Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:06
Static task
static1
Behavioral task
behavioral1
Sample
f91892992991b025d9dfb6af1c9e3bd05ecf69757270199412fdc20d7bd35b2d.exe
Resource
win10v2004-20241007-en
General
-
Target
f91892992991b025d9dfb6af1c9e3bd05ecf69757270199412fdc20d7bd35b2d.exe
-
Size
522KB
-
MD5
23047ab2d3bf9a9f2b925662bddec34b
-
SHA1
414129355427d01511dff27aa25f04cb929319cd
-
SHA256
f91892992991b025d9dfb6af1c9e3bd05ecf69757270199412fdc20d7bd35b2d
-
SHA512
e10781e40db5623c0824e91491782fe31471a53a82384959c49f68ab85d8b4a8d1d93eb924d95acc18c9dcdde031f95935096918ea36e289ed74ee9d7d506c52
-
SSDEEP
12288:ZMr1y90bPe0RBOym/tMOtCVpVsiZGhP+:IyWm0Rgr/mOtCV/sj+
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr726358.exe healer behavioral1/memory/4740-15-0x0000000000410000-0x000000000041A000-memory.dmp healer -
Healer family
-
Processes:
jr726358.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr726358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr726358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr726358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr726358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr726358.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr726358.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4864-22-0x00000000025B0000-0x00000000025F6000-memory.dmp family_redline behavioral1/memory/4864-24-0x0000000002650000-0x0000000002694000-memory.dmp family_redline behavioral1/memory/4864-28-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-38-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-88-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-86-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-82-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-80-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-78-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-76-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-74-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-72-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-70-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-68-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-66-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-62-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-60-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-58-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-56-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-54-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-52-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-50-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-48-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-46-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-44-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-40-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-36-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-34-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-32-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-30-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-84-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-64-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-42-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-26-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/4864-25-0x0000000002650000-0x000000000268F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziGC0390.exejr726358.exeku915758.exepid process 1140 ziGC0390.exe 4740 jr726358.exe 4864 ku915758.exe -
Processes:
jr726358.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr726358.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f91892992991b025d9dfb6af1c9e3bd05ecf69757270199412fdc20d7bd35b2d.exeziGC0390.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f91892992991b025d9dfb6af1c9e3bd05ecf69757270199412fdc20d7bd35b2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziGC0390.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f91892992991b025d9dfb6af1c9e3bd05ecf69757270199412fdc20d7bd35b2d.exeziGC0390.exeku915758.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f91892992991b025d9dfb6af1c9e3bd05ecf69757270199412fdc20d7bd35b2d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziGC0390.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku915758.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr726358.exepid process 4740 jr726358.exe 4740 jr726358.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr726358.exeku915758.exedescription pid process Token: SeDebugPrivilege 4740 jr726358.exe Token: SeDebugPrivilege 4864 ku915758.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f91892992991b025d9dfb6af1c9e3bd05ecf69757270199412fdc20d7bd35b2d.exeziGC0390.exedescription pid process target process PID 3756 wrote to memory of 1140 3756 f91892992991b025d9dfb6af1c9e3bd05ecf69757270199412fdc20d7bd35b2d.exe ziGC0390.exe PID 3756 wrote to memory of 1140 3756 f91892992991b025d9dfb6af1c9e3bd05ecf69757270199412fdc20d7bd35b2d.exe ziGC0390.exe PID 3756 wrote to memory of 1140 3756 f91892992991b025d9dfb6af1c9e3bd05ecf69757270199412fdc20d7bd35b2d.exe ziGC0390.exe PID 1140 wrote to memory of 4740 1140 ziGC0390.exe jr726358.exe PID 1140 wrote to memory of 4740 1140 ziGC0390.exe jr726358.exe PID 1140 wrote to memory of 4864 1140 ziGC0390.exe ku915758.exe PID 1140 wrote to memory of 4864 1140 ziGC0390.exe ku915758.exe PID 1140 wrote to memory of 4864 1140 ziGC0390.exe ku915758.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f91892992991b025d9dfb6af1c9e3bd05ecf69757270199412fdc20d7bd35b2d.exe"C:\Users\Admin\AppData\Local\Temp\f91892992991b025d9dfb6af1c9e3bd05ecf69757270199412fdc20d7bd35b2d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGC0390.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGC0390.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr726358.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr726358.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku915758.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku915758.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4864
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5a7b17896aaa9d2d380cb6db87bb2cf6c
SHA181b5009cad8d24d2c36708e72bfe6262414de8d2
SHA256dd336be41675e3ce372ab4da5bab1f2557ec32f639a0c1dc1c2184e19d8873e0
SHA512c338bf133e6911182bcf6be62b499c7f4f1181153ca2b65fbdfb740bb218cbe4e4973b0b3f78056bbf02b9670330460eda5f03b51641e05d56d653df661d4aff
-
Filesize
14KB
MD52c09f2d4d93a02aee9385d21182d1cc6
SHA14e8f981ce61f28c8ad12bea8fe732ed021019ae3
SHA256c5801d0c36f519b9d4bb84fb828f9a8a8f843b962d8852e48c4cfc94ca3ec4f6
SHA51219163787ff1e72d9b5788d45f4b2c2b064af8931faf58f71f13949844251f4c81c55725181b09446d7bc1c690a4f4ae8caeb3a589f98fb8a36fcc3c11b39a0bc
-
Filesize
295KB
MD57ab12a68dfff8297d66c3d50f7c8175f
SHA1d3afb11d31309d711a8e09d06b2b6403429f1707
SHA2561a982cb0e488ed8d0229a7afbda20601e175eb8705ef283bdf4c0a3974115ec5
SHA512efa0eede3c5435b5327a15b01ca3601b529694a3613f99ee952cf99d0f3c76466bdad322a07ef5482d0303d295b54fb5d091a8207a51b9bb981091d033a41b49