Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
4998a8dafac842a21014685ec878fc81a54c2fb40e5f32c8ddf5c01f2a34df1d.exe
Resource
win10v2004-20241007-en
General
-
Target
4998a8dafac842a21014685ec878fc81a54c2fb40e5f32c8ddf5c01f2a34df1d.exe
-
Size
529KB
-
MD5
d98fbbd0177dd6eb2c1dc597c347708c
-
SHA1
55706d3dbc50d4278cbc41561f7bd6cebb5a5b5a
-
SHA256
4998a8dafac842a21014685ec878fc81a54c2fb40e5f32c8ddf5c01f2a34df1d
-
SHA512
b33216fc218606165a45cc5dbbf5d16c9e7dbc1d0685364ed0950db428b728d24cca3fc9dc3933b2fe74af0ab2b6836d82bc8146dcffbbe3b79b4c1ebedf60c8
-
SSDEEP
12288:2MrBy90TVO22buGg/A3J6C5W/LE8+xPVs+exYLsxmI1X:byk0YLt/LE8UP6+esG
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr608342.exe healer behavioral1/memory/4112-15-0x00000000001C0000-0x00000000001CA000-memory.dmp healer -
Healer family
-
Processes:
jr608342.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr608342.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr608342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr608342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr608342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr608342.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr608342.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2196-22-0x0000000004950000-0x0000000004996000-memory.dmp family_redline behavioral1/memory/2196-24-0x0000000007160000-0x00000000071A4000-memory.dmp family_redline behavioral1/memory/2196-38-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-42-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-88-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-86-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-84-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-82-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-80-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-78-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-76-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-74-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-72-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-70-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-68-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-66-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-64-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-62-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-60-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-58-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-56-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-54-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-52-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-50-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-48-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-46-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-44-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-40-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-36-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-34-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-32-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-30-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-28-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-26-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/2196-25-0x0000000007160000-0x000000000719F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziOw7814.exejr608342.exeku151309.exepid process 1136 ziOw7814.exe 4112 jr608342.exe 2196 ku151309.exe -
Processes:
jr608342.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr608342.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4998a8dafac842a21014685ec878fc81a54c2fb40e5f32c8ddf5c01f2a34df1d.exeziOw7814.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4998a8dafac842a21014685ec878fc81a54c2fb40e5f32c8ddf5c01f2a34df1d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziOw7814.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 6128 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4998a8dafac842a21014685ec878fc81a54c2fb40e5f32c8ddf5c01f2a34df1d.exeziOw7814.exeku151309.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4998a8dafac842a21014685ec878fc81a54c2fb40e5f32c8ddf5c01f2a34df1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziOw7814.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku151309.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr608342.exepid process 4112 jr608342.exe 4112 jr608342.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr608342.exeku151309.exedescription pid process Token: SeDebugPrivilege 4112 jr608342.exe Token: SeDebugPrivilege 2196 ku151309.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4998a8dafac842a21014685ec878fc81a54c2fb40e5f32c8ddf5c01f2a34df1d.exeziOw7814.exedescription pid process target process PID 3084 wrote to memory of 1136 3084 4998a8dafac842a21014685ec878fc81a54c2fb40e5f32c8ddf5c01f2a34df1d.exe ziOw7814.exe PID 3084 wrote to memory of 1136 3084 4998a8dafac842a21014685ec878fc81a54c2fb40e5f32c8ddf5c01f2a34df1d.exe ziOw7814.exe PID 3084 wrote to memory of 1136 3084 4998a8dafac842a21014685ec878fc81a54c2fb40e5f32c8ddf5c01f2a34df1d.exe ziOw7814.exe PID 1136 wrote to memory of 4112 1136 ziOw7814.exe jr608342.exe PID 1136 wrote to memory of 4112 1136 ziOw7814.exe jr608342.exe PID 1136 wrote to memory of 2196 1136 ziOw7814.exe ku151309.exe PID 1136 wrote to memory of 2196 1136 ziOw7814.exe ku151309.exe PID 1136 wrote to memory of 2196 1136 ziOw7814.exe ku151309.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4998a8dafac842a21014685ec878fc81a54c2fb40e5f32c8ddf5c01f2a34df1d.exe"C:\Users\Admin\AppData\Local\Temp\4998a8dafac842a21014685ec878fc81a54c2fb40e5f32c8ddf5c01f2a34df1d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOw7814.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOw7814.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr608342.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr608342.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku151309.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku151309.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:6128
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5e5e3d3325b3feb5455352d5a5845deba
SHA18781c7e21e9a22bd5fd57d878e014165be91d893
SHA256eb9167d05c9b5f226ea142eaffb15e63bc5f43ffaf2a376173523f18c4f9fc34
SHA512d750cd753838814b01bd920c65d372836b6cedb951e4764636fcaa83e9ca3190315c9b56e4daab83bd30ca9d77c67e5b32e2fc8ea961ffdf986a95d15f506778
-
Filesize
11KB
MD5c8a8cea45e9b40590620ed7be3a231aa
SHA1104f68acbfb921ed2e7bf6fb35f427643e7bbc2c
SHA256e8777b31dbbc5db5ca15255be6ba323e57a5ca6eefe1f775d35bb05925af4aa1
SHA512c59e0d5da5c966524f2370a5877212a3cfc9fc628ac7a09608bac67a13e5325c3858e50131fa4e0b1e6cdc036e48c481d40cfceeebf5cc52ab050ca1ff77f7d1
-
Filesize
354KB
MD504e25cf6c8b2f6be58659c85ec6949d5
SHA1de06ce9c612177407591ae07e491581af9b0ca14
SHA256b7da28fb6e466cd1c9998927328d8ca95ebc803277680c6a7a02fc997e6f722c
SHA5120a107585ad280978f1340d28aa5476e0745f7d9ebc62c2ef182463478af90dd7204227462c6703efa926880c43f9398746f89bb37484511e83669279c3ab0d0d