Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
08391d5cdf405ba3d7a0ceecc75c223d09f426c04dde3f169f55eb0a7f9dc593.exe
Resource
win10v2004-20241007-en
General
-
Target
08391d5cdf405ba3d7a0ceecc75c223d09f426c04dde3f169f55eb0a7f9dc593.exe
-
Size
522KB
-
MD5
c9bb09b05aedefa8138b5bf164c502bb
-
SHA1
158f922905226c749fe98b2b6d3862a51d00d553
-
SHA256
08391d5cdf405ba3d7a0ceecc75c223d09f426c04dde3f169f55eb0a7f9dc593
-
SHA512
6b760c7538829c6fb6b59fd605bc22664fe47c9b62c229af03c88e7831fdbf516004f525dae68064711d3b732f4256a209d0287cd598b7e20d59f8be38695db9
-
SSDEEP
12288:LMrNy903HaIpc+i+q/SV32sGIUZGsSQ02:myKcgNV32sGIYA2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr446947.exe healer behavioral1/memory/5008-15-0x0000000000C10000-0x0000000000C1A000-memory.dmp healer -
Healer family
-
Processes:
jr446947.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr446947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr446947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr446947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr446947.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr446947.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr446947.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2740-22-0x0000000002530000-0x0000000002576000-memory.dmp family_redline behavioral1/memory/2740-24-0x0000000005060000-0x00000000050A4000-memory.dmp family_redline behavioral1/memory/2740-28-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-26-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-25-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-46-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-88-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-84-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-82-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-80-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-78-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-76-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-74-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-72-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-70-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-68-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-66-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-64-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-62-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-58-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-56-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-54-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-52-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-50-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-44-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-43-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-40-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-38-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-36-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-34-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-32-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-31-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-86-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-60-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2740-48-0x0000000005060000-0x000000000509F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziaE8232.exejr446947.exeku695481.exepid process 1792 ziaE8232.exe 5008 jr446947.exe 2740 ku695481.exe -
Processes:
jr446947.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr446947.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziaE8232.exe08391d5cdf405ba3d7a0ceecc75c223d09f426c04dde3f169f55eb0a7f9dc593.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziaE8232.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 08391d5cdf405ba3d7a0ceecc75c223d09f426c04dde3f169f55eb0a7f9dc593.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
08391d5cdf405ba3d7a0ceecc75c223d09f426c04dde3f169f55eb0a7f9dc593.exeziaE8232.exeku695481.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08391d5cdf405ba3d7a0ceecc75c223d09f426c04dde3f169f55eb0a7f9dc593.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziaE8232.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku695481.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr446947.exepid process 5008 jr446947.exe 5008 jr446947.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr446947.exeku695481.exedescription pid process Token: SeDebugPrivilege 5008 jr446947.exe Token: SeDebugPrivilege 2740 ku695481.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
08391d5cdf405ba3d7a0ceecc75c223d09f426c04dde3f169f55eb0a7f9dc593.exeziaE8232.exedescription pid process target process PID 4596 wrote to memory of 1792 4596 08391d5cdf405ba3d7a0ceecc75c223d09f426c04dde3f169f55eb0a7f9dc593.exe ziaE8232.exe PID 4596 wrote to memory of 1792 4596 08391d5cdf405ba3d7a0ceecc75c223d09f426c04dde3f169f55eb0a7f9dc593.exe ziaE8232.exe PID 4596 wrote to memory of 1792 4596 08391d5cdf405ba3d7a0ceecc75c223d09f426c04dde3f169f55eb0a7f9dc593.exe ziaE8232.exe PID 1792 wrote to memory of 5008 1792 ziaE8232.exe jr446947.exe PID 1792 wrote to memory of 5008 1792 ziaE8232.exe jr446947.exe PID 1792 wrote to memory of 2740 1792 ziaE8232.exe ku695481.exe PID 1792 wrote to memory of 2740 1792 ziaE8232.exe ku695481.exe PID 1792 wrote to memory of 2740 1792 ziaE8232.exe ku695481.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08391d5cdf405ba3d7a0ceecc75c223d09f426c04dde3f169f55eb0a7f9dc593.exe"C:\Users\Admin\AppData\Local\Temp\08391d5cdf405ba3d7a0ceecc75c223d09f426c04dde3f169f55eb0a7f9dc593.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaE8232.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaE8232.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr446947.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr446947.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku695481.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku695481.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2740
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5afe9fde8763bac04df284df1544a5ea2
SHA15993a200ea54492c1b936b30784229c5cc207317
SHA256c4f179ce075938c8f3f633990995be6f3377b5e3af4a8d62e4aaf7e99808057a
SHA5127b35453270c8b3b02967b090cce516c270187f2dd4816a1d87db1698354db43c81e3fc8b214705ca5154dac6d8d175472da17ebf6f0a0478aaf7000f39281a7d
-
Filesize
14KB
MD5fc81255aace47c13ed3e4f54a5790016
SHA1f1dd0a4577050dbefe93b4452dd1820feeeea112
SHA2567f4bfb17b3307f331b208743e28ab38a77d54f3cda96cbc538710287e6e6d8f3
SHA512c5e5bf58ff43cb017eb1af81a09343fe044c6352d428d9d3accc9260c4901844dae3b876a6c1b1e37178be41eb43450868217018695d7075226db332949af043
-
Filesize
295KB
MD51f15b6a37aa8f7b7e86e13f84b16b69f
SHA169c94c3d0a6c90f0ba4354aa9543bb9697166f5c
SHA25689b5758cccf4ffecf5b625baa32dda19b5b32b55aff1bca536c46f0ac9485b86
SHA5128640d515084bcbb917093888b6b5313f3f43ccf576ad70a80964523a8f70e23d10ea37572b6a7d3d482f7917f1338b8977ced4fa1a147db34dd0bea333cfa00e