Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e.exe
Resource
win10v2004-20241007-en
General
-
Target
2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e.exe
-
Size
529KB
-
MD5
957b9a8b8679f889a480dce419b3f524
-
SHA1
df6db84661afbe3100ce25ef15a79e68b99b7cba
-
SHA256
2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e
-
SHA512
d39fc8c697eac08e3928923c307b6e328e328c323119b5b8325b498a2a471bbbcc3c8c046994332b69de7137b2328f9150108315a48354e4ee1bda3eaa728316
-
SSDEEP
12288:VMrLy90yupTAOK9+usXYgGf0QRIP9H7s:Sy5uWsIgehIP9H7s
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr548241.exe healer behavioral1/memory/5028-15-0x0000000000520000-0x000000000052A000-memory.dmp healer -
Healer family
-
Processes:
jr548241.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr548241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr548241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr548241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr548241.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr548241.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr548241.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4036-22-0x0000000002820000-0x0000000002866000-memory.dmp family_redline behavioral1/memory/4036-24-0x00000000053F0000-0x0000000005434000-memory.dmp family_redline behavioral1/memory/4036-38-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-36-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-88-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-86-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-84-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-82-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-80-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-76-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-74-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-72-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-70-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-68-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-66-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-64-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-62-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-60-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-56-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-54-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-52-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-50-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-48-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-46-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-44-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-42-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-40-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-34-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-32-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-30-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-78-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-58-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-28-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-26-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/4036-25-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziGe5543.exejr548241.exeku481593.exepid process 3516 ziGe5543.exe 5028 jr548241.exe 4036 ku481593.exe -
Processes:
jr548241.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr548241.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e.exeziGe5543.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziGe5543.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3100 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e.exeziGe5543.exeku481593.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziGe5543.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku481593.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr548241.exepid process 5028 jr548241.exe 5028 jr548241.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr548241.exeku481593.exedescription pid process Token: SeDebugPrivilege 5028 jr548241.exe Token: SeDebugPrivilege 4036 ku481593.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e.exeziGe5543.exedescription pid process target process PID 2912 wrote to memory of 3516 2912 2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e.exe ziGe5543.exe PID 2912 wrote to memory of 3516 2912 2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e.exe ziGe5543.exe PID 2912 wrote to memory of 3516 2912 2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e.exe ziGe5543.exe PID 3516 wrote to memory of 5028 3516 ziGe5543.exe jr548241.exe PID 3516 wrote to memory of 5028 3516 ziGe5543.exe jr548241.exe PID 3516 wrote to memory of 4036 3516 ziGe5543.exe ku481593.exe PID 3516 wrote to memory of 4036 3516 ziGe5543.exe ku481593.exe PID 3516 wrote to memory of 4036 3516 ziGe5543.exe ku481593.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e.exe"C:\Users\Admin\AppData\Local\Temp\2286833f203b1e8e696cf46bdfe51dcc94f7c9164102a265d5eb38a8f8b1649e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGe5543.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGe5543.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr548241.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr548241.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku481593.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku481593.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3100
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD5cda1c800dc956fda7b306215cd42f0d4
SHA1c23fc7f796049c4fed9e74e7e6ff0699bd0e514c
SHA2564010edd72bb07e4050e8b9a85a917959d9cfdf99e10968e09ef5b7ce292f08ec
SHA512cbe53d93788acc7823294794b46cfc67e48ee694b3d40018fe97da16803f66aecaf1ceafc1a6edbaad23bd58914eb7146f245a5efeba0e07604ab2c077fcffd8
-
Filesize
12KB
MD579e895da7da41dc6f720d23ebeb3f244
SHA1b909e5e06b46c79566f9f6ff3b7462d3e1701cc9
SHA2563215227bed5dda814e74c77a4623bce35a428fe35fde48df75afc18b10524aba
SHA512f394d49aa74eae1de43ea71753c8ec8f72edea686add06a2b0cc660ef095914b10e8ad87580cdc736d607b8ee6f3f0d7e9b847364908e845a74dd87f379d941e
-
Filesize
353KB
MD5a92c98d3597c370117e84d3dba808edd
SHA1c182a67a34152f11f44cef537a7f67eb5f40468f
SHA25601fbab6a6dc515eb87a8b65f2bd101167ce54a35693a5caea5c6b2e0db72e957
SHA51245fb0141dc6ddbb07376f027475642a2643ea1bc338e9acadf78bb250e98648aacf0d3da0f3354ac2a4280d9d5503988aeac49a59f46b1eef5391b8ce0db4791