Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:21
Static task
static1
Behavioral task
behavioral1
Sample
541e5ccc5661506f1f67c092cdef841401aef53c3513015a80bc330f7069be50.exe
Resource
win10v2004-20241007-en
General
-
Target
541e5ccc5661506f1f67c092cdef841401aef53c3513015a80bc330f7069be50.exe
-
Size
560KB
-
MD5
05ffcc6e83d7af8824ead7954ca4578e
-
SHA1
7b37616d9dae8c9e618441af3b8e43920d4e2122
-
SHA256
541e5ccc5661506f1f67c092cdef841401aef53c3513015a80bc330f7069be50
-
SHA512
47187f777ebd19d4624a0b0fcdf27e32a4c80f2329f7a3ee0e526faf26f204805c95f5ef0075e0ba3c7334ba8ac95aa647abf824ac3a2faf80c2e6f07a0685d4
-
SSDEEP
12288:3MrSy90fyDC05JB2wNt9Mx91M1OAt79je6bkaRkA:Ny+yOaJ71nt7RZ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr996921.exe healer behavioral1/memory/3932-15-0x0000000000350000-0x000000000035A000-memory.dmp healer -
Healer family
-
Processes:
jr996921.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr996921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr996921.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr996921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr996921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr996921.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr996921.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4724-22-0x0000000002920000-0x0000000002966000-memory.dmp family_redline behavioral1/memory/4724-24-0x0000000004E30000-0x0000000004E74000-memory.dmp family_redline behavioral1/memory/4724-30-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-38-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-40-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-88-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-86-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-84-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-82-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-80-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-78-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-76-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-74-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-72-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-70-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-66-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-64-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-62-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-60-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-58-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-56-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-54-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-52-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-50-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-48-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-46-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-42-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-36-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-34-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-32-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-68-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-44-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-28-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-26-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/4724-25-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziuE8932.exejr996921.exeku346950.exepid process 428 ziuE8932.exe 3932 jr996921.exe 4724 ku346950.exe -
Processes:
jr996921.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr996921.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziuE8932.exe541e5ccc5661506f1f67c092cdef841401aef53c3513015a80bc330f7069be50.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziuE8932.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 541e5ccc5661506f1f67c092cdef841401aef53c3513015a80bc330f7069be50.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
541e5ccc5661506f1f67c092cdef841401aef53c3513015a80bc330f7069be50.exeziuE8932.exeku346950.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 541e5ccc5661506f1f67c092cdef841401aef53c3513015a80bc330f7069be50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziuE8932.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku346950.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr996921.exepid process 3932 jr996921.exe 3932 jr996921.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr996921.exeku346950.exedescription pid process Token: SeDebugPrivilege 3932 jr996921.exe Token: SeDebugPrivilege 4724 ku346950.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
541e5ccc5661506f1f67c092cdef841401aef53c3513015a80bc330f7069be50.exeziuE8932.exedescription pid process target process PID 1544 wrote to memory of 428 1544 541e5ccc5661506f1f67c092cdef841401aef53c3513015a80bc330f7069be50.exe ziuE8932.exe PID 1544 wrote to memory of 428 1544 541e5ccc5661506f1f67c092cdef841401aef53c3513015a80bc330f7069be50.exe ziuE8932.exe PID 1544 wrote to memory of 428 1544 541e5ccc5661506f1f67c092cdef841401aef53c3513015a80bc330f7069be50.exe ziuE8932.exe PID 428 wrote to memory of 3932 428 ziuE8932.exe jr996921.exe PID 428 wrote to memory of 3932 428 ziuE8932.exe jr996921.exe PID 428 wrote to memory of 4724 428 ziuE8932.exe ku346950.exe PID 428 wrote to memory of 4724 428 ziuE8932.exe ku346950.exe PID 428 wrote to memory of 4724 428 ziuE8932.exe ku346950.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\541e5ccc5661506f1f67c092cdef841401aef53c3513015a80bc330f7069be50.exe"C:\Users\Admin\AppData\Local\Temp\541e5ccc5661506f1f67c092cdef841401aef53c3513015a80bc330f7069be50.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuE8932.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuE8932.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr996921.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr996921.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku346950.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku346950.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4724
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD522a7ccd00f20b324417ef5631ff68979
SHA1c92e2a40c92dc2a86cd26bf26750d9d9adfba8a0
SHA256bb20f10e0c09386c3bba8a1d0da3e52a1b440a56cedf627199bd7f8cec4e1341
SHA512659046102c719ec0bf89a58b0c41a3db4a64589d9addc059df11ad2b763b6ba0ac45948dbee0768a38f558a7065bee8cf90d52a4855ff65f0bfef7fce8b3a4d0
-
Filesize
13KB
MD520e46bfd3723a1e725395614b945244d
SHA12c5a393fd1baf8177360b9cc978ec24b15b6e07b
SHA256dcfa8bb422418c8a3d8521c3c3df809f4d712e05ccae155adfef40a00b241d8b
SHA512efabd48c9af9e7f881eb520f2e7b1a3117ede33916c31db597c805e5cf27b5087eacc4879f5ee2d2acc080b5df9b3a502dbd27c9a8288d5341537416ae18f6f6
-
Filesize
370KB
MD5a2b6df14e43272b43d3f15345c5daffe
SHA1d1176ba9864b25123a19841bfa1e7805cf3a2e77
SHA256bdb55346be06c81e519de5478a1246e9582fe273b7b6cb636fd206af9cd78af0
SHA512709bc784cc37343ed28f8f48357e693a447f262c3f2568fd02252afaba63c577e68e91cd984fd4f2c1237e962c9771c89c44c90c22ff72c63f26a5619cae769b