Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 09:57
Static task
static1
Behavioral task
behavioral1
Sample
046ef7ec8f875c718352716cb961c7ae146009c2afb339b699bbcaf34c39eec9.exe
Resource
win10v2004-20241007-en
General
-
Target
046ef7ec8f875c718352716cb961c7ae146009c2afb339b699bbcaf34c39eec9.exe
-
Size
537KB
-
MD5
37dac8ca9d1ea1b44df2a02dc6161c34
-
SHA1
56b14b3f8994f4445f338b2dd07e45a5b5dd6231
-
SHA256
046ef7ec8f875c718352716cb961c7ae146009c2afb339b699bbcaf34c39eec9
-
SHA512
88b0353d117513f905471f22cbd02aee5ed449180612d97a1188b0b0040602ad49a24d6ae348a92b901572a6c805a92c6418fcbf3274c664582ff5550cac464f
-
SSDEEP
12288:0Mr+y90x4kJIMSsfq4WFiH0PIoHIt9xZhRT3R:iybzsfq720wooz/Dd
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr298707.exe healer behavioral1/memory/3204-15-0x0000000000E50000-0x0000000000E5A000-memory.dmp healer -
Healer family
-
Processes:
jr298707.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr298707.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr298707.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr298707.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr298707.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr298707.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr298707.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2000-22-0x0000000002700000-0x0000000002746000-memory.dmp family_redline behavioral1/memory/2000-24-0x0000000004E00000-0x0000000004E44000-memory.dmp family_redline behavioral1/memory/2000-34-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-58-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-88-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-86-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-84-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-82-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-80-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-78-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-76-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-74-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-72-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-70-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-68-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-66-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-64-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-62-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-60-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-56-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-54-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-52-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-50-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-48-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-46-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-44-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-42-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-40-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-38-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-36-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-32-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-30-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-28-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-26-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2000-25-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziZN1548.exejr298707.exeku549865.exepid process 1048 ziZN1548.exe 3204 jr298707.exe 2000 ku549865.exe -
Processes:
jr298707.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr298707.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
046ef7ec8f875c718352716cb961c7ae146009c2afb339b699bbcaf34c39eec9.exeziZN1548.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 046ef7ec8f875c718352716cb961c7ae146009c2afb339b699bbcaf34c39eec9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziZN1548.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4016 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziZN1548.exeku549865.exe046ef7ec8f875c718352716cb961c7ae146009c2afb339b699bbcaf34c39eec9.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziZN1548.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku549865.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 046ef7ec8f875c718352716cb961c7ae146009c2afb339b699bbcaf34c39eec9.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr298707.exepid process 3204 jr298707.exe 3204 jr298707.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr298707.exeku549865.exedescription pid process Token: SeDebugPrivilege 3204 jr298707.exe Token: SeDebugPrivilege 2000 ku549865.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
046ef7ec8f875c718352716cb961c7ae146009c2afb339b699bbcaf34c39eec9.exeziZN1548.exedescription pid process target process PID 3148 wrote to memory of 1048 3148 046ef7ec8f875c718352716cb961c7ae146009c2afb339b699bbcaf34c39eec9.exe ziZN1548.exe PID 3148 wrote to memory of 1048 3148 046ef7ec8f875c718352716cb961c7ae146009c2afb339b699bbcaf34c39eec9.exe ziZN1548.exe PID 3148 wrote to memory of 1048 3148 046ef7ec8f875c718352716cb961c7ae146009c2afb339b699bbcaf34c39eec9.exe ziZN1548.exe PID 1048 wrote to memory of 3204 1048 ziZN1548.exe jr298707.exe PID 1048 wrote to memory of 3204 1048 ziZN1548.exe jr298707.exe PID 1048 wrote to memory of 2000 1048 ziZN1548.exe ku549865.exe PID 1048 wrote to memory of 2000 1048 ziZN1548.exe ku549865.exe PID 1048 wrote to memory of 2000 1048 ziZN1548.exe ku549865.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\046ef7ec8f875c718352716cb961c7ae146009c2afb339b699bbcaf34c39eec9.exe"C:\Users\Admin\AppData\Local\Temp\046ef7ec8f875c718352716cb961c7ae146009c2afb339b699bbcaf34c39eec9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZN1548.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZN1548.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr298707.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr298707.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku549865.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku549865.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2000
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4016
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5bc8dda25cbe3402fe9f43722387b2683
SHA1b6ec36d9609bcb12bf3589d378104e6e3f1cb037
SHA25679088ffd5f58aa1740b920b8ecfd8b4590424b14ff6ec663ed8846535d0f53c6
SHA512dfd6c3ea200f91dc5ba1a0f42596d27bc6c24c5bda312bbfcf2b0163106a61c9194a1192450d6f4b1dab2c7b8ae9b1d45ac7eddfb4904bd16651d759a3337f83
-
Filesize
13KB
MD5e4b23f09e6237b4d00d4fbaebc929721
SHA165ed50c21def918fe1b7ca1988798cd49923dfeb
SHA2564478df71f1878ba985756ec59f61214ac7503ac19c090d6a3cceeaf678df3701
SHA512d7dc2a6a3fa415bee8282996eb7078a2bbc17b0f36c73feebdbdfd84e0bd30db956ac0eafaf5e25c28ff68e11db486d51b0968b9b685169cacaf89b09c6593c4
-
Filesize
353KB
MD553f50a1b609ea8fbcf475d8306bf658a
SHA12a153c7659598c0acbcb7ee4604872ac6ce3dd2d
SHA25659b8233ee185d357588f658a5793f0194499895747257f6284fc6162d0cfe95d
SHA512881580d6ba776343cba7ba5817b85f30ae771e94fc66cfc793cf4be441ca4d88f63b1f587878ac0e1bd3af8580ed164a728ff68494e2ac56a4341da45008ea56