Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 06:19
Static task
static1
Behavioral task
behavioral1
Sample
599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35.exe
Resource
win10v2004-20241007-en
General
-
Target
599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35.exe
-
Size
522KB
-
MD5
af8a80478cbb4e4b96d03afec9f62ed3
-
SHA1
9aee55c9bd91317dd3dde1f9f8fc9a549e130ef0
-
SHA256
599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35
-
SHA512
f2c4787fc333cb4f237325c351bd31185eb97712e16f40ff10c3932559056aaf4c8ffcb20cfabd3f3ce4a168549540a440270119affc16f688240abc4e76617a
-
SSDEEP
12288:hMrCy90Ugx/MPQSyf7PxVUB2pw25kgL+8lTTx:Xy7JYV7xVA2C0koppx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr933931.exe healer behavioral1/memory/2844-15-0x00000000009D0000-0x00000000009DA000-memory.dmp healer -
Healer family
-
Processes:
jr933931.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr933931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr933931.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr933931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr933931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr933931.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr933931.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4976-22-0x00000000023D0000-0x0000000002416000-memory.dmp family_redline behavioral1/memory/4976-24-0x00000000024D0000-0x0000000002514000-memory.dmp family_redline behavioral1/memory/4976-38-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-40-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-88-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-86-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-84-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-82-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-80-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-78-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-74-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-72-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-71-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-68-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-66-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-64-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-62-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-60-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-58-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-56-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-52-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-48-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-46-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-44-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-42-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-36-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-34-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-32-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-30-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-76-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-54-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-50-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-28-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-26-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline behavioral1/memory/4976-25-0x00000000024D0000-0x000000000250F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zimm9395.exejr933931.exeku514501.exepid process 3176 zimm9395.exe 2844 jr933931.exe 4976 ku514501.exe -
Processes:
jr933931.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr933931.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
zimm9395.exe599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zimm9395.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35.exezimm9395.exeku514501.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zimm9395.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku514501.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr933931.exepid process 2844 jr933931.exe 2844 jr933931.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr933931.exeku514501.exedescription pid process Token: SeDebugPrivilege 2844 jr933931.exe Token: SeDebugPrivilege 4976 ku514501.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35.exezimm9395.exedescription pid process target process PID 3876 wrote to memory of 3176 3876 599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35.exe zimm9395.exe PID 3876 wrote to memory of 3176 3876 599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35.exe zimm9395.exe PID 3876 wrote to memory of 3176 3876 599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35.exe zimm9395.exe PID 3176 wrote to memory of 2844 3176 zimm9395.exe jr933931.exe PID 3176 wrote to memory of 2844 3176 zimm9395.exe jr933931.exe PID 3176 wrote to memory of 4976 3176 zimm9395.exe ku514501.exe PID 3176 wrote to memory of 4976 3176 zimm9395.exe ku514501.exe PID 3176 wrote to memory of 4976 3176 zimm9395.exe ku514501.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35.exe"C:\Users\Admin\AppData\Local\Temp\599f2371f6822e124fb904ce639d3855464e4ee0f090769193923b820db01b35.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimm9395.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimm9395.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr933931.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr933931.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku514501.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku514501.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4976
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
379KB
MD51bfdd3552879f36135c7e0a4e5df7450
SHA1ea457e65ef28888a7b310430bb60a4305bca2d26
SHA256c4e117a297ce877b7a6390d4cd25ae943ba34875bddfeacdedadecb2b9d3c954
SHA512c59a12bef0a3d1f77809426d2e56844721174e1b932627a4386133c3b75c950d4229f534905505c693108c97a1e67ded93f3d70690a4c619c7949e502d4a4e1b
-
Filesize
15KB
MD50beea81569b31951faa1141e1a7bc435
SHA18150fdf8a6dd4667e65bcb1309a2527aa0d259c7
SHA2564d77d4deef6ace1c850d488374aedc6fd472860783a04ccde2cd4c34718b281e
SHA512c0403656515b93adff81de6e191ff431f278c02645ce633d0231200ca516e0cc932a2709718434c10322c91b2f888f5fbaeb60757697515c5dc843cb70983984
-
Filesize
294KB
MD51a00418a126fd0ae6762fcdc9c53744a
SHA12d1c8f9085b80ba7b35beec8f73523e397c92164
SHA25631b48a9cb9d8bf7b97b9719d2f721c6334bd69bcf930eb6a3cfdd9510cfb8faf
SHA512719fdfa0bc82229e1262288756c8a9a816cdf5838af79a6b8ed7ab0fcb3519cb58770b764e9a0c5b28c21bc86acdf83a78f059c9101b5314d1e6e7484970936f