Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 11:01
Static task
static1
Behavioral task
behavioral1
Sample
1d681f61b8ffa0cb9907525685e3a815505fc6f955c22581ace0cf764180abe4.exe
Resource
win10v2004-20241007-en
General
-
Target
1d681f61b8ffa0cb9907525685e3a815505fc6f955c22581ace0cf764180abe4.exe
-
Size
522KB
-
MD5
5c9d07bfdb939291b65bb480fa22d3d6
-
SHA1
773951d42b071c62d61be5fdfc01793a494a9c1a
-
SHA256
1d681f61b8ffa0cb9907525685e3a815505fc6f955c22581ace0cf764180abe4
-
SHA512
2b796041d2f7a57ca1054179de5ce43f71eaf0e4365be40e783ab844714317484306306abef8cb3735929a8bf16bd586f5213961fb457bae6258d1dfdb615ef2
-
SSDEEP
6144:KCy+bnr+7p0yN90QEF5wU3jZqAxrOXepEil9F0yURpfObhlGiIWtStio5wN6mogg:uMr7y90fjZoCzM4brst6QN0PaPgZe
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr243763.exe healer behavioral1/memory/5072-15-0x0000000000BF0000-0x0000000000BFA000-memory.dmp healer -
Healer family
-
Processes:
jr243763.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr243763.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr243763.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr243763.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr243763.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr243763.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr243763.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4588-22-0x0000000002320000-0x0000000002366000-memory.dmp family_redline behavioral1/memory/4588-24-0x0000000004AF0000-0x0000000004B34000-memory.dmp family_redline behavioral1/memory/4588-32-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-40-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-88-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-86-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-84-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-80-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-78-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-76-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-74-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-72-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-68-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-66-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-64-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-62-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-61-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-56-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-54-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-52-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-50-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-48-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-46-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-44-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-42-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-38-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-36-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-34-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-82-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-70-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-58-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-30-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-28-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-26-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/4588-25-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zikY6413.exejr243763.exeku052981.exepid process 2236 zikY6413.exe 5072 jr243763.exe 4588 ku052981.exe -
Processes:
jr243763.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr243763.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1d681f61b8ffa0cb9907525685e3a815505fc6f955c22581ace0cf764180abe4.exezikY6413.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1d681f61b8ffa0cb9907525685e3a815505fc6f955c22581ace0cf764180abe4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zikY6413.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1d681f61b8ffa0cb9907525685e3a815505fc6f955c22581ace0cf764180abe4.exezikY6413.exeku052981.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d681f61b8ffa0cb9907525685e3a815505fc6f955c22581ace0cf764180abe4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zikY6413.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku052981.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr243763.exepid process 5072 jr243763.exe 5072 jr243763.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr243763.exeku052981.exedescription pid process Token: SeDebugPrivilege 5072 jr243763.exe Token: SeDebugPrivilege 4588 ku052981.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1d681f61b8ffa0cb9907525685e3a815505fc6f955c22581ace0cf764180abe4.exezikY6413.exedescription pid process target process PID 5060 wrote to memory of 2236 5060 1d681f61b8ffa0cb9907525685e3a815505fc6f955c22581ace0cf764180abe4.exe zikY6413.exe PID 5060 wrote to memory of 2236 5060 1d681f61b8ffa0cb9907525685e3a815505fc6f955c22581ace0cf764180abe4.exe zikY6413.exe PID 5060 wrote to memory of 2236 5060 1d681f61b8ffa0cb9907525685e3a815505fc6f955c22581ace0cf764180abe4.exe zikY6413.exe PID 2236 wrote to memory of 5072 2236 zikY6413.exe jr243763.exe PID 2236 wrote to memory of 5072 2236 zikY6413.exe jr243763.exe PID 2236 wrote to memory of 4588 2236 zikY6413.exe ku052981.exe PID 2236 wrote to memory of 4588 2236 zikY6413.exe ku052981.exe PID 2236 wrote to memory of 4588 2236 zikY6413.exe ku052981.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d681f61b8ffa0cb9907525685e3a815505fc6f955c22581ace0cf764180abe4.exe"C:\Users\Admin\AppData\Local\Temp\1d681f61b8ffa0cb9907525685e3a815505fc6f955c22581ace0cf764180abe4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikY6413.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikY6413.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr243763.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr243763.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku052981.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku052981.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4588
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD548a1b1b59a9ddbc665b9051aef949345
SHA16d111b0ca7a3b4ba9b6b002a20da5d77dca25e28
SHA256dc265e13475493ef75ee9c0cc36899a97cf64ebe226fcf024d90dbe62a273757
SHA512e56b0ef5f4d4746d552fbd0da90ea3697ed64c4f06ee45999e9a81090d46fb3720de9c2627d1979ea0c424728dc70c5a56fb28fe7208d86c9262e6efe862ef3c
-
Filesize
14KB
MD55f4c365c9a588252a4cfcb24acd02095
SHA10eac12acaeef9d9aa6cb5c9f1f8ad0345b32aa86
SHA25627f5fee8c7cfabf6f528d2d05a9f7f4c1d94101c14882af845bd4ffa83c6789c
SHA51250e2b1fcad84d58259080c123be6a234a6678d7e2e91185f04a1433aa30a02ec545d72a45419591d9351d7658dd01ce30bccd4e6fd01cde0a68755c2fb44a8fd
-
Filesize
295KB
MD50c3a811cc0a0eaf1e031696ea4b11fee
SHA11f197853a4291e972b5ef2acfca79a621cc3e42b
SHA25602c84c101e70fd3ec7fe374f6c85b38ca67bef02712d73cb8c0e5e6187964e80
SHA512fd95f831ef80042e7dd777f4b770af1d81833b0c45b1bc6ece71c3dbbfb6dc86a59af98a45107dafaf65cb1e77d202b060ac634a7c749c97ab2914f40b41b99f