Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:10
Static task
static1
Behavioral task
behavioral1
Sample
d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exe
Resource
win10v2004-20241007-en
General
-
Target
d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exe
-
Size
530KB
-
MD5
36eeb28cc41c90ebb7b37566a64b41e8
-
SHA1
f6c49647b25bc49393bef03150f0102436e0732f
-
SHA256
d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49
-
SHA512
69802b9c9ce31233830294c81fbf55f3f192c2218ee12130f73ce41fb7308d02bdefc54266ad7ee068459184e1799ba568521842a488a7556cb908b8a6067da4
-
SSDEEP
12288:IMr6y909t3lb96i16KnPR5f5KXa/6mCgoh4tigRcL:yy+t3lJ6I6KPHA1mCgohF0cL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr174352.exe healer behavioral1/memory/3240-15-0x0000000000410000-0x000000000041A000-memory.dmp healer -
Healer family
-
Processes:
jr174352.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr174352.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr174352.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr174352.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr174352.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr174352.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr174352.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2128-22-0x00000000023A0000-0x00000000023E6000-memory.dmp family_redline behavioral1/memory/2128-24-0x0000000005190000-0x00000000051D4000-memory.dmp family_redline behavioral1/memory/2128-26-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-42-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-88-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-86-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-82-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-80-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-79-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-76-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-74-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-72-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-70-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-68-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-66-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-64-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-60-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-58-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-56-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-54-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-52-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-50-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-48-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-46-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-40-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-38-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-36-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-34-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-32-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-30-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-28-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-84-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-62-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-44-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline behavioral1/memory/2128-25-0x0000000005190000-0x00000000051CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zipu2233.exejr174352.exeku649437.exepid process 2452 zipu2233.exe 3240 jr174352.exe 2128 ku649437.exe -
Processes:
jr174352.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr174352.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exezipu2233.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipu2233.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exezipu2233.exeku649437.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zipu2233.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku649437.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr174352.exepid process 3240 jr174352.exe 3240 jr174352.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr174352.exeku649437.exedescription pid process Token: SeDebugPrivilege 3240 jr174352.exe Token: SeDebugPrivilege 2128 ku649437.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exezipu2233.exedescription pid process target process PID 4784 wrote to memory of 2452 4784 d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exe zipu2233.exe PID 4784 wrote to memory of 2452 4784 d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exe zipu2233.exe PID 4784 wrote to memory of 2452 4784 d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exe zipu2233.exe PID 2452 wrote to memory of 3240 2452 zipu2233.exe jr174352.exe PID 2452 wrote to memory of 3240 2452 zipu2233.exe jr174352.exe PID 2452 wrote to memory of 2128 2452 zipu2233.exe ku649437.exe PID 2452 wrote to memory of 2128 2452 zipu2233.exe ku649437.exe PID 2452 wrote to memory of 2128 2452 zipu2233.exe ku649437.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exe"C:\Users\Admin\AppData\Local\Temp\d814915b407a0539e9a3f7fb22e5a442d751341ee2d03e483bfb90663b257d49.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipu2233.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipu2233.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr174352.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr174352.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku649437.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku649437.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2128
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD58990ac877a1000ed1b4f257e5d5df627
SHA148602887f55bf2698e74e25174f32b792f8aa75d
SHA25607e76c3008eec30eb2449520b744079f9de35e46ce403d3476e0e74230814742
SHA5125f4310f023b54ec15a526eb2d2441b3727b7f70301dcc0e478e62da0227204913c200beeffb5e2a29c2873a2c3538601b37115857e306ade7948587ecd3c5d74
-
Filesize
12KB
MD50b58bbcc4e55a907e17a6cf6d4c4aa36
SHA160eda9297adae40821bdc6401a0977b10762b3a3
SHA256e21f096ce2ac8675b08d60d7b72de941c381ac3f023ccea0736fd459f479e732
SHA5121e47bcc9842316ad2c953afc500af6e94993a5fed3267bdbde3eba62313651b4fd5f99ba7bd27e6a8c0c2e2caa10634b8d80618a6d6b2fc9c6878be61b84e939
-
Filesize
434KB
MD51654ad66aff37da97d28ee4cb2760484
SHA17d5582f5506e80093a9d5f67de71c4b14b25fc2a
SHA2564fc639f3899a369325f4ce13b0474fdb247a9259cc4c4e9093d7d805bc2e7c8d
SHA5124e204342a2e1da1e8876b069d3f4cbada36a89fc7f6fd15ae3241e8e0c69ea481dfc4c7dfae67b4745f084321a97216418a1ddb9976f9695165ba7da23296f06