Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 07:19
Static task
static1
Behavioral task
behavioral1
Sample
40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exe
Resource
win10v2004-20241007-en
General
-
Target
40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exe
-
Size
529KB
-
MD5
1734a6dd789ff9b6448b6f3b8ea6af35
-
SHA1
15a962e3f87ef85c8a5193bb68cdf44a8d305dd3
-
SHA256
40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604
-
SHA512
8f44ebabe2337cc18e3dd18892ad2e9d3b8981ef1be91ae86db2216859fbb639a2569c2a8eb37cd99a13c7954e838396aef8c32a437b561147e28ee752e504f1
-
SSDEEP
12288:5MrFy90fUm4Mr07t6SmUdiMV22ramVE8lx27amrk9G90IGlQ:cyyG60RnQZlmVE8P25I0aS
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr026566.exe healer behavioral1/memory/4344-15-0x0000000000F70000-0x0000000000F7A000-memory.dmp healer -
Healer family
-
Processes:
jr026566.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr026566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr026566.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr026566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr026566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr026566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr026566.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2580-22-0x0000000007090000-0x00000000070D6000-memory.dmp family_redline behavioral1/memory/2580-24-0x0000000007720000-0x0000000007764000-memory.dmp family_redline behavioral1/memory/2580-50-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-72-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-86-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-82-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-80-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-78-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-76-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-74-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-70-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-68-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-66-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-64-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-62-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-60-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-58-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-56-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-55-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-52-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-48-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-46-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-44-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-42-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-40-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-36-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-34-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-32-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-30-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-28-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-88-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-84-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-38-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-26-0x0000000007720000-0x000000000775F000-memory.dmp family_redline behavioral1/memory/2580-25-0x0000000007720000-0x000000000775F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zipg2339.exejr026566.exeku569703.exepid process 492 zipg2339.exe 4344 jr026566.exe 2580 ku569703.exe -
Processes:
jr026566.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr026566.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exezipg2339.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipg2339.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
zipg2339.exeku569703.exe40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zipg2339.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku569703.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr026566.exepid process 4344 jr026566.exe 4344 jr026566.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr026566.exeku569703.exedescription pid process Token: SeDebugPrivilege 4344 jr026566.exe Token: SeDebugPrivilege 2580 ku569703.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exezipg2339.exedescription pid process target process PID 4856 wrote to memory of 492 4856 40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exe zipg2339.exe PID 4856 wrote to memory of 492 4856 40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exe zipg2339.exe PID 4856 wrote to memory of 492 4856 40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exe zipg2339.exe PID 492 wrote to memory of 4344 492 zipg2339.exe jr026566.exe PID 492 wrote to memory of 4344 492 zipg2339.exe jr026566.exe PID 492 wrote to memory of 2580 492 zipg2339.exe ku569703.exe PID 492 wrote to memory of 2580 492 zipg2339.exe ku569703.exe PID 492 wrote to memory of 2580 492 zipg2339.exe ku569703.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exe"C:\Users\Admin\AppData\Local\Temp\40faa40714ba1c312a539c8997a610dd44980098fe29c354d025643f8407b604.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipg2339.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipg2339.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr026566.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr026566.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku569703.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku569703.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5a5555a9a6846f816059fa5df31bde888
SHA1f94fab601ddc8e8ccaa0b0f38db4d3449780da06
SHA2562498a4d9970e7dea97833a299a63a06107d50183ac59942bb227a01fcd36c395
SHA512d9a713d027e5154ab1fc100d3a341cb189300128ecf4ea3a1ed5d2905952cdade7815232870960425a59aa1bdbc4f27921979baa3bcb51a0c57e8810fc9241c4
-
Filesize
11KB
MD5f773988705d4c2cb8ac80ea55e717edf
SHA1ee899e4d8fbfecc41d13290970d323ab6f0e3657
SHA256d47e87c0be91911b8d09585b6ee33a2c19615ebbae9910e9e30249d615c0ca9a
SHA512529d3ce18379974beb9d076e8caf046efbfc1e008e6888dbee19533c4acaf6cbe004f0dda275b86b67cd777cbb373ac7ac6336805378cbbbb82ecf94e9f2c6a2
-
Filesize
354KB
MD5e1955908666e8783f8cd595409ae4c86
SHA17c1b5332b4d9a29f733d4bcd4cba9c384acaef14
SHA256d9cf93fc6ef778753a8c128a21f213c27cb27eda4b8ca43f37d14a26b067c453
SHA512a36d914a88639f7127ea996770755958a1b9c07eb05c03b8c348942bd68a72985d7bea66a544446105103835bd583481a4030924fe6af8f5ad7734d8e4a2f592