Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 10:52
Static task
static1
Behavioral task
behavioral1
Sample
cf11266c33e0256ac9a78884baf6b0f28bf00ee82fba3abef882d33c4c9c303a.exe
Resource
win10v2004-20241007-en
General
-
Target
cf11266c33e0256ac9a78884baf6b0f28bf00ee82fba3abef882d33c4c9c303a.exe
-
Size
529KB
-
MD5
1f8210d90bb06cf1db1b6527787a03c2
-
SHA1
93dc2b6415c1134e729e44d6f1bf3e417d1ba25b
-
SHA256
cf11266c33e0256ac9a78884baf6b0f28bf00ee82fba3abef882d33c4c9c303a
-
SHA512
86087f96f2bbab86d8fe3debef9da9166193ba899a50ff9e506d894a15b256414a5c382d38f1f078e62b746363133b307a7d797a80f186cdfb39b6f21ef88503
-
SSDEEP
12288:6MrAy90c1PxGL/z8aAjZ64e+cC1ow86p:uyD1PQQaCftcC1186p
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr687410.exe healer behavioral1/memory/4232-15-0x00000000008B0000-0x00000000008BA000-memory.dmp healer -
Healer family
-
Processes:
jr687410.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr687410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr687410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr687410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr687410.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr687410.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr687410.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1508-22-0x0000000002700000-0x0000000002746000-memory.dmp family_redline behavioral1/memory/1508-24-0x0000000004E30000-0x0000000004E74000-memory.dmp family_redline behavioral1/memory/1508-30-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-34-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-32-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-76-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-54-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-28-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-26-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-25-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-88-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-86-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-84-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-82-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-80-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-78-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-74-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-72-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-70-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-68-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-66-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-64-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-62-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-60-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-58-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-56-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-52-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-50-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-48-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-46-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-44-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-42-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-40-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-38-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline behavioral1/memory/1508-36-0x0000000004E30000-0x0000000004E6F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziQw1678.exejr687410.exeku304806.exepid process 4040 ziQw1678.exe 4232 jr687410.exe 1508 ku304806.exe -
Processes:
jr687410.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr687410.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziQw1678.execf11266c33e0256ac9a78884baf6b0f28bf00ee82fba3abef882d33c4c9c303a.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziQw1678.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf11266c33e0256ac9a78884baf6b0f28bf00ee82fba3abef882d33c4c9c303a.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cf11266c33e0256ac9a78884baf6b0f28bf00ee82fba3abef882d33c4c9c303a.exeziQw1678.exeku304806.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf11266c33e0256ac9a78884baf6b0f28bf00ee82fba3abef882d33c4c9c303a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziQw1678.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku304806.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr687410.exepid process 4232 jr687410.exe 4232 jr687410.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr687410.exeku304806.exedescription pid process Token: SeDebugPrivilege 4232 jr687410.exe Token: SeDebugPrivilege 1508 ku304806.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
cf11266c33e0256ac9a78884baf6b0f28bf00ee82fba3abef882d33c4c9c303a.exeziQw1678.exedescription pid process target process PID 448 wrote to memory of 4040 448 cf11266c33e0256ac9a78884baf6b0f28bf00ee82fba3abef882d33c4c9c303a.exe ziQw1678.exe PID 448 wrote to memory of 4040 448 cf11266c33e0256ac9a78884baf6b0f28bf00ee82fba3abef882d33c4c9c303a.exe ziQw1678.exe PID 448 wrote to memory of 4040 448 cf11266c33e0256ac9a78884baf6b0f28bf00ee82fba3abef882d33c4c9c303a.exe ziQw1678.exe PID 4040 wrote to memory of 4232 4040 ziQw1678.exe jr687410.exe PID 4040 wrote to memory of 4232 4040 ziQw1678.exe jr687410.exe PID 4040 wrote to memory of 1508 4040 ziQw1678.exe ku304806.exe PID 4040 wrote to memory of 1508 4040 ziQw1678.exe ku304806.exe PID 4040 wrote to memory of 1508 4040 ziQw1678.exe ku304806.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf11266c33e0256ac9a78884baf6b0f28bf00ee82fba3abef882d33c4c9c303a.exe"C:\Users\Admin\AppData\Local\Temp\cf11266c33e0256ac9a78884baf6b0f28bf00ee82fba3abef882d33c4c9c303a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQw1678.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQw1678.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr687410.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr687410.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku304806.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku304806.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1508
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD5dab0c741b280e97c8434d6af22568356
SHA17d6ed3a43215b97e3da5a90d1f303713cff5b9f4
SHA2566ba681352c6fbe1b0dc8ebe8c43ec2c9eade0d2095f4177f82b1a8db2ff38187
SHA512e11a665e98301456df912d1be48b460c63b1777c1114772533ad3ba3a692769cc802b7d4eed16046b88aee39472e0ed56058a108011ef9218944268918bef42e
-
Filesize
12KB
MD54193a9138ac09842c53a4a25fe14d65c
SHA10c33bbda51697b3d024b3398c0b7fec5cbd240f4
SHA2565bf200e419132fdbe25b142b380fe6336010e3cfd2d7b43f835fad4d02a2d7af
SHA5121203ac1138b9262d35a4e939c8a92cacec77a0866d3f47167c3229b01606b58a2c2bb85c6019e33164042d367570066fc2722a08cfbc7fc8c2567020242bef11
-
Filesize
353KB
MD5228e9f34121e86272255d5fe0e70b0de
SHA10cdac7354f8409e5f16f693eb94b7eea9a931a62
SHA25646774392d56d9b252691065098559e542851cc05b409c5fc4cbb4848451735a0
SHA512712b6748d714b799fee1c06b8c801f5d92179aec24bf2d1f46158d2604b5448555512e63e6436bb0387ccb3b55703b5ded805639ce77820d35b7965aa4c693e2