Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 08:59
Static task
static1
Behavioral task
behavioral1
Sample
7c373a4a163463fa8adb19a6637206f678c261241912500135a7a01216809453.exe
Resource
win10v2004-20241007-en
General
-
Target
7c373a4a163463fa8adb19a6637206f678c261241912500135a7a01216809453.exe
-
Size
560KB
-
MD5
c381aab56bef5453d880212955c5ca24
-
SHA1
46bd0819749cdd6a3a84b688849796fd3b0f66f0
-
SHA256
7c373a4a163463fa8adb19a6637206f678c261241912500135a7a01216809453
-
SHA512
c40238ecc2e359bb10320403372c547354662bdcd0a61b1f4aba21b2b025ffa40ef11eda09a1f1698a652fc8a7ebb1a243b54e6329d5fa34c5983d8096440cef
-
SSDEEP
12288:gMriy90ARCMPh7ngORPAEf6Z03mAkEt14sc4GE:yyjhxnfJlfkyt14T4GE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr013531.exe healer behavioral1/memory/552-15-0x0000000000580000-0x000000000058A000-memory.dmp healer -
Healer family
-
Processes:
jr013531.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr013531.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr013531.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr013531.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr013531.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr013531.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr013531.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1544-22-0x00000000027C0000-0x0000000002806000-memory.dmp family_redline behavioral1/memory/1544-24-0x0000000004E80000-0x0000000004EC4000-memory.dmp family_redline behavioral1/memory/1544-42-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-44-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-88-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-86-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-84-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-82-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-80-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-78-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-76-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-72-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-71-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-68-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-66-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-64-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-62-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-60-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-58-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-56-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-54-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-52-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-50-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-48-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-46-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-40-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-38-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-36-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-34-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-32-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-31-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-74-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-28-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-26-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline behavioral1/memory/1544-25-0x0000000004E80000-0x0000000004EBF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziKh4714.exejr013531.exeku770630.exepid process 2996 ziKh4714.exe 552 jr013531.exe 1544 ku770630.exe -
Processes:
jr013531.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr013531.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7c373a4a163463fa8adb19a6637206f678c261241912500135a7a01216809453.exeziKh4714.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7c373a4a163463fa8adb19a6637206f678c261241912500135a7a01216809453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziKh4714.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7c373a4a163463fa8adb19a6637206f678c261241912500135a7a01216809453.exeziKh4714.exeku770630.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c373a4a163463fa8adb19a6637206f678c261241912500135a7a01216809453.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziKh4714.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku770630.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr013531.exepid process 552 jr013531.exe 552 jr013531.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr013531.exeku770630.exedescription pid process Token: SeDebugPrivilege 552 jr013531.exe Token: SeDebugPrivilege 1544 ku770630.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7c373a4a163463fa8adb19a6637206f678c261241912500135a7a01216809453.exeziKh4714.exedescription pid process target process PID 4084 wrote to memory of 2996 4084 7c373a4a163463fa8adb19a6637206f678c261241912500135a7a01216809453.exe ziKh4714.exe PID 4084 wrote to memory of 2996 4084 7c373a4a163463fa8adb19a6637206f678c261241912500135a7a01216809453.exe ziKh4714.exe PID 4084 wrote to memory of 2996 4084 7c373a4a163463fa8adb19a6637206f678c261241912500135a7a01216809453.exe ziKh4714.exe PID 2996 wrote to memory of 552 2996 ziKh4714.exe jr013531.exe PID 2996 wrote to memory of 552 2996 ziKh4714.exe jr013531.exe PID 2996 wrote to memory of 1544 2996 ziKh4714.exe ku770630.exe PID 2996 wrote to memory of 1544 2996 ziKh4714.exe ku770630.exe PID 2996 wrote to memory of 1544 2996 ziKh4714.exe ku770630.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c373a4a163463fa8adb19a6637206f678c261241912500135a7a01216809453.exe"C:\Users\Admin\AppData\Local\Temp\7c373a4a163463fa8adb19a6637206f678c261241912500135a7a01216809453.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKh4714.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKh4714.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr013531.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr013531.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku770630.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku770630.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1544
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406KB
MD587b955b6e194f7ca56b125c8a50ff5f2
SHA1a0223b6b955bc0b2c6dbff2e49b5998b24d6a0e0
SHA25642312905f19b3858b959e0b0a3a092b5d27527abb0c97de0be55132d57d1bdaa
SHA5127929c08eb9cb101daa0a343f45de52c66df9ee0053629a773719cad4636328321c2f34cbd1942e64a2817f18b6d571d8af012bc1c2adce07c0a86c97a6b88d4d
-
Filesize
11KB
MD5c03596ec3b9b4fed22cb5ef9c2503328
SHA1039c09401e37443b110ef54bb60c6a6179e515ae
SHA2563c58815269669ab9f7f7045a8da546a0af5320124a811d5a5b5cf064fa2df902
SHA5125783cc3b61cad0a40182eff16c08d0f0fed9f8563c6bd83f1a2a025a49911daca9b2835cc2afab60d64544f5cd07b8c362564155a458645e4ed183c1b686abad
-
Filesize
372KB
MD5b2e7d653a36cf5cd2bd28ca07d883dff
SHA1256a9eb43b9a0155fb8ca67c52fc7b3d9eef8bee
SHA256aa4de3450f0dca7a326fcfe9e8a8f4a91783a4f52ae1bd466742545e789a3b96
SHA51211041a487ca465effbb72bba4f00af7ce9f79d2ff5c06ff86bf9930bcbc2fb62cdd9615493e1b9babf0840ae08c977c2ad3c9737e98b6abf5af85cef7588ae07