Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 06:17
Static task
static1
Behavioral task
behavioral1
Sample
81291118f0541568f1216fbf49905b985c65fca4f98ceae041039b6e7d62bce9.exe
Resource
win10v2004-20241007-en
General
-
Target
81291118f0541568f1216fbf49905b985c65fca4f98ceae041039b6e7d62bce9.exe
-
Size
530KB
-
MD5
4fd0bd95b5f15adb0707bebcb9a70369
-
SHA1
7f2bca8da437eb2cba7b1dbd2a99172dd0fa2fac
-
SHA256
81291118f0541568f1216fbf49905b985c65fca4f98ceae041039b6e7d62bce9
-
SHA512
5ad3bd381b38debaa43e96621b0d3ff2068225e9dc01bc6368a1515625f612d4e9b71821f27890fca6c1fa1ff449829d30468867bcc12e2f959105c4a0257d64
-
SSDEEP
12288:IMrAy90TYdS67Pjksov3fVB4Y0+v/Vc0m80S:YyDdS6Yfb4Ev/Vl0S
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr647667.exe healer behavioral1/memory/428-15-0x0000000000BB0000-0x0000000000BBA000-memory.dmp healer -
Healer family
-
Processes:
jr647667.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr647667.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr647667.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr647667.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr647667.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr647667.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr647667.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3988-21-0x0000000002930000-0x0000000002976000-memory.dmp family_redline behavioral1/memory/3988-23-0x0000000002B20000-0x0000000002B64000-memory.dmp family_redline behavioral1/memory/3988-33-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-37-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-87-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-85-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-81-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-79-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-77-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-75-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-73-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-71-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-69-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-67-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-65-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-61-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-59-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-57-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-55-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-51-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-49-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-47-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-45-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-41-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-39-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-35-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-31-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-29-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-83-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-63-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-53-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-43-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-27-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-25-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline behavioral1/memory/3988-24-0x0000000002B20000-0x0000000002B5F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziHX3860.exejr647667.exeku407214.exepid process 3504 ziHX3860.exe 428 jr647667.exe 3988 ku407214.exe -
Processes:
jr647667.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr647667.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
81291118f0541568f1216fbf49905b985c65fca4f98ceae041039b6e7d62bce9.exeziHX3860.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 81291118f0541568f1216fbf49905b985c65fca4f98ceae041039b6e7d62bce9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziHX3860.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
81291118f0541568f1216fbf49905b985c65fca4f98ceae041039b6e7d62bce9.exeziHX3860.exeku407214.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81291118f0541568f1216fbf49905b985c65fca4f98ceae041039b6e7d62bce9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziHX3860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku407214.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr647667.exepid process 428 jr647667.exe 428 jr647667.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr647667.exeku407214.exedescription pid process Token: SeDebugPrivilege 428 jr647667.exe Token: SeDebugPrivilege 3988 ku407214.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
81291118f0541568f1216fbf49905b985c65fca4f98ceae041039b6e7d62bce9.exeziHX3860.exedescription pid process target process PID 3800 wrote to memory of 3504 3800 81291118f0541568f1216fbf49905b985c65fca4f98ceae041039b6e7d62bce9.exe ziHX3860.exe PID 3800 wrote to memory of 3504 3800 81291118f0541568f1216fbf49905b985c65fca4f98ceae041039b6e7d62bce9.exe ziHX3860.exe PID 3800 wrote to memory of 3504 3800 81291118f0541568f1216fbf49905b985c65fca4f98ceae041039b6e7d62bce9.exe ziHX3860.exe PID 3504 wrote to memory of 428 3504 ziHX3860.exe jr647667.exe PID 3504 wrote to memory of 428 3504 ziHX3860.exe jr647667.exe PID 3504 wrote to memory of 3988 3504 ziHX3860.exe ku407214.exe PID 3504 wrote to memory of 3988 3504 ziHX3860.exe ku407214.exe PID 3504 wrote to memory of 3988 3504 ziHX3860.exe ku407214.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\81291118f0541568f1216fbf49905b985c65fca4f98ceae041039b6e7d62bce9.exe"C:\Users\Admin\AppData\Local\Temp\81291118f0541568f1216fbf49905b985c65fca4f98ceae041039b6e7d62bce9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX3860.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX3860.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr647667.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr647667.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku407214.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku407214.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3988
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5f50f973fc27173b77fce9412b8db40d9
SHA1000cb7180a1c4c19ad5a525abdcfe0c59b8803eb
SHA2569209f928123caf8abb92285b1a182e4c5839cbbdc367272f0870727cc7fa3ad5
SHA5121b06c65fa172e881d3d51878c0d8c8de4dfc2bbe8d7d45453b5cd3999d488d1b6c4071381c280ee27adc92bcb01f3faea4c6d107d3a50dd165f44bd9a2a8b6c0
-
Filesize
12KB
MD53e9d1a4b2bbaf2fb6a28daf944aa99e4
SHA113448bf25f7e2ce35ce7d929283de8df8faf6688
SHA256a1e4d932101a308f2b23587e00de07c34d2a76114cdb61fe29e1bce3b3ed121f
SHA5126e0171d19f6fc74c00e866d73c7753d98ca2b08c3d2ef64a8a125737fd6c08c04946281b67e142dc267a918ac41b3d221f4d7f87fd52b20c27acc7a1f6a1a081
-
Filesize
434KB
MD559db1e14eb4b9f371593188507541430
SHA106d9497abf0f0b020b8234c57beae3035806ceb9
SHA25619a634854c87beeedeabab25fae83bee202c4fc9d8cda9b3b3f09ba165a3bb52
SHA512aba4f0be8124c0ad47ffe32dc7cb4579570cab82098143b7fcd2d8e2be1dcae6ac3d00020da85e44bbca5205425f129f4509b5bae658896eacbce427198d20b0