-
Size
720KB
-
MD5
4678cdd143e65ef2589a1d77fa59e2cc
-
SHA1
847304e30c2aaa245bc3b3604d196e49a8f50646
-
SHA256
242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3
-
SHA512
d669060bb3866dd4ccfeb46a80e34aae878ec1e9f687953cc4eca7648322a58136fe5d4ae8e8d434b6fd7f0200fcfc5449087ac31df1e1c1c70092e8a9ea7c78
-
SSDEEP
12288:zy90gUp6QrLkWFRT2bpwC/gz7O3HatqCicZTofyFLYFP0vHGpUY6/VcXM:zyQYQrLkgQ3gzS3HaOeTofCGOHiPsp
Malware Config
Extracted
redline
losk
185.161.248.150:4128
-
auth_value
c0a6c391e53d2d9cd27bb17d1d38ada3
Extracted
redline
diza
185.161.248.150:4128
-
auth_value
0d09b419c8bc967f91c68be4a17e92ee
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it103993.exe healer behavioral1/memory/3512-15-0x0000000000630000-0x000000000063A000-memory.dmp healer -
Healer family
-
Processes:
it103993.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it103993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it103993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it103993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it103993.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it103993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it103993.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2380-2173-0x0000000005770000-0x00000000057A2000-memory.dmp family_redline C:\Windows\Temp\1.exe family_redline behavioral1/memory/1968-2186-0x0000000000E30000-0x0000000000E60000-memory.dmp family_redline C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kp163635.exe family_redline behavioral1/memory/2012-2197-0x0000000000F50000-0x0000000000F7E000-memory.dmp family_redline -
Redline family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
jr465539.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation jr465539.exe -
Executes dropped EXE 5 IoCs
Processes:
ziKz6250.exeit103993.exejr465539.exe1.exekp163635.exepid process 4872 ziKz6250.exe 3512 it103993.exe 2380 jr465539.exe 1968 1.exe 2012 kp163635.exe -
Processes:
it103993.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it103993.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exeziKz6250.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziKz6250.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5776 2380 WerFault.exe jr465539.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziKz6250.exejr465539.exe1.exekp163635.exe242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziKz6250.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr465539.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kp163635.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
it103993.exepid process 3512 it103993.exe 3512 it103993.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
it103993.exejr465539.exedescription pid process Token: SeDebugPrivilege 3512 it103993.exe Token: SeDebugPrivilege 2380 jr465539.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exeziKz6250.exejr465539.exedescription pid process target process PID 1940 wrote to memory of 4872 1940 242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exe ziKz6250.exe PID 1940 wrote to memory of 4872 1940 242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exe ziKz6250.exe PID 1940 wrote to memory of 4872 1940 242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exe ziKz6250.exe PID 4872 wrote to memory of 3512 4872 ziKz6250.exe it103993.exe PID 4872 wrote to memory of 3512 4872 ziKz6250.exe it103993.exe PID 4872 wrote to memory of 2380 4872 ziKz6250.exe jr465539.exe PID 4872 wrote to memory of 2380 4872 ziKz6250.exe jr465539.exe PID 4872 wrote to memory of 2380 4872 ziKz6250.exe jr465539.exe PID 2380 wrote to memory of 1968 2380 jr465539.exe 1.exe PID 2380 wrote to memory of 1968 2380 jr465539.exe 1.exe PID 2380 wrote to memory of 1968 2380 jr465539.exe 1.exe PID 1940 wrote to memory of 2012 1940 242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exe kp163635.exe PID 1940 wrote to memory of 2012 1940 242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exe kp163635.exe PID 1940 wrote to memory of 2012 1940 242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exe kp163635.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exe"C:\Users\Admin\AppData\Local\Temp\242993768d1f35c04acea45e34a4503ff498221aa6c0619fe4fab3b919aa43a3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKz6250.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKz6250.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it103993.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\it103993.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3512
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr465539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr465539.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\Temp\1.exe"C:\Windows\Temp\1.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 13804⤵
- Program crash
PID:5776
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kp163635.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\kp163635.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2380 -ip 23801⤵PID:5568
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5119f099ac1c47b7cf6af0aebf3502617
SHA1f5e339ac4a2ee17be071a2029b63f9dd159afd70
SHA256a5354a42ddb6004f32e0c0a7a6140d290738d857919a9629b0c2f742464f9e44
SHA5125b24e35a386550fbda7e1fe7740bca214c54d95a704a65c45401e63f1eae1f390a5828fef184f98db48546ab8ba0c8b4020bada2e6e2d2e57bfb48ef7ca00553
-
Filesize
567KB
MD5884586836cef4ca88fd9dda1ec11b578
SHA1a11c4674574d573cae106c74c3d0c815c0d4872b
SHA256e3889e80574c9a3f58e752159eec17544378854d7f8a2c187a1a5680e0e97534
SHA512c28f3f46b63b7965fa1f5125cc183efc5dacc7de61752eef8950c4a95f897bbcc3f44665f8ff32dced08a119418fc666c09b9ec2841e902f321ab60fdb254544
-
Filesize
11KB
MD53b25724bcbef9d46029e12666d5cae52
SHA1394ca9bada604f0d5b9e29283d52266375266498
SHA256b02a066dcf73625eec2e1ef28cd07ecd0a687261a9d745582af7c388baee50e8
SHA512a45754177e3580e2b7218ddb5642902f6f63a90556050019166a7d92dae86b093b2ae7ee2425143165bab7579f54f06f9bb884cb6143e7bb9a23e1d74f2da7a5
-
Filesize
587KB
MD54f3cc76e2dc62cf10136ef3d84585284
SHA1306f1998242e441a02a7837f91a9d9fe82e103d4
SHA2563a76d93b81d0a94556e3cff902541c0bca5fd52da7f532f04746a7fb86154000
SHA512649392977d6c0cfb4069acf03d2eeb5fefeaf95685aca690b3e06285ee5b94a728bd282262b5e2eb1ae98ad2c053a0b14083c2630e56687eaa7a6ce1c4cb5e33
-
Filesize
168KB
MD59769c25c4a15b0c8af084316d51ab586
SHA1d9df15e4232d136ece8bc89354036adfdc3ec069
SHA25606b517e81040b5c3fc27adb0c5cfbc05b6082a88d3e6087bb2f3f8e941e22913
SHA512cffddfb5283ccae2615dd131eee23a137d9a79270295caa865d6f1cf8fa6650ed74106d41566b2d29f7dad39450e3a1feb46b9c568c4a71ba3329606fdea65a8