Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 06:53
Static task
static1
Behavioral task
behavioral1
Sample
cfa0252c875c75172727cfe0a4401676c3dd8e6662a1ee679d3f3da76f5166cc.exe
Resource
win10v2004-20241007-en
General
-
Target
cfa0252c875c75172727cfe0a4401676c3dd8e6662a1ee679d3f3da76f5166cc.exe
-
Size
524KB
-
MD5
fac974c21c6d6f35ad212316618b46b1
-
SHA1
88062568392ad8827467ebf307e0d1fcdea1d7bd
-
SHA256
cfa0252c875c75172727cfe0a4401676c3dd8e6662a1ee679d3f3da76f5166cc
-
SHA512
1864eef33d0bf712daf72fbcf9506328eb568f68ed060072f923e00287b42b619ebe938b7070aa1fd7673905aec0e5c54992d856a8abeb92536ec29e09a296e8
-
SSDEEP
12288:OMrRy90ZaOckTyR4+6qmymWPQlvXMofuuoTW:Pyu7O6qmynyU8mW
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr537539.exe healer behavioral1/memory/4896-15-0x0000000000650000-0x000000000065A000-memory.dmp healer -
Healer family
-
Processes:
jr537539.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr537539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr537539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr537539.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr537539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr537539.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr537539.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4984-22-0x0000000002480000-0x00000000024C6000-memory.dmp family_redline behavioral1/memory/4984-24-0x0000000004AB0000-0x0000000004AF4000-memory.dmp family_redline behavioral1/memory/4984-26-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-36-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-88-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-87-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-84-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-82-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-80-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-78-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-76-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-74-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-72-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-70-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-68-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-66-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-64-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-62-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-58-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-56-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-54-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-52-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-50-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-49-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-46-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-44-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-42-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-38-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-35-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-32-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-30-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-28-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-60-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-40-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4984-25-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziAT2714.exejr537539.exeku759604.exepid process 4032 ziAT2714.exe 4896 jr537539.exe 4984 ku759604.exe -
Processes:
jr537539.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr537539.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cfa0252c875c75172727cfe0a4401676c3dd8e6662a1ee679d3f3da76f5166cc.exeziAT2714.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cfa0252c875c75172727cfe0a4401676c3dd8e6662a1ee679d3f3da76f5166cc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAT2714.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5620 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku759604.execfa0252c875c75172727cfe0a4401676c3dd8e6662a1ee679d3f3da76f5166cc.exeziAT2714.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku759604.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfa0252c875c75172727cfe0a4401676c3dd8e6662a1ee679d3f3da76f5166cc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziAT2714.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr537539.exepid process 4896 jr537539.exe 4896 jr537539.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr537539.exeku759604.exedescription pid process Token: SeDebugPrivilege 4896 jr537539.exe Token: SeDebugPrivilege 4984 ku759604.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
cfa0252c875c75172727cfe0a4401676c3dd8e6662a1ee679d3f3da76f5166cc.exeziAT2714.exedescription pid process target process PID 2484 wrote to memory of 4032 2484 cfa0252c875c75172727cfe0a4401676c3dd8e6662a1ee679d3f3da76f5166cc.exe ziAT2714.exe PID 2484 wrote to memory of 4032 2484 cfa0252c875c75172727cfe0a4401676c3dd8e6662a1ee679d3f3da76f5166cc.exe ziAT2714.exe PID 2484 wrote to memory of 4032 2484 cfa0252c875c75172727cfe0a4401676c3dd8e6662a1ee679d3f3da76f5166cc.exe ziAT2714.exe PID 4032 wrote to memory of 4896 4032 ziAT2714.exe jr537539.exe PID 4032 wrote to memory of 4896 4032 ziAT2714.exe jr537539.exe PID 4032 wrote to memory of 4984 4032 ziAT2714.exe ku759604.exe PID 4032 wrote to memory of 4984 4032 ziAT2714.exe ku759604.exe PID 4032 wrote to memory of 4984 4032 ziAT2714.exe ku759604.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfa0252c875c75172727cfe0a4401676c3dd8e6662a1ee679d3f3da76f5166cc.exe"C:\Users\Admin\AppData\Local\Temp\cfa0252c875c75172727cfe0a4401676c3dd8e6662a1ee679d3f3da76f5166cc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAT2714.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAT2714.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr537539.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr537539.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku759604.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku759604.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5620
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD5dd2dbdca2b0e4d42bd71748a376c2a28
SHA158ca9854822d171ef71ba476cdcbe1a8c3b9584c
SHA2569bc68001286c37b60d6b55063041721f2233c0ed820843c20397e2c93e573e05
SHA5128605ca0d133a02e3ea0eeb89a025d9486d9bc234332362c63f24c6e5a20eb8bbcbd021436c15133770f282e1440f7ea91368412bada0aa2e5a11d63925b013b9
-
Filesize
14KB
MD5c86d7c001031adad7d11752154878673
SHA1a0e5d0d51deb4c924b54204a89c5dd425aa2f10e
SHA256d3b0fc333c448d7a13769f11d3392b7341bdb9cbeb583750181c969cef74b669
SHA5124f0774829ed2f58773e01612180b5a9af2946871fe4ebedfc94ab2fbc95b439a3638fcc4fcca6590d01d679da50963c07ae4dfbf974d9e3ce2827899d91dacce
-
Filesize
295KB
MD54c663a6f65a48188646c3e4aea5641b4
SHA17d3a9c512cf7d5c6fc32f5388a6d4a9e3df7ba78
SHA2568cf72c8fcc62e62f927870c80816fb6851afa7cc61262ce21638277465ead258
SHA512be68f916f5a00d932ff653947d7ceaf9b3351118cca764c470df8fd98ae100a0e1b52716532b57beb28aa973ab692e23dab2f82a99bfe1bb95b4e35d474f459b