Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 13:01
Static task
static1
Behavioral task
behavioral1
Sample
15fd0930fc18e4f1ab69807406d7ab94a7901ec3005919b75bb4ddd5402a61d2.exe
Resource
win10v2004-20241007-en
General
-
Target
15fd0930fc18e4f1ab69807406d7ab94a7901ec3005919b75bb4ddd5402a61d2.exe
-
Size
537KB
-
MD5
e23f39c917bb69508d92f21bcf80fcb4
-
SHA1
a82ea37b384f3d675553c075c7a476cd09140a95
-
SHA256
15fd0930fc18e4f1ab69807406d7ab94a7901ec3005919b75bb4ddd5402a61d2
-
SHA512
a1b697cb217675f6b7043378cb69896c356576aa8724720400830e1bbab759fd3dd647ef023acb2900a74e28ee3072059b4535ff4546460dce9f93b3b5c6d723
-
SSDEEP
12288:MMriy90IcljtxunVwftjdpOAQLoVo+78JXtth5T8ppV:eyfnVwfZvOSVB78Dth54pb
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr107743.exe healer behavioral1/memory/3932-15-0x0000000000100000-0x000000000010A000-memory.dmp healer -
Healer family
-
Processes:
jr107743.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr107743.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr107743.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr107743.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr107743.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr107743.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr107743.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2856-22-0x00000000024F0000-0x0000000002536000-memory.dmp family_redline behavioral1/memory/2856-24-0x00000000026A0000-0x00000000026E4000-memory.dmp family_redline behavioral1/memory/2856-46-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-86-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-84-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-82-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-80-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-78-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-76-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-74-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-72-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-70-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-68-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-66-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-64-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-62-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-60-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-58-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-56-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-55-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-52-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-50-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-48-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-44-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-42-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-40-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-38-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-36-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-34-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-32-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-88-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-30-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-28-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-26-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline behavioral1/memory/2856-25-0x00000000026A0000-0x00000000026DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zieJ3205.exejr107743.exeku829518.exepid process 3412 zieJ3205.exe 3932 jr107743.exe 2856 ku829518.exe -
Processes:
jr107743.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr107743.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
15fd0930fc18e4f1ab69807406d7ab94a7901ec3005919b75bb4ddd5402a61d2.exezieJ3205.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 15fd0930fc18e4f1ab69807406d7ab94a7901ec3005919b75bb4ddd5402a61d2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieJ3205.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
15fd0930fc18e4f1ab69807406d7ab94a7901ec3005919b75bb4ddd5402a61d2.exezieJ3205.exeku829518.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15fd0930fc18e4f1ab69807406d7ab94a7901ec3005919b75bb4ddd5402a61d2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zieJ3205.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku829518.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr107743.exepid process 3932 jr107743.exe 3932 jr107743.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr107743.exeku829518.exedescription pid process Token: SeDebugPrivilege 3932 jr107743.exe Token: SeDebugPrivilege 2856 ku829518.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
15fd0930fc18e4f1ab69807406d7ab94a7901ec3005919b75bb4ddd5402a61d2.exezieJ3205.exedescription pid process target process PID 916 wrote to memory of 3412 916 15fd0930fc18e4f1ab69807406d7ab94a7901ec3005919b75bb4ddd5402a61d2.exe zieJ3205.exe PID 916 wrote to memory of 3412 916 15fd0930fc18e4f1ab69807406d7ab94a7901ec3005919b75bb4ddd5402a61d2.exe zieJ3205.exe PID 916 wrote to memory of 3412 916 15fd0930fc18e4f1ab69807406d7ab94a7901ec3005919b75bb4ddd5402a61d2.exe zieJ3205.exe PID 3412 wrote to memory of 3932 3412 zieJ3205.exe jr107743.exe PID 3412 wrote to memory of 3932 3412 zieJ3205.exe jr107743.exe PID 3412 wrote to memory of 2856 3412 zieJ3205.exe ku829518.exe PID 3412 wrote to memory of 2856 3412 zieJ3205.exe ku829518.exe PID 3412 wrote to memory of 2856 3412 zieJ3205.exe ku829518.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\15fd0930fc18e4f1ab69807406d7ab94a7901ec3005919b75bb4ddd5402a61d2.exe"C:\Users\Admin\AppData\Local\Temp\15fd0930fc18e4f1ab69807406d7ab94a7901ec3005919b75bb4ddd5402a61d2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieJ3205.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieJ3205.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr107743.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr107743.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku829518.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku829518.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2856
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD5589358cab897538e1854c700329d1be0
SHA1c6706bd335001f672862e7121776717958c630c0
SHA2560337a6e21cd91504f65f5f001e2b72acf65ef96a5ea12ba388d3397d4803132f
SHA512431e777b88a5680f3c1c2d8b0153efe6606e43f8f00c920528a801e10dd917ec82d322d99191ba4abc3799eb4a1251d53bed46bd50d524fbba2d5462880f5109
-
Filesize
13KB
MD50232e18e6e7e0b675dbb91f97bab40d6
SHA12e8495217099a238bb0b41e5f383a4228b901edd
SHA2560fcaa1b957c4c1f12ed3b8120364047b56e9a52885f288dc26b2632e5662392e
SHA512136aac330d2bdc1496a2e2e2842055e5193df85f6b8fd44e5fc2767b8bbfe18f0e85f845460d3af759c6826f1ccff95e8a575c504ab6dd5891e8ac29d2b5f5e0
-
Filesize
311KB
MD59cee62c5febc9ef6c9b0d847c9f4a08e
SHA1a7992c252551f41c0167cd3b4bee1ec527a9b083
SHA25620b05c58bb129a8a809ac65f700beb3686ee7b5e7daece753a27172806e993d9
SHA512c8aa122c63c8d2c20a6dd88224af7c21d139cddf2c9062fe40e735ea58bb6faf682fc84a116c129f6a06cf5f2089d24ca535b8374aca323612047fddae54cf48