Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 11:54
Static task
static1
Behavioral task
behavioral1
Sample
73431d821fe0a0dacb06d3396f69a21f2af49e40871a265f8065e34428d28d51.exe
Resource
win10v2004-20241007-en
General
-
Target
73431d821fe0a0dacb06d3396f69a21f2af49e40871a265f8065e34428d28d51.exe
-
Size
560KB
-
MD5
1888c28c2eef34e143a074b0c65d9737
-
SHA1
77ae6c843f4461fd11d64d3fe0f3208e3584f45d
-
SHA256
73431d821fe0a0dacb06d3396f69a21f2af49e40871a265f8065e34428d28d51
-
SHA512
f3acc7686700aeed5b91625544b9083c4005299e64701a4219b03737edbab2d49b89fe8ff625f9a1ae44d82ea2e5b8901cc64c51446653c8f71e9d20b0d24074
-
SSDEEP
12288:CMrgy90zzQ4QDSanB7MxHxYGRcdlPB5pV4:+yDPDJnCheGR6PnpV4
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr129543.exe healer behavioral1/memory/2456-15-0x00000000005C0000-0x00000000005CA000-memory.dmp healer -
Healer family
-
Processes:
jr129543.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr129543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr129543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr129543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr129543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr129543.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr129543.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4636-22-0x0000000002940000-0x0000000002986000-memory.dmp family_redline behavioral1/memory/4636-24-0x0000000005410000-0x0000000005454000-memory.dmp family_redline behavioral1/memory/4636-38-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-88-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-86-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-84-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-82-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-80-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-78-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-76-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-74-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-72-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-70-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-68-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-67-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-62-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-60-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-58-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-56-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-54-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-52-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-50-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-48-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-46-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-44-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-42-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-40-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-36-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-34-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-32-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-30-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-28-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-64-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-26-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4636-25-0x0000000005410000-0x000000000544F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziEt0891.exejr129543.exeku085456.exepid process 4804 ziEt0891.exe 2456 jr129543.exe 4636 ku085456.exe -
Processes:
jr129543.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr129543.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
73431d821fe0a0dacb06d3396f69a21f2af49e40871a265f8065e34428d28d51.exeziEt0891.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 73431d821fe0a0dacb06d3396f69a21f2af49e40871a265f8065e34428d28d51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEt0891.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku085456.exe73431d821fe0a0dacb06d3396f69a21f2af49e40871a265f8065e34428d28d51.exeziEt0891.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku085456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73431d821fe0a0dacb06d3396f69a21f2af49e40871a265f8065e34428d28d51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziEt0891.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr129543.exepid process 2456 jr129543.exe 2456 jr129543.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr129543.exeku085456.exedescription pid process Token: SeDebugPrivilege 2456 jr129543.exe Token: SeDebugPrivilege 4636 ku085456.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
73431d821fe0a0dacb06d3396f69a21f2af49e40871a265f8065e34428d28d51.exeziEt0891.exedescription pid process target process PID 4160 wrote to memory of 4804 4160 73431d821fe0a0dacb06d3396f69a21f2af49e40871a265f8065e34428d28d51.exe ziEt0891.exe PID 4160 wrote to memory of 4804 4160 73431d821fe0a0dacb06d3396f69a21f2af49e40871a265f8065e34428d28d51.exe ziEt0891.exe PID 4160 wrote to memory of 4804 4160 73431d821fe0a0dacb06d3396f69a21f2af49e40871a265f8065e34428d28d51.exe ziEt0891.exe PID 4804 wrote to memory of 2456 4804 ziEt0891.exe jr129543.exe PID 4804 wrote to memory of 2456 4804 ziEt0891.exe jr129543.exe PID 4804 wrote to memory of 4636 4804 ziEt0891.exe ku085456.exe PID 4804 wrote to memory of 4636 4804 ziEt0891.exe ku085456.exe PID 4804 wrote to memory of 4636 4804 ziEt0891.exe ku085456.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\73431d821fe0a0dacb06d3396f69a21f2af49e40871a265f8065e34428d28d51.exe"C:\Users\Admin\AppData\Local\Temp\73431d821fe0a0dacb06d3396f69a21f2af49e40871a265f8065e34428d28d51.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEt0891.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEt0891.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr129543.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr129543.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku085456.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku085456.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4636
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD523b662deb829fb51a1ea1304229a1f35
SHA106c81db706cbb148c07cf15e4ad29ea4123572d7
SHA25687f23eebc8ff4b273c9356f2c22ad9a96981294899a55fef5954c9979bed78e7
SHA5120c105ada80613e760c9e08e9dffec813403a5726439699b6056a65294f1e30021f14e8276089f5c6b245dd3d095ee87a8872a251fa9705d2f56f26fb4b29053f
-
Filesize
13KB
MD5fbae6642738fc0259a38c805b2e77afe
SHA1e4fe779f4c01964757936b503ca9bb2ce0c08217
SHA256281b0349ecf48ce797a70455c9b129bdbaea6c82c98c39b15dc9e910665cbf02
SHA5120cf14499698a6b625eee336a142e6e7ab2e4cf5121d8fb9682824b5c95e754f84b22bc7a6ad29138dff5f2654d3d2d380f64825de2eb95153e903f4f6454edb4
-
Filesize
370KB
MD54be7512fe183e40331fee7edabc2e047
SHA1ff6e03c97f0fd2594dd0fd74cbc8808023f7bb71
SHA25653f270c5cd510ed002c1c7d93e0f1a7ba4f0fe0d4f15613d33c82813d3996c72
SHA5125ac1853805eff75ba6ccdb3866fd32c537fb2e7b76cb69395e378309838e5de1c9f0d6e3f1115c740dbbdfcf6f0dfbbeacac4a56727a45f98c755f3134014bc5