Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 07:01
Static task
static1
Behavioral task
behavioral1
Sample
89bafa3ab3e46c3cd892d45969d0cf489fb61391ffaca45700d289764a10b504.exe
Resource
win10v2004-20241007-en
General
-
Target
89bafa3ab3e46c3cd892d45969d0cf489fb61391ffaca45700d289764a10b504.exe
-
Size
531KB
-
MD5
bffe70b3ecf5c24cd2ec0c91ecab3422
-
SHA1
3a6aab8d98f9c191bf1d2fe5ae6208eac220a9b8
-
SHA256
89bafa3ab3e46c3cd892d45969d0cf489fb61391ffaca45700d289764a10b504
-
SHA512
32521a4d68ca09b4f5ac0ffedb3abd28240245c4f4f61b0b91793f7939d7ae9b7cb99ef223a918d0542896b9c22934888346f9495dd31fa9aa6e2ebe1f21de5d
-
SSDEEP
12288:dMr2y90TcB7r9SzPntpRA87yOt3Vu3BzDGtzrjGQaqBPEkjGmB3HATpwEDR:fyYi7xGjvPfuxqHSQpZTFHATpvd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr910997.exe healer behavioral1/memory/4608-15-0x0000000000830000-0x000000000083A000-memory.dmp healer -
Healer family
-
Processes:
jr910997.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr910997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr910997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr910997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr910997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr910997.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr910997.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3104-22-0x0000000004D60000-0x0000000004DA6000-memory.dmp family_redline behavioral1/memory/3104-24-0x00000000071A0000-0x00000000071E4000-memory.dmp family_redline behavioral1/memory/3104-34-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-38-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-88-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-87-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-84-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-82-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-80-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-78-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-76-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-72-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-70-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-69-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-66-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-64-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-62-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-60-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-58-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-56-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-54-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-50-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-48-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-46-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-44-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-42-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-40-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-36-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-74-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-52-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-32-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-30-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-28-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-26-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/3104-25-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziqj7578.exejr910997.exeku440871.exepid process 1620 ziqj7578.exe 4608 jr910997.exe 3104 ku440871.exe -
Processes:
jr910997.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr910997.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
89bafa3ab3e46c3cd892d45969d0cf489fb61391ffaca45700d289764a10b504.exeziqj7578.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 89bafa3ab3e46c3cd892d45969d0cf489fb61391ffaca45700d289764a10b504.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziqj7578.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5132 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
89bafa3ab3e46c3cd892d45969d0cf489fb61391ffaca45700d289764a10b504.exeziqj7578.exeku440871.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89bafa3ab3e46c3cd892d45969d0cf489fb61391ffaca45700d289764a10b504.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziqj7578.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku440871.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr910997.exepid process 4608 jr910997.exe 4608 jr910997.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr910997.exeku440871.exedescription pid process Token: SeDebugPrivilege 4608 jr910997.exe Token: SeDebugPrivilege 3104 ku440871.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
89bafa3ab3e46c3cd892d45969d0cf489fb61391ffaca45700d289764a10b504.exeziqj7578.exedescription pid process target process PID 4120 wrote to memory of 1620 4120 89bafa3ab3e46c3cd892d45969d0cf489fb61391ffaca45700d289764a10b504.exe ziqj7578.exe PID 4120 wrote to memory of 1620 4120 89bafa3ab3e46c3cd892d45969d0cf489fb61391ffaca45700d289764a10b504.exe ziqj7578.exe PID 4120 wrote to memory of 1620 4120 89bafa3ab3e46c3cd892d45969d0cf489fb61391ffaca45700d289764a10b504.exe ziqj7578.exe PID 1620 wrote to memory of 4608 1620 ziqj7578.exe jr910997.exe PID 1620 wrote to memory of 4608 1620 ziqj7578.exe jr910997.exe PID 1620 wrote to memory of 3104 1620 ziqj7578.exe ku440871.exe PID 1620 wrote to memory of 3104 1620 ziqj7578.exe ku440871.exe PID 1620 wrote to memory of 3104 1620 ziqj7578.exe ku440871.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\89bafa3ab3e46c3cd892d45969d0cf489fb61391ffaca45700d289764a10b504.exe"C:\Users\Admin\AppData\Local\Temp\89bafa3ab3e46c3cd892d45969d0cf489fb61391ffaca45700d289764a10b504.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqj7578.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqj7578.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr910997.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr910997.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku440871.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku440871.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3104
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5132
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5ede5786566f7827ab4cfeb1fdf70a8af
SHA166ec39972e77ef0d5d55fa56e2cf9de35d16cfe6
SHA2564782148e01ea0bfb09179fedfc97d73cbf7aa905611eb34d45bec6907344b2a1
SHA5127e047f8d1aea810ae541069a3f34df698f207a255e4d54de8ad1aea45a8626b6c7fae8539415527bb546e4352e27fa3c06fe0039758013b662567ea50fb01306
-
Filesize
11KB
MD5358797598278bc3cfae06b21e2c5f516
SHA1202ca79189c6a5c63b573673e39c1b703a6fff2f
SHA256980256c27e7663e2562edb2b916697ecf59b4888a2a09510df50093ffe9fba86
SHA512a07c977dfac2d87b9d69387bb06b9159fd81cbcddbe8f2d649e4ea9e52434597440bfc1e049890cc08b793b30fe84708ab0890db66f89dc73794aeb6e94e3f86
-
Filesize
354KB
MD50557576895e4d8a29705153454f3c2e3
SHA1d41d5e51b14e59f6f5248ddacb17e8e5cf19b598
SHA25667a1acd76cd1807a8bbb7f7f10e92f09a545dc710a26e598601a1041c8404d8b
SHA512a3d7bbcdf8585920f36d0e7ec65ef778b4d53bcf6d3e4f2aeacf16b6b97b8b6e82ec220a0ad437399ef547a278045a6787ac4d33d3e35f98b705534d4679bac2