Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
7e8b0bd0251647c5844290fd452d5adeeabb5daeff1f763dbeacfa14d542402e.exe
Resource
win10v2004-20241007-en
General
-
Target
7e8b0bd0251647c5844290fd452d5adeeabb5daeff1f763dbeacfa14d542402e.exe
-
Size
534KB
-
MD5
d9f672a65fe47bc5a5def887845e0722
-
SHA1
d97dd20c0bf42dcc0b6634e698fdb6550be685b1
-
SHA256
7e8b0bd0251647c5844290fd452d5adeeabb5daeff1f763dbeacfa14d542402e
-
SHA512
aba653c8580f92652f89ee921479cb2348c97053ac53d64c65a804952c67d7a9bfd2ac8224c5988a4fb6729a1d0685840f693e8ba90721817e2ee7929c83a21f
-
SSDEEP
12288:CMr3y90RoTKlE7CfIgvw0zpbqW2AFd1E/Mbn:JyZTKlEuIT0ztqjAFngM7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr077605.exe healer behavioral1/memory/2840-15-0x0000000000850000-0x000000000085A000-memory.dmp healer -
Healer family
-
Processes:
jr077605.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr077605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr077605.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr077605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr077605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr077605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr077605.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4268-22-0x0000000002510000-0x0000000002556000-memory.dmp family_redline behavioral1/memory/4268-24-0x0000000004AB0000-0x0000000004AF4000-memory.dmp family_redline behavioral1/memory/4268-32-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-50-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-88-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-87-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-84-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-82-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-81-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-78-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-76-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-74-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-72-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-70-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-68-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-66-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-64-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-62-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-60-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-58-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-56-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-54-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-52-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-46-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-44-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-42-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-38-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-36-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-34-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-30-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-28-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-48-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-40-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-26-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4268-25-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziKp1672.exejr077605.exeku204573.exepid process 1732 ziKp1672.exe 2840 jr077605.exe 4268 ku204573.exe -
Processes:
jr077605.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr077605.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7e8b0bd0251647c5844290fd452d5adeeabb5daeff1f763dbeacfa14d542402e.exeziKp1672.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e8b0bd0251647c5844290fd452d5adeeabb5daeff1f763dbeacfa14d542402e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziKp1672.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2240 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7e8b0bd0251647c5844290fd452d5adeeabb5daeff1f763dbeacfa14d542402e.exeziKp1672.exeku204573.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e8b0bd0251647c5844290fd452d5adeeabb5daeff1f763dbeacfa14d542402e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziKp1672.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku204573.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr077605.exepid process 2840 jr077605.exe 2840 jr077605.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr077605.exeku204573.exedescription pid process Token: SeDebugPrivilege 2840 jr077605.exe Token: SeDebugPrivilege 4268 ku204573.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7e8b0bd0251647c5844290fd452d5adeeabb5daeff1f763dbeacfa14d542402e.exeziKp1672.exedescription pid process target process PID 3920 wrote to memory of 1732 3920 7e8b0bd0251647c5844290fd452d5adeeabb5daeff1f763dbeacfa14d542402e.exe ziKp1672.exe PID 3920 wrote to memory of 1732 3920 7e8b0bd0251647c5844290fd452d5adeeabb5daeff1f763dbeacfa14d542402e.exe ziKp1672.exe PID 3920 wrote to memory of 1732 3920 7e8b0bd0251647c5844290fd452d5adeeabb5daeff1f763dbeacfa14d542402e.exe ziKp1672.exe PID 1732 wrote to memory of 2840 1732 ziKp1672.exe jr077605.exe PID 1732 wrote to memory of 2840 1732 ziKp1672.exe jr077605.exe PID 1732 wrote to memory of 4268 1732 ziKp1672.exe ku204573.exe PID 1732 wrote to memory of 4268 1732 ziKp1672.exe ku204573.exe PID 1732 wrote to memory of 4268 1732 ziKp1672.exe ku204573.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e8b0bd0251647c5844290fd452d5adeeabb5daeff1f763dbeacfa14d542402e.exe"C:\Users\Admin\AppData\Local\Temp\7e8b0bd0251647c5844290fd452d5adeeabb5daeff1f763dbeacfa14d542402e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKp1672.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKp1672.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr077605.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr077605.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku204573.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku204573.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2240
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD533c250c48f3ddd709cc0b339834cf99b
SHA15519f7be551d9772496bb4991f213183aa4025bf
SHA2564f476e18d8dd9b75e0fdb0773ed398b305a6438b9e1cbbea9892b204690000d2
SHA5129833995d58cccc29a23e986a78d9deb2fa83cd1ca86cd311175bc7abf158ccf689d8fa1ae3b91e7d769365a7dca0dfa8826be8ac83e7153d23ed17504d95dbb1
-
Filesize
11KB
MD5ba97a3550b2e12405de53fb87ee74ac3
SHA1c49a8f18ec1f06c81d43105ca9f709633d263b67
SHA25608affa40ce8427a36a74c7389c34b3024154c82a6e99ee28288ee5b2bda10fd8
SHA512ebac208032742df209375fc6645e675782aa9a58aca709c0c90a5a1aecef3d17946d7e2b9d4129d597f701fc63feb6fe6d207d8701b0740686914b5f6b5ea851
-
Filesize
319KB
MD5268640947cbe1e9f4428babafa09b428
SHA148dfbb8503f590159d777e5f2510470a3de8259d
SHA256b89b6ca146348a779f00d70a9d7a2f8b33a1bc96ed13b17cd2846ddb6c316165
SHA512dd536146d1aedaae65495abc6af0ab2bcf4717e10cb48418d5ca5f812c7104667dd6d0c6122a3a11bd36d6bf173263031d2740f11ffb52a732ade42388e1d6aa