Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 22:27
Static task
static1
Behavioral task
behavioral1
Sample
e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exe
Resource
win10v2004-20241007-en
General
-
Target
e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exe
-
Size
530KB
-
MD5
98b3f65b902344ac35b5199e9b5f88a3
-
SHA1
afef835dd4f2a539b8963cb7cec30e9161b01650
-
SHA256
e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8
-
SHA512
44e7bee1ebd04bf53b2c6dc47b5858a0e1a71a0a0463e038a2d15c2d9fcde0dbaa291cfd666fec9dd1efe9a8932fc5f55c9aff3a70f7d620057a4727117da6b4
-
SSDEEP
12288:fMrzy90+PDj5MHJeEEhV/Jf5KXa/D9POntJQ3w:Ey1ZMHJeEEhTAU9PstJQ3w
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr916815.exe healer behavioral1/memory/396-15-0x0000000000DD0000-0x0000000000DDA000-memory.dmp healer -
Healer family
-
Processes:
jr916815.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr916815.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr916815.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr916815.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr916815.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr916815.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr916815.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/5008-22-0x00000000026D0000-0x0000000002716000-memory.dmp family_redline behavioral1/memory/5008-24-0x0000000004C00000-0x0000000004C44000-memory.dmp family_redline behavioral1/memory/5008-82-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-88-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-86-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-84-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-80-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-78-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-76-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-74-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-72-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-70-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-68-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-66-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-64-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-62-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-58-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-56-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-54-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-53-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-50-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-48-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-46-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-44-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-42-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-40-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-38-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-34-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-32-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-30-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-60-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-36-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-28-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-26-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/5008-25-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zicK9945.exejr916815.exeku792342.exepid process 2196 zicK9945.exe 396 jr916815.exe 5008 ku792342.exe -
Processes:
jr916815.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr916815.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exezicK9945.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zicK9945.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2192 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exezicK9945.exeku792342.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zicK9945.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku792342.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr916815.exepid process 396 jr916815.exe 396 jr916815.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr916815.exeku792342.exedescription pid process Token: SeDebugPrivilege 396 jr916815.exe Token: SeDebugPrivilege 5008 ku792342.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exezicK9945.exedescription pid process target process PID 2840 wrote to memory of 2196 2840 e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exe zicK9945.exe PID 2840 wrote to memory of 2196 2840 e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exe zicK9945.exe PID 2840 wrote to memory of 2196 2840 e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exe zicK9945.exe PID 2196 wrote to memory of 396 2196 zicK9945.exe jr916815.exe PID 2196 wrote to memory of 396 2196 zicK9945.exe jr916815.exe PID 2196 wrote to memory of 5008 2196 zicK9945.exe ku792342.exe PID 2196 wrote to memory of 5008 2196 zicK9945.exe ku792342.exe PID 2196 wrote to memory of 5008 2196 zicK9945.exe ku792342.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exe"C:\Users\Admin\AppData\Local\Temp\e07f6a2a39c8b1f8c3c132af02ec0338ee3774b5b2ee0d16f7d54d83776bebf8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicK9945.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicK9945.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr916815.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr916815.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku792342.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku792342.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2192
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD584383357d2bb688385d539cc13b6e2f3
SHA1cc1ed7e8787e145ca0518fa62ce82a4997427ca8
SHA256b9d7ab037f9ddd3dca7a9f5273c369f2c1f6ba83bbf4d7be77c30e953eccc93f
SHA512e008ec58ec30f7d24b703f683ca14a83c7feeb7a7a57290a481be6595d49c9fe8d224adac3d7f09b714d11ba582b76c33e432ecf973a76d4222df1405805acd5
-
Filesize
12KB
MD503ce9f155d445597847f4bebe0db6c66
SHA187f2fe49f1690be07773466cec473fabc6eecbc7
SHA2563962dc8912cff52707da4c912260b33efafd1491d7f0cd2a631394677eeecdac
SHA5129580c9fff5924ed4e91b6d75ba7e34d371ee01035db948d64190ac53556845a838b84464d8f361a22a4a25a2f26521322ff33da4366ed55626469cc6f79dc64f
-
Filesize
434KB
MD5a42c907ff93075ad594ed9b496fca92a
SHA1591f17096a748400030213d0460ce26d713aae12
SHA256fc5d9774661848dbaf699ac00961c411e71386c069d54643500e179311fa460a
SHA512d992b1af7239b619fb516aee5ee9392f934d0bb40e12175af06d9668a12323d631ea7466c54f2f7aa4a3eec02af941c87872a87cceb91c151eadaca0e840283e