Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:50
Static task
static1
Behavioral task
behavioral1
Sample
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe
Resource
win10v2004-20241007-en
General
-
Target
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe
-
Size
534KB
-
MD5
4cccd2d13c5f3b787b3d92f61d827eb4
-
SHA1
270c3e061d718b10a63bcf53d3136cc2522d9ca9
-
SHA256
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd
-
SHA512
c00f851446754500af0ec68ed53188df1960da58f4775f903d723e3e15b924fdb9f06a9a2c9e2440cece37d078965a2a47945e0729dcd90cce6bca4e64ad4035
-
SSDEEP
12288:PMr/y90k/ajz0ZSH5rSPRPz6bKWY2rhZXJnbKp6:4yn/ajnwPzyK/2Vb86
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr456218.exe healer behavioral1/memory/3844-15-0x0000000000470000-0x000000000047A000-memory.dmp healer -
Healer family
-
Processes:
jr456218.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr456218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr456218.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr456218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr456218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr456218.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr456218.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/440-22-0x0000000004A30000-0x0000000004A76000-memory.dmp family_redline behavioral1/memory/440-24-0x0000000004AB0000-0x0000000004AF4000-memory.dmp family_redline behavioral1/memory/440-28-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-38-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-88-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-87-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-84-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-82-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-80-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-78-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-76-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-74-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-72-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-70-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-68-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-64-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-62-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-60-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-58-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-56-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-54-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-52-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-50-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-48-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-44-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-42-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-40-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-36-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-34-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-32-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-30-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-66-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-46-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-26-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/440-25-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zirM6966.exejr456218.exeku106547.exepid process 2904 zirM6966.exe 3844 jr456218.exe 440 ku106547.exe -
Processes:
jr456218.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr456218.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exezirM6966.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zirM6966.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
zirM6966.exeku106547.exe59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zirM6966.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku106547.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr456218.exepid process 3844 jr456218.exe 3844 jr456218.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr456218.exeku106547.exedescription pid process Token: SeDebugPrivilege 3844 jr456218.exe Token: SeDebugPrivilege 440 ku106547.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exezirM6966.exedescription pid process target process PID 4088 wrote to memory of 2904 4088 59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe zirM6966.exe PID 4088 wrote to memory of 2904 4088 59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe zirM6966.exe PID 4088 wrote to memory of 2904 4088 59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe zirM6966.exe PID 2904 wrote to memory of 3844 2904 zirM6966.exe jr456218.exe PID 2904 wrote to memory of 3844 2904 zirM6966.exe jr456218.exe PID 2904 wrote to memory of 440 2904 zirM6966.exe ku106547.exe PID 2904 wrote to memory of 440 2904 zirM6966.exe ku106547.exe PID 2904 wrote to memory of 440 2904 zirM6966.exe ku106547.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe"C:\Users\Admin\AppData\Local\Temp\59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirM6966.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirM6966.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr456218.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr456218.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106547.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106547.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:440
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD5e0dff0e465db1d21c6a29278fd95eaa7
SHA19a4350bafa95a7c361b2f9a44d5affb85f9ff4e7
SHA2568166019e222c62b813d089e831a597def6efbf920ac0bb6e7ffafc27763e0560
SHA51285decfe57eb0076c0959d2c9fa95514a3d164c9eea1ca4443cab96d4191d946b64db010d31fb0ee54f26faf3439c8869a8c6bf332ae3422d07ce7c9f48812824
-
Filesize
12KB
MD5d8f0ca8a6cc5d2cb5aa392135886795a
SHA1c9e6e2c8b3986e237886c2670e8e68d5dc6b1973
SHA256def0c9212749f519413f713756d71973b13eb580804d1e0d3e9d301a1e471458
SHA5123d8dd513e586b99b81b79780c43fa9c9a2c995d8eabccbfcb51db36be526fc920e0a69697a25eb5e2d616ff79f30d2fa11e70a49f6fd95434d8f15b877d64591
-
Filesize
319KB
MD5ec5902c90835381a20bb548fcde9ab30
SHA1ce265ac3fd74a011edbc4b641ddcbdd97e0fc472
SHA256cc45ef6509b33a1e07e7cbfb265bb6ab1e537f5172e6e2722b004157a809e436
SHA512a9707c9a32590f051bdc886951facafee6075078ec3d4cb3d122e481119888f60b975dd466fe1ef7f2108579d0143ed6d040e335a5a4c722dad48d339715ccee