Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 21:42
Static task
static1
Behavioral task
behavioral1
Sample
958c1fc3a95b76d9c06d1e2b6121e60c9af1a7dc66df1a8a615da08d4e5b75d8.exe
Resource
win10v2004-20241007-en
General
-
Target
958c1fc3a95b76d9c06d1e2b6121e60c9af1a7dc66df1a8a615da08d4e5b75d8.exe
-
Size
536KB
-
MD5
681477ed5a78013307fa5e4d99234ed9
-
SHA1
3b3b18507610dcd0699c73f46c8bb8e44b098955
-
SHA256
958c1fc3a95b76d9c06d1e2b6121e60c9af1a7dc66df1a8a615da08d4e5b75d8
-
SHA512
3be89deae9c6216f7b4544dd387e1b076c67ee65550f11e749c1882b0bc9a421b587f9bb473aecc4d30f881fa84b75d0da51d9d35cde213e02577ba794cfc03d
-
SSDEEP
12288:xMrsy901gHWyKj1aNJYfxBFNoz2srqLjUSClVx:Jyi9y41aNJYfLFNoXqPURx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr932113.exe healer behavioral1/memory/636-15-0x0000000000B20000-0x0000000000B2A000-memory.dmp healer -
Healer family
-
Processes:
jr932113.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr932113.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr932113.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr932113.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr932113.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr932113.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr932113.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4696-22-0x0000000004D30000-0x0000000004D76000-memory.dmp family_redline behavioral1/memory/4696-24-0x00000000053E0000-0x0000000005424000-memory.dmp family_redline behavioral1/memory/4696-30-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-40-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-88-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-86-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-82-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-80-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-78-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-76-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-74-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-72-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-70-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-66-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-64-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-62-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-60-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-58-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-56-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-54-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-52-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-50-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-48-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-44-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-42-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-38-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-36-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-34-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-32-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-84-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-68-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-46-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-28-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-26-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline behavioral1/memory/4696-25-0x00000000053E0000-0x000000000541F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziBJ3696.exejr932113.exeku796549.exepid process 3112 ziBJ3696.exe 636 jr932113.exe 4696 ku796549.exe -
Processes:
jr932113.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr932113.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
958c1fc3a95b76d9c06d1e2b6121e60c9af1a7dc66df1a8a615da08d4e5b75d8.exeziBJ3696.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 958c1fc3a95b76d9c06d1e2b6121e60c9af1a7dc66df1a8a615da08d4e5b75d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziBJ3696.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2096 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
958c1fc3a95b76d9c06d1e2b6121e60c9af1a7dc66df1a8a615da08d4e5b75d8.exeziBJ3696.exeku796549.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 958c1fc3a95b76d9c06d1e2b6121e60c9af1a7dc66df1a8a615da08d4e5b75d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziBJ3696.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku796549.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr932113.exepid process 636 jr932113.exe 636 jr932113.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr932113.exeku796549.exedescription pid process Token: SeDebugPrivilege 636 jr932113.exe Token: SeDebugPrivilege 4696 ku796549.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
958c1fc3a95b76d9c06d1e2b6121e60c9af1a7dc66df1a8a615da08d4e5b75d8.exeziBJ3696.exedescription pid process target process PID 3428 wrote to memory of 3112 3428 958c1fc3a95b76d9c06d1e2b6121e60c9af1a7dc66df1a8a615da08d4e5b75d8.exe ziBJ3696.exe PID 3428 wrote to memory of 3112 3428 958c1fc3a95b76d9c06d1e2b6121e60c9af1a7dc66df1a8a615da08d4e5b75d8.exe ziBJ3696.exe PID 3428 wrote to memory of 3112 3428 958c1fc3a95b76d9c06d1e2b6121e60c9af1a7dc66df1a8a615da08d4e5b75d8.exe ziBJ3696.exe PID 3112 wrote to memory of 636 3112 ziBJ3696.exe jr932113.exe PID 3112 wrote to memory of 636 3112 ziBJ3696.exe jr932113.exe PID 3112 wrote to memory of 4696 3112 ziBJ3696.exe ku796549.exe PID 3112 wrote to memory of 4696 3112 ziBJ3696.exe ku796549.exe PID 3112 wrote to memory of 4696 3112 ziBJ3696.exe ku796549.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\958c1fc3a95b76d9c06d1e2b6121e60c9af1a7dc66df1a8a615da08d4e5b75d8.exe"C:\Users\Admin\AppData\Local\Temp\958c1fc3a95b76d9c06d1e2b6121e60c9af1a7dc66df1a8a615da08d4e5b75d8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBJ3696.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBJ3696.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr932113.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr932113.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:636 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku796549.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku796549.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2096
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD584c22b905db5a3b39edbbd3c42f0c04f
SHA166da9798445da3cf2d401404819888af50dbb1bd
SHA25663f6e0ad866d1186d1e5f24a6ec0e04e86b7df8218b82725644b772c2ab0e977
SHA51298a9132bfecad4957c9d002e543fd5e1d001a67ec2a6899b1955783f72f2747deb57c1851710073d3f8a2dd0e5e93d2f8da879c0acebd48146304256c570f8c4
-
Filesize
13KB
MD5ac442314efcde50315148e0fcbf6e2ca
SHA1cef32a92433cbea86cbe911db35dbbe5d556d84c
SHA2565aa9830716c8a7b1599eaaefc6d44865468a86b7c88caef874bca29a66dd08af
SHA512125c341ef0d86b636b4b8805515d16340c9d568958d9e737cbf542d8e61e2ce9d9d745a3a45464ad0595beb69a335e73211152457a6be31381aa80a5a974b1c4
-
Filesize
353KB
MD57c57b22f52b63089fd87e8d1137e966a
SHA1ca789cede5b5828cafcd1a0aea0e92a9876ab23c
SHA2561154c81cf1d2cdef7344678cf2b7e3e54f3c7f01ffd9a04ad22044909a4630ab
SHA5126a968b8c6bae0e87ec4473d44ce46072ea0896e67917ec55c06db06ccb710456b940782ed81d190fd88edb090461081c4c1d5820e23630f868967455d311a445