Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 09:46
Static task
static1
Behavioral task
behavioral1
Sample
bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exe
Resource
win10v2004-20241007-en
General
-
Target
bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exe
-
Size
530KB
-
MD5
dd2ca0147a6563e64d4d2e14294caf36
-
SHA1
e40bc5bee23128eb13f99256a39b472a21c0f296
-
SHA256
bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5
-
SHA512
13ffa7140e8ec5e534b81db129958d1ecbbe203663eb1fdb9f761f6a7bc9f000941807a4427c2705e0e7ce8a29d6b4e752292159f6b912ee27ea50e830125149
-
SSDEEP
12288:oMrWy90vYfWspvziXhOWBXsDjZQrqB1wxHpYSNfn:+yImeUPNQeJSd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr268657.exe healer behavioral1/memory/3008-15-0x0000000000340000-0x000000000034A000-memory.dmp healer -
Healer family
-
Processes:
jr268657.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr268657.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr268657.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr268657.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr268657.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr268657.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr268657.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4784-22-0x0000000004980000-0x00000000049C6000-memory.dmp family_redline behavioral1/memory/4784-24-0x0000000007730000-0x0000000007774000-memory.dmp family_redline behavioral1/memory/4784-26-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-34-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-88-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-86-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-84-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-80-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-79-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-76-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-74-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-72-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-70-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-68-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-66-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-64-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-62-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-60-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-58-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-56-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-54-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-50-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-48-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-46-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-44-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-43-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-40-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-38-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-36-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-32-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-30-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-28-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-82-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-52-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/4784-25-0x0000000007730000-0x000000000776F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziTn0195.exejr268657.exeku931965.exepid process 1184 ziTn0195.exe 3008 jr268657.exe 4784 ku931965.exe -
Processes:
jr268657.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr268657.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exeziTn0195.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziTn0195.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exeziTn0195.exeku931965.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziTn0195.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku931965.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr268657.exepid process 3008 jr268657.exe 3008 jr268657.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr268657.exeku931965.exedescription pid process Token: SeDebugPrivilege 3008 jr268657.exe Token: SeDebugPrivilege 4784 ku931965.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exeziTn0195.exedescription pid process target process PID 4140 wrote to memory of 1184 4140 bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exe ziTn0195.exe PID 4140 wrote to memory of 1184 4140 bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exe ziTn0195.exe PID 4140 wrote to memory of 1184 4140 bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exe ziTn0195.exe PID 1184 wrote to memory of 3008 1184 ziTn0195.exe jr268657.exe PID 1184 wrote to memory of 3008 1184 ziTn0195.exe jr268657.exe PID 1184 wrote to memory of 4784 1184 ziTn0195.exe ku931965.exe PID 1184 wrote to memory of 4784 1184 ziTn0195.exe ku931965.exe PID 1184 wrote to memory of 4784 1184 ziTn0195.exe ku931965.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exe"C:\Users\Admin\AppData\Local\Temp\bbba62f63cc6133dd8b58e5e69fbec3a46da9aed3f3b467822e8baa480f8c4c5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTn0195.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTn0195.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr268657.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr268657.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku931965.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku931965.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4784
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5956e51adc31312baa51b8429c66227ba
SHA1914cd15ffea8259c5dbb1a220951f7c1ec21bb56
SHA2564b8ab5772a1df8d5347dc8690301a1e4a3826f8282e3c7aa702e026a8ddde6da
SHA5127aa7ce65840c42fa9cd66140f7392526bfd8d8519f57cdae673f00c94b26011a5f85c26d97a8cf5401c1402a3c9622fa342ad850eee28d9896edb7850d45105c
-
Filesize
11KB
MD549e5bed33e8dfb883881ed8319daf8d2
SHA175ce20b2981114823bce84b1979816c805e21ad7
SHA2560a7089b8d3e54e43362e8d189c8e4a0806a097393d6feb82aefbaa93ed7dc5c8
SHA5125164846df3ff6ef1e9b766c49bc9ea9dca901bfaaf9affdcd9edbcef5dbfb51b788947cbd2d5e1dfabdf0b9636af9f9b22538c37aa2ccc2c3dea60b08804a382
-
Filesize
354KB
MD56fa2f1bc4a9acfbfd30ba30b212724a3
SHA13122bd99160dfe859b0b9dc2fc9a68bbb01be390
SHA25673763a90266748a92611b2b9c87da0ca1cfd6ed3138a29e49a97f1e4ef3d9a5c
SHA512f0f9fd0de14e5372398c02166dded617cf0fe1341fd8f75b1fbe03c0d4a527c44e949b91d398a735c2c09cbf6a8c3d7fb2c8796e2c34845d1da941f82edf60aa