Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 08:50
Static task
static1
Behavioral task
behavioral1
Sample
49df0cdc4fe80d5662268656c728d9490605b0ba5cdbf1c405ffb9f71e0c41a2.exe
Resource
win10v2004-20241007-en
General
-
Target
49df0cdc4fe80d5662268656c728d9490605b0ba5cdbf1c405ffb9f71e0c41a2.exe
-
Size
530KB
-
MD5
4c2f01ca291b9fd67c2d1b805c5a1d6a
-
SHA1
4cc0b339d938417f3c653cba64ff2dad97224c2e
-
SHA256
49df0cdc4fe80d5662268656c728d9490605b0ba5cdbf1c405ffb9f71e0c41a2
-
SHA512
52927a2425f932a5bfdacfbbee597122cd0ffc73d010fbdae1d8cfc7dc912e3b9e02fb76c6d9ea75b2d4d83cc3cbe92b8d5df1391e47f2ee5a2a2118fc05da64
-
SSDEEP
12288:mMriy90R+gr4nI9hCpIHuI4f5KXa/kdzNRixoylvUY:oyyH94pIODALtNREoyVN
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr142431.exe healer behavioral1/memory/1048-15-0x0000000000990000-0x000000000099A000-memory.dmp healer -
Healer family
-
Processes:
jr142431.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr142431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr142431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr142431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr142431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr142431.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr142431.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4524-22-0x00000000023A0000-0x00000000023E6000-memory.dmp family_redline behavioral1/memory/4524-24-0x0000000004BB0000-0x0000000004BF4000-memory.dmp family_redline behavioral1/memory/4524-27-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-88-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-86-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-84-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-82-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-80-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-78-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-76-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-74-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-70-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-68-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-66-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-64-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-62-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-60-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-58-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-56-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-52-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-50-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-49-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-46-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-44-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-42-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-40-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-38-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-36-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-34-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-30-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-28-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-25-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-72-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-54-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/4524-32-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziUL4631.exejr142431.exeku487281.exepid process 4840 ziUL4631.exe 1048 jr142431.exe 4524 ku487281.exe -
Processes:
jr142431.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr142431.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
49df0cdc4fe80d5662268656c728d9490605b0ba5cdbf1c405ffb9f71e0c41a2.exeziUL4631.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49df0cdc4fe80d5662268656c728d9490605b0ba5cdbf1c405ffb9f71e0c41a2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziUL4631.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5452 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
49df0cdc4fe80d5662268656c728d9490605b0ba5cdbf1c405ffb9f71e0c41a2.exeziUL4631.exeku487281.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49df0cdc4fe80d5662268656c728d9490605b0ba5cdbf1c405ffb9f71e0c41a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziUL4631.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku487281.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr142431.exepid process 1048 jr142431.exe 1048 jr142431.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr142431.exeku487281.exedescription pid process Token: SeDebugPrivilege 1048 jr142431.exe Token: SeDebugPrivilege 4524 ku487281.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
49df0cdc4fe80d5662268656c728d9490605b0ba5cdbf1c405ffb9f71e0c41a2.exeziUL4631.exedescription pid process target process PID 3972 wrote to memory of 4840 3972 49df0cdc4fe80d5662268656c728d9490605b0ba5cdbf1c405ffb9f71e0c41a2.exe ziUL4631.exe PID 3972 wrote to memory of 4840 3972 49df0cdc4fe80d5662268656c728d9490605b0ba5cdbf1c405ffb9f71e0c41a2.exe ziUL4631.exe PID 3972 wrote to memory of 4840 3972 49df0cdc4fe80d5662268656c728d9490605b0ba5cdbf1c405ffb9f71e0c41a2.exe ziUL4631.exe PID 4840 wrote to memory of 1048 4840 ziUL4631.exe jr142431.exe PID 4840 wrote to memory of 1048 4840 ziUL4631.exe jr142431.exe PID 4840 wrote to memory of 4524 4840 ziUL4631.exe ku487281.exe PID 4840 wrote to memory of 4524 4840 ziUL4631.exe ku487281.exe PID 4840 wrote to memory of 4524 4840 ziUL4631.exe ku487281.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49df0cdc4fe80d5662268656c728d9490605b0ba5cdbf1c405ffb9f71e0c41a2.exe"C:\Users\Admin\AppData\Local\Temp\49df0cdc4fe80d5662268656c728d9490605b0ba5cdbf1c405ffb9f71e0c41a2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUL4631.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUL4631.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr142431.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr142431.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku487281.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku487281.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5452
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD550e23528c8448acadce42c9c7811be65
SHA1225adbfb3ae80012f52e3e596208a89d55228a49
SHA256d46846b377bf093550dbaa0369af1a190d70cf8ad120bb12f1c62d915eed5795
SHA51258c81df9d775963f032db3830e8ee10b8aaacb6f43433f8a893572bcc6019e58f235e10b5a222d5102384d593ad31a0269a30598d9bf9b7cf39bb0b5574cc27b
-
Filesize
11KB
MD5d9d291f4ef1857da0dfde3109529b234
SHA1655ef2ba1169f86f4f427ac2b70482ab64cd1473
SHA256019476741bf6a32b729d69fe8eb73d5b5b963529d0fe4ebb3cd0461e2d5346df
SHA512a8f61347482ede58b11fea0aa24d9e791cf95367a162260fae86c9422e5e0362de00bcb026e826b4f06e144b7eeb9cc8af77d78cfc9492095b84f81c4180eacc
-
Filesize
434KB
MD573ce6fff79f2d6691a82e622ccb5cf47
SHA1cbb0b8065898ee6e78ff64be5765482b5a377a20
SHA256b69a0822a7c101daf6fd37b7f5673b8a284fed5b3c15939c9acde2acf31849e1
SHA5124dfce88de55ba180bdfc95d2cce80a8968102d09e5a6ba1105b0696fe5fdf2a9e497adf8e842a035903ef24a21ac8065aac33b0b43adcc9c8bd00c219839ba26