Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 21:59
Static task
static1
Behavioral task
behavioral1
Sample
54537b16f35b95b47e4cb3288375dcdae71cbdd6aec2bd7fc593f21de63c31bf.exe
Resource
win10v2004-20241007-en
General
-
Target
54537b16f35b95b47e4cb3288375dcdae71cbdd6aec2bd7fc593f21de63c31bf.exe
-
Size
560KB
-
MD5
e439581471786658b52676f440b1b4a4
-
SHA1
9e178fa059f0c6157c1a9885d9197ceafe949a2a
-
SHA256
54537b16f35b95b47e4cb3288375dcdae71cbdd6aec2bd7fc593f21de63c31bf
-
SHA512
dbd7027af9f9fd24a809667574de7a62fa07b9770e7e31f3939c151944086d3e7797fc96bbc0ecfed42cd4d11fc2a9cc4a495fcda33e9dc5154636477fb6cfa0
-
SSDEEP
12288:dMr2y90HtE4CRheZdnG2N/C6GXH/aYIcUfU124IFH:byMt4LeZN/m/xIc0UpIFH
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr340605.exe healer behavioral1/memory/3124-15-0x0000000000440000-0x000000000044A000-memory.dmp healer -
Healer family
-
Processes:
jr340605.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr340605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr340605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr340605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr340605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr340605.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr340605.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4192-22-0x00000000028E0000-0x0000000002926000-memory.dmp family_redline behavioral1/memory/4192-24-0x0000000004E00000-0x0000000004E44000-memory.dmp family_redline behavioral1/memory/4192-52-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-56-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-88-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-86-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-84-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-82-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-80-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-78-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-74-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-72-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-70-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-68-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-66-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-64-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-62-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-60-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-58-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-54-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-50-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-48-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-46-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-44-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-42-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-40-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-38-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-36-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-34-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-32-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-76-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-30-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-28-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-26-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4192-25-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zixk1342.exejr340605.exeku854054.exepid process 1112 zixk1342.exe 3124 jr340605.exe 4192 ku854054.exe -
Processes:
jr340605.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr340605.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
zixk1342.exe54537b16f35b95b47e4cb3288375dcdae71cbdd6aec2bd7fc593f21de63c31bf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zixk1342.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 54537b16f35b95b47e4cb3288375dcdae71cbdd6aec2bd7fc593f21de63c31bf.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
54537b16f35b95b47e4cb3288375dcdae71cbdd6aec2bd7fc593f21de63c31bf.exezixk1342.exeku854054.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54537b16f35b95b47e4cb3288375dcdae71cbdd6aec2bd7fc593f21de63c31bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zixk1342.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku854054.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr340605.exepid process 3124 jr340605.exe 3124 jr340605.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr340605.exeku854054.exedescription pid process Token: SeDebugPrivilege 3124 jr340605.exe Token: SeDebugPrivilege 4192 ku854054.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
54537b16f35b95b47e4cb3288375dcdae71cbdd6aec2bd7fc593f21de63c31bf.exezixk1342.exedescription pid process target process PID 824 wrote to memory of 1112 824 54537b16f35b95b47e4cb3288375dcdae71cbdd6aec2bd7fc593f21de63c31bf.exe zixk1342.exe PID 824 wrote to memory of 1112 824 54537b16f35b95b47e4cb3288375dcdae71cbdd6aec2bd7fc593f21de63c31bf.exe zixk1342.exe PID 824 wrote to memory of 1112 824 54537b16f35b95b47e4cb3288375dcdae71cbdd6aec2bd7fc593f21de63c31bf.exe zixk1342.exe PID 1112 wrote to memory of 3124 1112 zixk1342.exe jr340605.exe PID 1112 wrote to memory of 3124 1112 zixk1342.exe jr340605.exe PID 1112 wrote to memory of 4192 1112 zixk1342.exe ku854054.exe PID 1112 wrote to memory of 4192 1112 zixk1342.exe ku854054.exe PID 1112 wrote to memory of 4192 1112 zixk1342.exe ku854054.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\54537b16f35b95b47e4cb3288375dcdae71cbdd6aec2bd7fc593f21de63c31bf.exe"C:\Users\Admin\AppData\Local\Temp\54537b16f35b95b47e4cb3288375dcdae71cbdd6aec2bd7fc593f21de63c31bf.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixk1342.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixk1342.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr340605.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr340605.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku854054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku854054.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4192
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD5a099fcf1cad078b68171c0a619342eee
SHA154ac09a74d5211fcfae0250b95cf70514a87c289
SHA256763d4b10edc5e677482a953f234fe397d1f1059bfa8c76c9b2d416ed7d98a434
SHA512ee268d40b889f370006748b0fd64821c15413d822b5481579d5bf578f93265196af877ee770f0b08f366dc8f49b8cae6e08d67918d5e2ef6e9f18cb92cabec48
-
Filesize
13KB
MD5fa49aec64244d736d756addcfaafcdd1
SHA1d136d33d1aa509e79e96c38b82624ca41477615f
SHA25641be76d0eb251042538a44ed7836aa5a454b585688fa8c7e5b771910ef396bd1
SHA51228163717b12ba8a5ed13d35257f4b81ecfd655ad7c8a4c31872ad7a0c6233a33ea065a154bc03365cbf1cafedd099cf043577452ee498b4d138cd63fd1515ac1
-
Filesize
370KB
MD5bcd43d961a159c529d0b8bd6b292b213
SHA113a09f1c9c47881223c468ad8d3331e7a02fb8c8
SHA2561f290084f1924fdbd6a2fa24546a84a334c74064d8ab72de82c681fc523e3209
SHA512c7d30714be3cd8f36d2ee2ba541908d9b560a31edc38ca83f9d9e93c3432a87560065c2920ead13fba30954549102b029c4478fc8a9c1200b89c84c4486639a6