Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:40
Static task
static1
Behavioral task
behavioral1
Sample
8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f.exe
Resource
win10v2004-20241007-en
General
-
Target
8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f.exe
-
Size
536KB
-
MD5
124dce24cadd7cce7ca3ce1f881f8840
-
SHA1
36ed8ca9d61023587b3eef5cb9066ea6f815cb16
-
SHA256
8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f
-
SHA512
fc075c6cdb05278ee569051f9453c24af81bfbcc6d29df15341e1f218692db2c531b0d33a9a7c3129d2fd969eefff7c5562db05dc20b8a29458db76fef648ee9
-
SSDEEP
12288:dMrny906GK987QzzWA2+NGzD5BgLrmkdf6:OyXMQR2+NG3g/C
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr285385.exe healer behavioral1/memory/1800-15-0x0000000000910000-0x000000000091A000-memory.dmp healer -
Healer family
-
Processes:
jr285385.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr285385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr285385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr285385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr285385.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr285385.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr285385.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4256-22-0x0000000002800000-0x0000000002846000-memory.dmp family_redline behavioral1/memory/4256-24-0x0000000002990000-0x00000000029D4000-memory.dmp family_redline behavioral1/memory/4256-30-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-40-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-88-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-86-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-84-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-82-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-80-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-78-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-74-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-72-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-70-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-68-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-66-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-64-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-60-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-58-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-56-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-55-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-52-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-50-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-48-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-46-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-42-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-38-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-37-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-34-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-32-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-76-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-62-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-44-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-28-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-26-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/4256-25-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziwq7301.exejr285385.exeku640021.exepid process 1456 ziwq7301.exe 1800 jr285385.exe 4256 ku640021.exe -
Processes:
jr285385.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr285385.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f.exeziwq7301.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziwq7301.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f.exeziwq7301.exeku640021.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziwq7301.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku640021.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr285385.exepid process 1800 jr285385.exe 1800 jr285385.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr285385.exeku640021.exedescription pid process Token: SeDebugPrivilege 1800 jr285385.exe Token: SeDebugPrivilege 4256 ku640021.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f.exeziwq7301.exedescription pid process target process PID 3976 wrote to memory of 1456 3976 8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f.exe ziwq7301.exe PID 3976 wrote to memory of 1456 3976 8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f.exe ziwq7301.exe PID 3976 wrote to memory of 1456 3976 8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f.exe ziwq7301.exe PID 1456 wrote to memory of 1800 1456 ziwq7301.exe jr285385.exe PID 1456 wrote to memory of 1800 1456 ziwq7301.exe jr285385.exe PID 1456 wrote to memory of 4256 1456 ziwq7301.exe ku640021.exe PID 1456 wrote to memory of 4256 1456 ziwq7301.exe ku640021.exe PID 1456 wrote to memory of 4256 1456 ziwq7301.exe ku640021.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f.exe"C:\Users\Admin\AppData\Local\Temp\8aaa5c58df0a27a6d6352bb587f69e1f50de08d9a0f28d27dada11b4c835aa2f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwq7301.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwq7301.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr285385.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr285385.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku640021.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku640021.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4256
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD500c6c3199ef19ee342d20833b124b1d8
SHA1b4f19bf046f0ba9b66fdc03078c756c7526a7d60
SHA256df09b054497c06756b9307d13b2796f5e852c00d18a9a8dc8abaf975245d2947
SHA5124bb03a21aef05b2d7c88f7d9bcdb998df63a3b111e72403b795ae6222e982be76671e5874e394f2518a9b5d9b4124219939bd7435182123c0366f103dadfacb7
-
Filesize
13KB
MD5f4531981df7b61046b56cb180300808b
SHA1bb517505655f2c0d20895c9c53779a5c3c5c581d
SHA2561fa9dc48537304fce027a81f9c254e850a68b6ba893e7128b1f631fc3df40589
SHA512a18f6a98a6259d9deec4e1a2645174d393a1119e9242e19a39e3f4a5a90513af772358448cfbf7170d5a9a73c6f0c43c23ba4dedefdb94163f2798ad7aa3fc1d
-
Filesize
353KB
MD584dac207a8aaf634ee2655a67a80db9f
SHA176fae57ce8c0f582ce0cbef6b1922cec485b8d3b
SHA2560bbcbf1354f655f27e79f390c5e109b3d4a41d5de8df7b9901d52c02ab23cebe
SHA512ccf3cc8e126a20b0dfd1ff508dffb8f545e86bedabfda29027fad7987d41df550997c29d71e39ce4e45b7e87658643b34cf36b3d815725d2827738cc28e0b5fe