Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exe
Resource
win10v2004-20241007-en
General
-
Target
1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exe
-
Size
560KB
-
MD5
562a3701c1c68ced57ccf731b5363195
-
SHA1
5d4646eb309549d6aaa0f2e5ed97d051960329f1
-
SHA256
1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38
-
SHA512
9f91cbb04412f3d71175f5ae69e078824c44204425b46214cb21a97fa9f57d55dd6005e7beff29bd9797738338f3c69894f7cf9bf46d317fdbe573aaf8970228
-
SSDEEP
12288:+MrKy90bRt0mkO07iskGBfw/zMZey9ElxJ+89RVCQVcw37Ni0LEl5:IyQkqszoYZey9ElT9RTcwrE3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr232482.exe healer behavioral1/memory/2448-15-0x0000000000DF0000-0x0000000000DFA000-memory.dmp healer -
Healer family
-
Processes:
jr232482.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr232482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr232482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr232482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr232482.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr232482.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr232482.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1120-22-0x0000000002710000-0x0000000002756000-memory.dmp family_redline behavioral1/memory/1120-24-0x0000000004E10000-0x0000000004E54000-memory.dmp family_redline behavioral1/memory/1120-30-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-36-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-34-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-32-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-70-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-28-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-26-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-25-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-88-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-87-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-84-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-82-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-80-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-78-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-76-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-74-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-72-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-68-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-66-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-64-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-62-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-60-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-58-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-56-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-54-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-52-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-50-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-48-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-46-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-44-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-42-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-40-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1120-38-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziAC9921.exejr232482.exeku553728.exepid process 3104 ziAC9921.exe 2448 jr232482.exe 1120 ku553728.exe -
Processes:
jr232482.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr232482.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exeziAC9921.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAC9921.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku553728.exe1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exeziAC9921.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku553728.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziAC9921.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr232482.exepid process 2448 jr232482.exe 2448 jr232482.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr232482.exeku553728.exedescription pid process Token: SeDebugPrivilege 2448 jr232482.exe Token: SeDebugPrivilege 1120 ku553728.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exeziAC9921.exedescription pid process target process PID 1500 wrote to memory of 3104 1500 1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exe ziAC9921.exe PID 1500 wrote to memory of 3104 1500 1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exe ziAC9921.exe PID 1500 wrote to memory of 3104 1500 1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exe ziAC9921.exe PID 3104 wrote to memory of 2448 3104 ziAC9921.exe jr232482.exe PID 3104 wrote to memory of 2448 3104 ziAC9921.exe jr232482.exe PID 3104 wrote to memory of 1120 3104 ziAC9921.exe ku553728.exe PID 3104 wrote to memory of 1120 3104 ziAC9921.exe ku553728.exe PID 3104 wrote to memory of 1120 3104 ziAC9921.exe ku553728.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exe"C:\Users\Admin\AppData\Local\Temp\1fffd60cb0f3cc7b2d9a583fc301d059ddfcf1b9cb0e5fe8ecba996da1a4de38.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAC9921.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAC9921.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr232482.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr232482.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku553728.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku553728.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406KB
MD5ef360bc427e94c46b0be5c64ba04bc9d
SHA1db8f95b21f3c0527110674f2845c617bed69a858
SHA2562e5b5d3efbe39ab19bfb62e2fde3b43ab891671a49b84c7237168b722794b9ff
SHA5121cfe00522db70eb5308d66970af3bde804e165351bb1f035e66614d7b128988c4ed87da738ca3e221b0ab4c5173d3ed5490ca22153fd0c44f6aaeb7c9bcaa41c
-
Filesize
12KB
MD58751bd643d39995fa22993d1b9ec8ed0
SHA133fe43fc1f3b9321a1078fe27441f4691588c969
SHA256a336b26a4344f779815b11c35eef8c3766580cf7e3b7d999f592ba71896bc9f5
SHA512cdd6a2166f26183e8e454d4f3aa83b3c4a08e11f19d4dedfa4fa591d8e51e96afaf21c91bedcb62eabd66dedebb24ac4a233bd572cde8591f37018b806b81bab
-
Filesize
372KB
MD50e6fce7ba5bb8d471319c60336fcb595
SHA132ef7ed5f96e81dab407cdc896a1548a8cc72f88
SHA256746acaa24b311f16d84736a83912866896894bc8d69312a665b41ab7b669ddea
SHA512c1ece45852e422a9b5f8a0c9ef213a028d9303af2b01e7d767a336b390ae6719339b359028c4d04b2a66c4c8a4e3eed087a5696785c49320bd6d528dc5ff1025