Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 21:45
Static task
static1
Behavioral task
behavioral1
Sample
ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61.exe
Resource
win10v2004-20241007-en
General
-
Target
ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61.exe
-
Size
522KB
-
MD5
653e4e2d89abbbff09677f408db5bf0a
-
SHA1
82771db98be7254ca83c499c20c4aa305abfb7fb
-
SHA256
ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61
-
SHA512
d041cbc49f126d416b9ebac36dfbf0aa6c3abf08074c9aba5aae1e25f86c7fa83aa19870d99827ebdcd74d60983ac25a73885fd8f47e2149457ec75bc6e6de4c
-
SSDEEP
6144:Kcy+bnr+Dp0yN90QEg1CkT88zr6ouILRQN1B7INYNM532/FdmRJioM23EL/zMWge:kMrjy908CZ8AISfWNL329yEMEdgzcCu
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr867048.exe healer behavioral1/memory/2740-15-0x00000000002B0000-0x00000000002BA000-memory.dmp healer -
Healer family
-
Processes:
jr867048.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr867048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr867048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr867048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr867048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr867048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr867048.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4864-22-0x00000000024D0000-0x0000000002516000-memory.dmp family_redline behavioral1/memory/4864-24-0x0000000004AA0000-0x0000000004AE4000-memory.dmp family_redline behavioral1/memory/4864-34-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-88-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-86-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-84-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-82-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-80-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-78-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-76-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-72-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-70-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-68-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-66-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-64-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-62-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-60-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-58-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-56-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-54-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-52-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-50-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-48-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-46-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-44-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-42-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-40-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-38-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-36-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-32-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-30-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-74-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-28-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-26-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4864-25-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziik8861.exejr867048.exeku956228.exepid process 2140 ziik8861.exe 2740 jr867048.exe 4864 ku956228.exe -
Processes:
jr867048.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr867048.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61.exeziik8861.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziik8861.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku956228.exeab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61.exeziik8861.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku956228.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziik8861.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr867048.exepid process 2740 jr867048.exe 2740 jr867048.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr867048.exeku956228.exedescription pid process Token: SeDebugPrivilege 2740 jr867048.exe Token: SeDebugPrivilege 4864 ku956228.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61.exeziik8861.exedescription pid process target process PID 4448 wrote to memory of 2140 4448 ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61.exe ziik8861.exe PID 4448 wrote to memory of 2140 4448 ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61.exe ziik8861.exe PID 4448 wrote to memory of 2140 4448 ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61.exe ziik8861.exe PID 2140 wrote to memory of 2740 2140 ziik8861.exe jr867048.exe PID 2140 wrote to memory of 2740 2140 ziik8861.exe jr867048.exe PID 2140 wrote to memory of 4864 2140 ziik8861.exe ku956228.exe PID 2140 wrote to memory of 4864 2140 ziik8861.exe ku956228.exe PID 2140 wrote to memory of 4864 2140 ziik8861.exe ku956228.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61.exe"C:\Users\Admin\AppData\Local\Temp\ab92b31db46de664b96c58e8883803af4b649b95019841e1a5bec9e7dc8caa61.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziik8861.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziik8861.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr867048.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr867048.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku956228.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku956228.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4864
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5d6db6a0aee5bfe7effd59c87b7f9e3d0
SHA16d3bf26960a06ea26bd41a07a119944d0967b12d
SHA256b7355b8b2b13025df21a56c59f2b23acaac3c7ffedcb21924c685b7b7381d9e8
SHA51292367fa3554c9334dff7b8cb3fe16510a157519a7568e4d12ed1796c19b6cedf4508556d8460384c00e5f2b7417c3468784bf8e46d8d34a0675f1d5ada87c1e3
-
Filesize
14KB
MD5fc4e1939d53a9418166c25c8d70f22fa
SHA1a660b2f660dd054bccda2d760a8b50dffb81c996
SHA2565b3022deb1e35b9343818994312c48c9e6906b227d8c433db8f2b07bdf82000b
SHA51298178125fa74a345273e4b7ad682601e1b816380c7268e0b467469eb6f417235529a0fe3ffff5ece74311420dc304a46467f1b39f8e688ed0e76f44c73c6a309
-
Filesize
295KB
MD5149e00252d32caa163d86db7770b50bf
SHA12b9945d86efa0b1810ba1a32e48166c0b45e6af4
SHA2562c9a263d3ffe54a8426541071b5098cf1aaca24562431121387cb6b6246ec6f4
SHA51296ab59fa4e338c3363bbaf1342382fc684736ac143284cc7e9d05bb8bbcdddfffbc769900483856034376f2ae593d0c0957f1b60b22936f6ac5bf4be50386567