Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 10:31
Static task
static1
Behavioral task
behavioral1
Sample
960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exe
Resource
win10v2004-20241007-en
General
-
Target
960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exe
-
Size
533KB
-
MD5
8cc772bd63d802fe97cac2d2963ce5b0
-
SHA1
1dd5031fd159ea6b115f784943f3ab3ef5cad137
-
SHA256
960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301
-
SHA512
c12cdbdd8b4e43abc267972ed4b5317fa2568137bd1715c47ab137529b48dd7fd41cea3d4b613a63e761043ecce9de43bcc774c3cc43059a1873a7b72dbc4fff
-
SSDEEP
12288:CMrUy905YyLnhiwzNElIWjz9NbYdtln5t8OzKJo:qyYYyjhl2lTjpN03tdJ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr712415.exe healer behavioral1/memory/3820-14-0x0000000000230000-0x000000000023A000-memory.dmp healer -
Healer family
-
Processes:
jr712415.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr712415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr712415.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr712415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr712415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr712415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr712415.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3476-23-0x0000000004A90000-0x0000000004AD6000-memory.dmp family_redline behavioral1/memory/3476-25-0x00000000050C0000-0x0000000005104000-memory.dmp family_redline behavioral1/memory/3476-35-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-47-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-89-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-87-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-85-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-83-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-81-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-79-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-77-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-73-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-71-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-69-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-67-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-65-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-63-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-61-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-59-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-57-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-53-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-51-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-49-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-45-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-43-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-41-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-39-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-37-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-33-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-31-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-29-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-75-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-55-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-27-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline behavioral1/memory/3476-26-0x00000000050C0000-0x00000000050FF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziVH9089.exejr712415.exeku133674.exepid process 4380 ziVH9089.exe 3820 jr712415.exe 3476 ku133674.exe -
Processes:
jr712415.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr712415.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exeziVH9089.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVH9089.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exeziVH9089.exeku133674.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziVH9089.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku133674.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr712415.exepid process 3820 jr712415.exe 3820 jr712415.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr712415.exeku133674.exedescription pid process Token: SeDebugPrivilege 3820 jr712415.exe Token: SeDebugPrivilege 3476 ku133674.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exeziVH9089.exedescription pid process target process PID 2852 wrote to memory of 4380 2852 960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exe ziVH9089.exe PID 2852 wrote to memory of 4380 2852 960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exe ziVH9089.exe PID 2852 wrote to memory of 4380 2852 960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exe ziVH9089.exe PID 4380 wrote to memory of 3820 4380 ziVH9089.exe jr712415.exe PID 4380 wrote to memory of 3820 4380 ziVH9089.exe jr712415.exe PID 4380 wrote to memory of 3476 4380 ziVH9089.exe ku133674.exe PID 4380 wrote to memory of 3476 4380 ziVH9089.exe ku133674.exe PID 4380 wrote to memory of 3476 4380 ziVH9089.exe ku133674.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exe"C:\Users\Admin\AppData\Local\Temp\960bebb78e2e566ef8eabb5874dad8ac8eeab64192199db312bb995c13c7a301.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVH9089.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVH9089.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr712415.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr712415.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku133674.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku133674.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3476
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD57aa26a3befaa000214723ec47dc9c936
SHA1f3fe85e5e5cad9a9f37eacd38241ad908b910f73
SHA2564841f0c99c5ce545ac0ab3058f66654651debb0c3eb8f35662cf0d505fddc54c
SHA512b546076c080e1d8017636018d80d4cfe7f8d324f3937fb7ff993e8b434089b4fd32b9934764c609f0d0b7bb477d6ff0a65d4dcbeac23691650c6fd7009c92d86
-
Filesize
11KB
MD5b2cbb8b422ac40b4cf4d78a440238dcb
SHA1cce3616fee8b3d6fee0f5c0a73cb69468d7c6def
SHA256d8f42e61bbfee866ce563c033becece3fbc164364509ab2fe5ebbb3ac9e4a03a
SHA51242333157cf550d0228f3f92ec416bb5b28c2e8e00252dc4aa52e39f26c811e284d519e229fdb7174ecf3861a666cdeaa5045720c432f8fd44b18a33b43e5aef1
-
Filesize
295KB
MD542c38731e9600a84bbad7ce8ecf8a984
SHA1c6f0c07ac76f7479ff9dd45df42940d85fa74a20
SHA256091dd1558ec50fea193b9ff24d2215d9939dee982178f88adeed2bb8dc072706
SHA51292a7974f129366699870b8a194a1e29d6ee69f6d384b20ded251cae829aba76d321476225baec50e92234fe421f6229392c574c6ac75d7865e699e273282092c