Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 05:24
Static task
static1
Behavioral task
behavioral1
Sample
96f7a6e37ec8eede392563df34208e0a0bf30d5fde1a5b74d679718ba7032b46.exe
Resource
win10v2004-20241007-en
General
-
Target
96f7a6e37ec8eede392563df34208e0a0bf30d5fde1a5b74d679718ba7032b46.exe
-
Size
537KB
-
MD5
0627064fb73f91eb79384a2a54e8be1e
-
SHA1
6fce5e0339d9e7a85984e74778589f02c1ecba1f
-
SHA256
96f7a6e37ec8eede392563df34208e0a0bf30d5fde1a5b74d679718ba7032b46
-
SHA512
5a4f7b7d08167f0030582e545d2baca6b0feaff14202fdfbf80f9ed5397cc1094075a210de365be8d639a1228561fe02c2647670ae966166b89cb67ea9d7815b
-
SSDEEP
12288:YMrjy90qFB/JTqcfUT0EJ0y+5vqFYALBU4q:Ly1FTwTHJeiPK4q
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr294775.exe healer behavioral1/memory/3044-15-0x0000000000920000-0x000000000092A000-memory.dmp healer -
Healer family
-
Processes:
jr294775.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr294775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr294775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr294775.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr294775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr294775.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr294775.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4136-22-0x00000000024F0000-0x0000000002536000-memory.dmp family_redline behavioral1/memory/4136-24-0x0000000004A90000-0x0000000004AD4000-memory.dmp family_redline behavioral1/memory/4136-48-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-58-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-86-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-84-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-82-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-80-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-78-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-76-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-72-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-70-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-68-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-66-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-64-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-56-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-54-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-52-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-50-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-46-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-44-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-42-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-40-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-36-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-34-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-32-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-88-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-74-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-62-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-60-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-38-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-30-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-28-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-26-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/4136-25-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziTH0223.exejr294775.exeku440864.exepid process 4124 ziTH0223.exe 3044 jr294775.exe 4136 ku440864.exe -
Processes:
jr294775.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr294775.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziTH0223.exe96f7a6e37ec8eede392563df34208e0a0bf30d5fde1a5b74d679718ba7032b46.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziTH0223.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 96f7a6e37ec8eede392563df34208e0a0bf30d5fde1a5b74d679718ba7032b46.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
96f7a6e37ec8eede392563df34208e0a0bf30d5fde1a5b74d679718ba7032b46.exeziTH0223.exeku440864.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96f7a6e37ec8eede392563df34208e0a0bf30d5fde1a5b74d679718ba7032b46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziTH0223.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku440864.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr294775.exepid process 3044 jr294775.exe 3044 jr294775.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr294775.exeku440864.exedescription pid process Token: SeDebugPrivilege 3044 jr294775.exe Token: SeDebugPrivilege 4136 ku440864.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
96f7a6e37ec8eede392563df34208e0a0bf30d5fde1a5b74d679718ba7032b46.exeziTH0223.exedescription pid process target process PID 1152 wrote to memory of 4124 1152 96f7a6e37ec8eede392563df34208e0a0bf30d5fde1a5b74d679718ba7032b46.exe ziTH0223.exe PID 1152 wrote to memory of 4124 1152 96f7a6e37ec8eede392563df34208e0a0bf30d5fde1a5b74d679718ba7032b46.exe ziTH0223.exe PID 1152 wrote to memory of 4124 1152 96f7a6e37ec8eede392563df34208e0a0bf30d5fde1a5b74d679718ba7032b46.exe ziTH0223.exe PID 4124 wrote to memory of 3044 4124 ziTH0223.exe jr294775.exe PID 4124 wrote to memory of 3044 4124 ziTH0223.exe jr294775.exe PID 4124 wrote to memory of 4136 4124 ziTH0223.exe ku440864.exe PID 4124 wrote to memory of 4136 4124 ziTH0223.exe ku440864.exe PID 4124 wrote to memory of 4136 4124 ziTH0223.exe ku440864.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96f7a6e37ec8eede392563df34208e0a0bf30d5fde1a5b74d679718ba7032b46.exe"C:\Users\Admin\AppData\Local\Temp\96f7a6e37ec8eede392563df34208e0a0bf30d5fde1a5b74d679718ba7032b46.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTH0223.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTH0223.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr294775.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr294775.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku440864.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku440864.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4136
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD57c52beff400a1cb46e7882129737bf7a
SHA15299d0cc3f539f5b7ac5e086a2edb9861df292c6
SHA256c4a092f0b77442a70c2619d6477d0d76c3a45e51cc77615ed81839aac149460d
SHA5126092a66473d04eb918e814c070d577bb82a1f15fc29884d1cc0be5bc785dc2ab0b777d4a28ebfa2ebf05b1aaba86086af535d60e14d61e3633158e7c15cdf28e
-
Filesize
13KB
MD5829084929aaf4f6156f1b3e2b97e5c2b
SHA1bed39868ba6cde3e2c0daa1d45c404879b1f3271
SHA2561d706ab5537d13b880103c53eb673e89e7d45389e1907747b643fff2e9453cc5
SHA51236415819bc95076b080cd8bdcbadae057d1a76a8c93bc86d084ba2a8ea83748ce27b5425202188a3e7991fb70928d88cf75f72d9821ca5a8a02f37bc9369945d
-
Filesize
311KB
MD5da2b1a2afa277b9e1d671f6b954c3442
SHA1753ab3e98060c2b6f669adcef384fb4cdf1c02e9
SHA256f1933ae4675914abca308efbf64da5cda2dc2ad9478121769d0260e2e27d46e1
SHA5123f3577b6432e49fafdd0516b899af28b247fc2a0f2c0fd6f197f275bc1a793c3d83d11f525eb0bdafc72b9b080de53c648c018c249df69bfa52935e4360e6a20