Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:47
Static task
static1
Behavioral task
behavioral1
Sample
47209107050f21c1b6a73bcf4226eba5cf1a450895544dc088e26d5b41736d77.exe
Resource
win10v2004-20241007-en
General
-
Target
47209107050f21c1b6a73bcf4226eba5cf1a450895544dc088e26d5b41736d77.exe
-
Size
537KB
-
MD5
4653d70120ea8bc914deaabae6f182f1
-
SHA1
b656f6e33599a740b571903875cb1028b2aeadcb
-
SHA256
47209107050f21c1b6a73bcf4226eba5cf1a450895544dc088e26d5b41736d77
-
SHA512
b2417bfc3924bfa2dc3721f484a8cc67ee71b3e93b636143888560a2fc1f02eb9ca85906b7615a63a20bd24fc152f207de0cd0ba50e6dc5cd5ecde07789a6845
-
SSDEEP
12288:MMrXy90/rNRxDrDgP4JGMYUL91GD/YHvUBw3a:TyU9r+41LPI/YHMBw3a
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr966451.exe healer behavioral1/memory/1204-15-0x0000000000A70000-0x0000000000A7A000-memory.dmp healer -
Healer family
-
Processes:
jr966451.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr966451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr966451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr966451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr966451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr966451.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr966451.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1612-22-0x0000000004AA0000-0x0000000004AE6000-memory.dmp family_redline behavioral1/memory/1612-24-0x00000000050F0000-0x0000000005134000-memory.dmp family_redline behavioral1/memory/1612-28-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-38-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-88-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-86-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-84-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-82-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-80-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-76-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-74-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-72-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-70-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-68-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-66-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-64-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-62-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-60-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-56-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-54-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-52-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-50-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-48-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-46-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-44-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-40-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-36-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-34-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-32-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-30-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-78-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-58-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-42-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-26-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline behavioral1/memory/1612-25-0x00000000050F0000-0x000000000512F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziDF7623.exejr966451.exeku383573.exepid process 4484 ziDF7623.exe 1204 jr966451.exe 1612 ku383573.exe -
Processes:
jr966451.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr966451.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
47209107050f21c1b6a73bcf4226eba5cf1a450895544dc088e26d5b41736d77.exeziDF7623.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 47209107050f21c1b6a73bcf4226eba5cf1a450895544dc088e26d5b41736d77.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziDF7623.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
47209107050f21c1b6a73bcf4226eba5cf1a450895544dc088e26d5b41736d77.exeziDF7623.exeku383573.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 47209107050f21c1b6a73bcf4226eba5cf1a450895544dc088e26d5b41736d77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziDF7623.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku383573.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr966451.exepid process 1204 jr966451.exe 1204 jr966451.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr966451.exeku383573.exedescription pid process Token: SeDebugPrivilege 1204 jr966451.exe Token: SeDebugPrivilege 1612 ku383573.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
47209107050f21c1b6a73bcf4226eba5cf1a450895544dc088e26d5b41736d77.exeziDF7623.exedescription pid process target process PID 3488 wrote to memory of 4484 3488 47209107050f21c1b6a73bcf4226eba5cf1a450895544dc088e26d5b41736d77.exe ziDF7623.exe PID 3488 wrote to memory of 4484 3488 47209107050f21c1b6a73bcf4226eba5cf1a450895544dc088e26d5b41736d77.exe ziDF7623.exe PID 3488 wrote to memory of 4484 3488 47209107050f21c1b6a73bcf4226eba5cf1a450895544dc088e26d5b41736d77.exe ziDF7623.exe PID 4484 wrote to memory of 1204 4484 ziDF7623.exe jr966451.exe PID 4484 wrote to memory of 1204 4484 ziDF7623.exe jr966451.exe PID 4484 wrote to memory of 1612 4484 ziDF7623.exe ku383573.exe PID 4484 wrote to memory of 1612 4484 ziDF7623.exe ku383573.exe PID 4484 wrote to memory of 1612 4484 ziDF7623.exe ku383573.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\47209107050f21c1b6a73bcf4226eba5cf1a450895544dc088e26d5b41736d77.exe"C:\Users\Admin\AppData\Local\Temp\47209107050f21c1b6a73bcf4226eba5cf1a450895544dc088e26d5b41736d77.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDF7623.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDF7623.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr966451.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr966451.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku383573.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku383573.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1612
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD565fddf1df20dfebc7dbd6d51dd6eba04
SHA157a3ac69956bc738c578d15fe3cb0e21ac1232a4
SHA256ad4edcab9c9aaa441a61a9d80cf8c56c0ed74a748d913696aca129044c301f15
SHA512d5c1be6f9a4ab550b63b4300892b8f805cc0d2b76e3c8159220e11b2f718ae2471114947201113c85fd0ca540145d9f6c036ec71f40ed08897364b2fd0f7f58b
-
Filesize
13KB
MD54d4a6068af3e5deeba2efb8d7af21076
SHA15941e1f7071746e8f6ec59297fd526dde81e5151
SHA25679eb67070ddbf9102662aca70b8a10b74dd86fbf6ab1b01099e65885208c2e63
SHA512d216aeabed83cae231ebe914370df5f565add34e5e7317a010b0bb304a81ba20a1862334a27a6b7e5a711e934019500c9d10dcd041f7ffeeb657f37fc0365454
-
Filesize
311KB
MD5aebe0c37ebecec86554f6fed2aba2e17
SHA1ead2cabc1099012936e5b73f6765d1559191297d
SHA256b24ddf3c2cd06e7a5621ec36941d6aaec5776c3526d04447777a7263080f07da
SHA512e442251f565c2c884e86170a9ad1b23b22af486d64681ad852074e137747bf8bde0351ae501e4c2eeb7313cc52c879cbf24a64429fc873ad899b15b672e3ef50