Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 08:35
Static task
static1
Behavioral task
behavioral1
Sample
76ecfc6cbf2c9ba5713ac7e8b91cb3cb737d84b59cb7f1a24dcd0a4d7fb63f24.exe
Resource
win10v2004-20241007-en
General
-
Target
76ecfc6cbf2c9ba5713ac7e8b91cb3cb737d84b59cb7f1a24dcd0a4d7fb63f24.exe
-
Size
534KB
-
MD5
b2a349ddec06368af7624babc7831e07
-
SHA1
b4952128b98886fdcbfc7fe449bbde0769215173
-
SHA256
76ecfc6cbf2c9ba5713ac7e8b91cb3cb737d84b59cb7f1a24dcd0a4d7fb63f24
-
SHA512
35dcf8bccfc8b55300f1ec5bea1606c003e2487c14a4feecfe791dd470f5859db80a209143963219c267d2f82eec2632c7f8111cb0e0b35ef2120e37a9e21662
-
SSDEEP
6144:KJy+bnr+gp0yN90QEy+1aj0eNPekc5vPA0vXR5meW4I5UBPbRfuT+pKGNbsQx1Us:PMroy90srnyoiB7WzibRW+jxTeLLw3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr216027.exe healer behavioral1/memory/5088-15-0x0000000000010000-0x000000000001A000-memory.dmp healer -
Healer family
-
Processes:
jr216027.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr216027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr216027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr216027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr216027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr216027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr216027.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2728-22-0x0000000004A00000-0x0000000004A46000-memory.dmp family_redline behavioral1/memory/2728-24-0x0000000004A90000-0x0000000004AD4000-memory.dmp family_redline behavioral1/memory/2728-28-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-36-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-88-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-86-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-84-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-82-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-80-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-78-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-76-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-74-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-70-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-69-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-66-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-64-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-62-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-60-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-59-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-56-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-54-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-50-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-48-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-46-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-44-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-42-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-40-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-38-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-34-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-32-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-30-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-72-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-52-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-26-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/2728-25-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziVH7181.exejr216027.exeku546283.exepid process 2932 ziVH7181.exe 5088 jr216027.exe 2728 ku546283.exe -
Processes:
jr216027.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr216027.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
76ecfc6cbf2c9ba5713ac7e8b91cb3cb737d84b59cb7f1a24dcd0a4d7fb63f24.exeziVH7181.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 76ecfc6cbf2c9ba5713ac7e8b91cb3cb737d84b59cb7f1a24dcd0a4d7fb63f24.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVH7181.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2812 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
76ecfc6cbf2c9ba5713ac7e8b91cb3cb737d84b59cb7f1a24dcd0a4d7fb63f24.exeziVH7181.exeku546283.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 76ecfc6cbf2c9ba5713ac7e8b91cb3cb737d84b59cb7f1a24dcd0a4d7fb63f24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziVH7181.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku546283.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr216027.exepid process 5088 jr216027.exe 5088 jr216027.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr216027.exeku546283.exedescription pid process Token: SeDebugPrivilege 5088 jr216027.exe Token: SeDebugPrivilege 2728 ku546283.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
76ecfc6cbf2c9ba5713ac7e8b91cb3cb737d84b59cb7f1a24dcd0a4d7fb63f24.exeziVH7181.exedescription pid process target process PID 4888 wrote to memory of 2932 4888 76ecfc6cbf2c9ba5713ac7e8b91cb3cb737d84b59cb7f1a24dcd0a4d7fb63f24.exe ziVH7181.exe PID 4888 wrote to memory of 2932 4888 76ecfc6cbf2c9ba5713ac7e8b91cb3cb737d84b59cb7f1a24dcd0a4d7fb63f24.exe ziVH7181.exe PID 4888 wrote to memory of 2932 4888 76ecfc6cbf2c9ba5713ac7e8b91cb3cb737d84b59cb7f1a24dcd0a4d7fb63f24.exe ziVH7181.exe PID 2932 wrote to memory of 5088 2932 ziVH7181.exe jr216027.exe PID 2932 wrote to memory of 5088 2932 ziVH7181.exe jr216027.exe PID 2932 wrote to memory of 2728 2932 ziVH7181.exe ku546283.exe PID 2932 wrote to memory of 2728 2932 ziVH7181.exe ku546283.exe PID 2932 wrote to memory of 2728 2932 ziVH7181.exe ku546283.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\76ecfc6cbf2c9ba5713ac7e8b91cb3cb737d84b59cb7f1a24dcd0a4d7fb63f24.exe"C:\Users\Admin\AppData\Local\Temp\76ecfc6cbf2c9ba5713ac7e8b91cb3cb737d84b59cb7f1a24dcd0a4d7fb63f24.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVH7181.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVH7181.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr216027.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr216027.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku546283.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku546283.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2812
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD5298d5cbd3fe324dc0a934298513c4c71
SHA1b23eacf758fadef01fbb9d0bdee4d92b692f5302
SHA256ec279d828393ac0f78a1158a7a2df684f8bdf6ff5055c988e009c9932d691288
SHA512de5d979d0dd7f30f344aeb195768c824cae4ea75183557ab78e8529a878ae6534ecd2a5d30cfdc27c4688c30c325d36e10cea7aff42bdc6195862189daa37fe5
-
Filesize
12KB
MD5ea20584b7a200a67bfc83169fa6bed1e
SHA1749db2aee5a67c73d266814174185dfd12602311
SHA256c2ed78639344ef47fbec7c1501601d563f1e69888ce9a5da5d56aceb000327e7
SHA51269de6895f94e859b517d683f289dce7d2fc0d596f070bbc1836e2ff0c697a25630c74e920ae98bc10793209d3d8e46a1554010690da8d78c4329251eee4d2983
-
Filesize
319KB
MD5f7adaac90672ba06abf3e202923d61dc
SHA18e778f7999d737768fc3fba7d3f66b194dcc1782
SHA2569af15e0dee2b458ebd544995c40f0c577fd76174f28214bd7e1c1d5d5c399cd0
SHA51298df1c93f679fcb225042e9e0809086d6b1739cbdc31c9ef53d75de8de54d4a7e3383bb880400196daf7144b53f1b283d2d3a39bb2e9c325243e9888f06dc687