Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5.exe
Resource
win10v2004-20241007-en
General
-
Target
21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5.exe
-
Size
537KB
-
MD5
be55fa7c5c9d2bba5faad5d6a579d60d
-
SHA1
2c7c8ecd612bb51bcf76311c73db416609c753cf
-
SHA256
21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5
-
SHA512
e5ccf403cb3ff02950e4da4c3aa204eea028ff62bbf0e9d11e249a216a3a8b325bbb7c3320338e667763bd33a167a3fbfb9dfb53ddf6dadd5877a31987313be7
-
SSDEEP
12288:vMrqy90/TRQcauBvUMEIVYawUv+Hzww6psTd6ohMkBUF:JyeRBUMEI9wPTwwT4oycUF
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr021487.exe healer behavioral1/memory/5072-15-0x0000000000120000-0x000000000012A000-memory.dmp healer -
Healer family
-
Processes:
jr021487.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr021487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr021487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr021487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr021487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr021487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr021487.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2432-22-0x00000000028F0000-0x0000000002936000-memory.dmp family_redline behavioral1/memory/2432-24-0x00000000053C0000-0x0000000005404000-memory.dmp family_redline behavioral1/memory/2432-30-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-28-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-26-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-25-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-44-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-88-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-86-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-84-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-80-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-78-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-76-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-75-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-70-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-68-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-66-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-64-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-62-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-60-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-56-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-54-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-52-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-50-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-49-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-42-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-41-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-38-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-36-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-35-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-32-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-82-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-72-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-58-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2432-46-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziph4617.exejr021487.exeku362743.exepid process 1180 ziph4617.exe 5072 jr021487.exe 2432 ku362743.exe -
Processes:
jr021487.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr021487.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5.exeziph4617.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziph4617.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5.exeziph4617.exeku362743.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziph4617.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku362743.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr021487.exepid process 5072 jr021487.exe 5072 jr021487.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr021487.exeku362743.exedescription pid process Token: SeDebugPrivilege 5072 jr021487.exe Token: SeDebugPrivilege 2432 ku362743.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5.exeziph4617.exedescription pid process target process PID 1360 wrote to memory of 1180 1360 21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5.exe ziph4617.exe PID 1360 wrote to memory of 1180 1360 21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5.exe ziph4617.exe PID 1360 wrote to memory of 1180 1360 21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5.exe ziph4617.exe PID 1180 wrote to memory of 5072 1180 ziph4617.exe jr021487.exe PID 1180 wrote to memory of 5072 1180 ziph4617.exe jr021487.exe PID 1180 wrote to memory of 2432 1180 ziph4617.exe ku362743.exe PID 1180 wrote to memory of 2432 1180 ziph4617.exe ku362743.exe PID 1180 wrote to memory of 2432 1180 ziph4617.exe ku362743.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5.exe"C:\Users\Admin\AppData\Local\Temp\21bc5d9b0866e01584d033c5597c4c39eaa7c24e0fb832f499f2ccca4f622aa5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziph4617.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziph4617.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr021487.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr021487.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku362743.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku362743.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2432
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD506e5e62c7597cdd2f98324d8bad9a18c
SHA1e8632cb4b510b6eb8df6204a15c88f41f9a0ccce
SHA256723c9b18f206c73e0adba02e53c63f046abf3deda0eb1d176c85118c29031af6
SHA51256e377264435e557af19179e2027479e3eb4f67d6093ce451807008c2074087a27521e6720c01c8b5369869eda4b0214c48c32467197b7b7ff85050501272093
-
Filesize
14KB
MD5c6ec40da40d44dfcb0159310e512f44b
SHA1ee1ece85f8ccf2868ae1572cb7a9bdadb34273e3
SHA2564097ea3b17476e67b43ef4c661b1640de543f828afc0d6a104e960648b1fd4ea
SHA512b0d724b0482cdf08df54b758e344bc206809f01e599bb1af7a7691eefe687f278bb88e4b0624153da8338a75b6d53427678682f306ae92686498e8858b9f489a
-
Filesize
352KB
MD5525b2f51993d4b58a9016a225a08e9de
SHA1c7fcf547f90cc69a541fcbb04d5bc8abaf560d14
SHA256496f441214508fa2b186e447b309574f0a48dd60ba5d0861d473d7e1a9dd0603
SHA5121aecf0b9da096e9a34ac7077f2eb4a275d2033e1c67fee3705f2cddc472276496ad1a8f78fdaebbb266d1bc11c730eb900221d5094174137c3659245ebeaef97