Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031.exe
Resource
win10v2004-20241007-en
General
-
Target
8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031.exe
-
Size
529KB
-
MD5
9d42c0c985d868e3320668c91fcfd677
-
SHA1
c771dc34bae68c0918f990f90f47c0d39f21a6b6
-
SHA256
8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031
-
SHA512
959623967b6bc8adedabd18bf35a55f3d6849fe4d33ed23d8207b68e3b3b19a1de29b41fbad082e359c97b715eca0bc574c46d15e43fc555d13f608e6dc6dc26
-
SSDEEP
12288:NMrKy90Kz/5Tbujfbot9ca17x9+OZI0CX+ekAfiMO:PyVqjq9ca16m5CZq
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr513722.exe healer behavioral1/memory/1376-15-0x0000000000490000-0x000000000049A000-memory.dmp healer -
Healer family
-
Processes:
jr513722.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr513722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr513722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr513722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr513722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr513722.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr513722.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4824-22-0x0000000004D90000-0x0000000004DD6000-memory.dmp family_redline behavioral1/memory/4824-24-0x0000000005400000-0x0000000005444000-memory.dmp family_redline behavioral1/memory/4824-30-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-42-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-88-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-86-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-82-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-80-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-78-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-76-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-74-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-70-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-68-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-66-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-64-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-62-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-58-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-56-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-54-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-52-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-50-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-48-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-46-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-40-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-38-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-36-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-34-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-32-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-84-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-72-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-60-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-44-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-28-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-26-0x0000000005400000-0x000000000543F000-memory.dmp family_redline behavioral1/memory/4824-25-0x0000000005400000-0x000000000543F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziPX8895.exejr513722.exeku294698.exepid process 2144 ziPX8895.exe 1376 jr513722.exe 4824 ku294698.exe -
Processes:
jr513722.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr513722.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031.exeziPX8895.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziPX8895.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031.exeziPX8895.exeku294698.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziPX8895.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku294698.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr513722.exepid process 1376 jr513722.exe 1376 jr513722.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr513722.exeku294698.exedescription pid process Token: SeDebugPrivilege 1376 jr513722.exe Token: SeDebugPrivilege 4824 ku294698.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031.exeziPX8895.exedescription pid process target process PID 1964 wrote to memory of 2144 1964 8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031.exe ziPX8895.exe PID 1964 wrote to memory of 2144 1964 8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031.exe ziPX8895.exe PID 1964 wrote to memory of 2144 1964 8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031.exe ziPX8895.exe PID 2144 wrote to memory of 1376 2144 ziPX8895.exe jr513722.exe PID 2144 wrote to memory of 1376 2144 ziPX8895.exe jr513722.exe PID 2144 wrote to memory of 4824 2144 ziPX8895.exe ku294698.exe PID 2144 wrote to memory of 4824 2144 ziPX8895.exe ku294698.exe PID 2144 wrote to memory of 4824 2144 ziPX8895.exe ku294698.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031.exe"C:\Users\Admin\AppData\Local\Temp\8285b4dd8018d10d55209080c33df323f9868dda925606e8d1dd54c6fc0f4031.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPX8895.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPX8895.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr513722.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr513722.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku294698.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku294698.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4824
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD543d68917f5d2141c09fedf5128f9accb
SHA1229082936d89a3f9e77940d6f621f9438e4620c8
SHA256919294ad79ec952de380c054d60bb8ffe4bbd02dcd88441d9eab3f4c1c456297
SHA51242e6fcc4d69ff9e4d6a631ccb75d3f427c872aa74463e9ad497916095a0287310e298810ecb3daf067f0f1bf08153b67ecc83d8e65d39d530bce130686753b98
-
Filesize
12KB
MD5acd47d5b95be0b98f659fe3d78e691bc
SHA12326e0944585341a4c7a9abfaad00d75b284267a
SHA256d45ab7da32ba930fbdc658cfd666ed7fd79380e050d11a7e364f971958f6554a
SHA512193dd3c01be538b2ec5c83abc8f7205eeff913ceaa16e61b3269dd8e22ccc09fafef3b95d5dbba368033573fcddee504e7592efcb5c9323eaa846bbf135303ed
-
Filesize
434KB
MD5f491abed8bd7e6ef5f9fa7a55700e66c
SHA11370900d56e78507c39d4627bedf35de69340f8e
SHA256fbd91b659673517e812ee84aaf2ea973267fed1cb8da02d076912db12b3ea16d
SHA51283219628aa112243080854c2e77e33a30ccc9ece3df9d4aa1ae3651301ff445e556e69daddae11ba365a12644d8aea28d1910c910529fcd1c4a4d22652228f26