Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:05
Static task
static1
Behavioral task
behavioral1
Sample
775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exe
Resource
win10v2004-20241007-en
General
-
Target
775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exe
-
Size
537KB
-
MD5
d5940e773584f1cb5df4424b9e7ead00
-
SHA1
16360fe75400205b6cd709b756b0cb5a186729ef
-
SHA256
775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f
-
SHA512
a180436147d4162c8484a29b3b816cd55824c7c72541433b1b5f2b96d0d08c0f8833b7b0bc298da054864759cd59d20782573954d1c4c0b14bc375fb1b34be42
-
SSDEEP
12288:zMrWy90Ys+tBi1Ru5ODfZEOW4xl4i1sN15wuUA6AT:JyNDtBiWgD6OJ4LnTr
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr020552.exe healer behavioral1/memory/2740-15-0x0000000000B80000-0x0000000000B8A000-memory.dmp healer -
Healer family
-
Processes:
jr020552.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr020552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr020552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr020552.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr020552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr020552.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr020552.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/880-22-0x00000000023C0000-0x0000000002406000-memory.dmp family_redline behavioral1/memory/880-24-0x0000000002580000-0x00000000025C4000-memory.dmp family_redline behavioral1/memory/880-32-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-40-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-88-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-84-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-82-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-80-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-78-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-76-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-74-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-72-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-68-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-66-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-64-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-62-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-60-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-58-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-56-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-52-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-50-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-49-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-46-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-44-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-42-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-38-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-36-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-34-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-30-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-86-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-70-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-54-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-28-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-26-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/880-25-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zimJ5667.exejr020552.exeku706516.exepid process 3712 zimJ5667.exe 2740 jr020552.exe 880 ku706516.exe -
Processes:
jr020552.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr020552.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exezimJ5667.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zimJ5667.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
zimJ5667.exeku706516.exe775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zimJ5667.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku706516.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr020552.exepid process 2740 jr020552.exe 2740 jr020552.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr020552.exeku706516.exedescription pid process Token: SeDebugPrivilege 2740 jr020552.exe Token: SeDebugPrivilege 880 ku706516.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exezimJ5667.exedescription pid process target process PID 2268 wrote to memory of 3712 2268 775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exe zimJ5667.exe PID 2268 wrote to memory of 3712 2268 775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exe zimJ5667.exe PID 2268 wrote to memory of 3712 2268 775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exe zimJ5667.exe PID 3712 wrote to memory of 2740 3712 zimJ5667.exe jr020552.exe PID 3712 wrote to memory of 2740 3712 zimJ5667.exe jr020552.exe PID 3712 wrote to memory of 880 3712 zimJ5667.exe ku706516.exe PID 3712 wrote to memory of 880 3712 zimJ5667.exe ku706516.exe PID 3712 wrote to memory of 880 3712 zimJ5667.exe ku706516.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exe"C:\Users\Admin\AppData\Local\Temp\775570c81f2f8f829aa2032190acd78b5ecfc60a5f83f020d2af1beb6b38c42f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimJ5667.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimJ5667.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr020552.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr020552.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku706516.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku706516.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:880
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD55338d80240b9d6d398cf2f0237606d4a
SHA1d3bf4fa106caf31b5c686d4b767a0f50446edd28
SHA256536ecf1e66ac90211690e5e50003494d8a34d7df0df4c1387114ba1cbf279b19
SHA5120ef99255a3649cd3ead48a815ee6be696b04294e2b7ca1c9805313607c84801b694b060b808e118ccc6a1a33069aa4212a79c25c1d19295b91fe746ef8293ccf
-
Filesize
13KB
MD56a266dfa4a206f819a896ce11534d0e7
SHA14761380821b67e5be8f976493595f0c2946eec45
SHA256cc40b0f8a2f0461dbedbc34c4e1be7cc8e5bddd3c039191c06f29c8b03f46c80
SHA512392779dc08830a125703647abcb9ca3fd4231e8290dd9c9bd749d4a924ee47e1a7e27f9a59d384f41a327cc00461e8499c9ef74692e503ad1a371e5990efe573
-
Filesize
311KB
MD5e612e4211e08de49456c4da59a49e281
SHA1b466ef7ca9efb81e96da0654d8e776c96b4c8151
SHA256ced2a1564b4430227f5ecabe4721b36f5e77d14e82a575f2ef3e4f3d04b85001
SHA51293925ebaac233641a099cc22c45fe5b28b4f18770d5f2c6a0bad393ce0def0b43272851c18cf3836abf2794fc903004000a795bebb736e2a0dc6f1227251162c