Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:42
Static task
static1
Behavioral task
behavioral1
Sample
d42afdf3bd63bca4b5e7d4e82b023a9223e78b85a61e3c1688aa749986b57071.exe
Resource
win10v2004-20241007-en
General
-
Target
d42afdf3bd63bca4b5e7d4e82b023a9223e78b85a61e3c1688aa749986b57071.exe
-
Size
529KB
-
MD5
67b3e1e359ddc52e9b09ab088599542f
-
SHA1
dd92590eaab831b14badf56abc68a6efe2a865b1
-
SHA256
d42afdf3bd63bca4b5e7d4e82b023a9223e78b85a61e3c1688aa749986b57071
-
SHA512
243bd2428ca6a55cdf55eb4dc6a72c6f6d9ccb642f840d2a48da3f4babdab8f48c990fb9032e489ac3c5627f39d5058f60c560f9804deda15f2eae36c99ec674
-
SSDEEP
12288:+MrAy90HFcon5fPLeqTSR87u8Czm+rw8KU8pNgV/BUrvv:ay7a/uC7uBr5Wp+J2L
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr166612.exe healer behavioral1/memory/3500-15-0x0000000000030000-0x000000000003A000-memory.dmp healer -
Healer family
-
Processes:
jr166612.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr166612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr166612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr166612.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr166612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr166612.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr166612.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/972-22-0x0000000004A90000-0x0000000004AD6000-memory.dmp family_redline behavioral1/memory/972-24-0x0000000007760000-0x00000000077A4000-memory.dmp family_redline behavioral1/memory/972-34-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-36-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-88-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-86-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-84-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-82-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-80-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-78-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-76-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-74-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-72-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-70-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-68-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-66-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-64-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-60-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-58-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-56-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-54-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-52-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-50-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-48-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-46-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-44-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-42-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-40-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-38-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-32-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-30-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-28-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-62-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-26-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/972-25-0x0000000007760000-0x000000000779F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziTL8654.exejr166612.exeku566008.exepid process 376 ziTL8654.exe 3500 jr166612.exe 972 ku566008.exe -
Processes:
jr166612.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr166612.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d42afdf3bd63bca4b5e7d4e82b023a9223e78b85a61e3c1688aa749986b57071.exeziTL8654.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d42afdf3bd63bca4b5e7d4e82b023a9223e78b85a61e3c1688aa749986b57071.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziTL8654.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziTL8654.exeku566008.exed42afdf3bd63bca4b5e7d4e82b023a9223e78b85a61e3c1688aa749986b57071.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziTL8654.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku566008.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d42afdf3bd63bca4b5e7d4e82b023a9223e78b85a61e3c1688aa749986b57071.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr166612.exepid process 3500 jr166612.exe 3500 jr166612.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr166612.exeku566008.exedescription pid process Token: SeDebugPrivilege 3500 jr166612.exe Token: SeDebugPrivilege 972 ku566008.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d42afdf3bd63bca4b5e7d4e82b023a9223e78b85a61e3c1688aa749986b57071.exeziTL8654.exedescription pid process target process PID 1692 wrote to memory of 376 1692 d42afdf3bd63bca4b5e7d4e82b023a9223e78b85a61e3c1688aa749986b57071.exe ziTL8654.exe PID 1692 wrote to memory of 376 1692 d42afdf3bd63bca4b5e7d4e82b023a9223e78b85a61e3c1688aa749986b57071.exe ziTL8654.exe PID 1692 wrote to memory of 376 1692 d42afdf3bd63bca4b5e7d4e82b023a9223e78b85a61e3c1688aa749986b57071.exe ziTL8654.exe PID 376 wrote to memory of 3500 376 ziTL8654.exe jr166612.exe PID 376 wrote to memory of 3500 376 ziTL8654.exe jr166612.exe PID 376 wrote to memory of 972 376 ziTL8654.exe ku566008.exe PID 376 wrote to memory of 972 376 ziTL8654.exe ku566008.exe PID 376 wrote to memory of 972 376 ziTL8654.exe ku566008.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d42afdf3bd63bca4b5e7d4e82b023a9223e78b85a61e3c1688aa749986b57071.exe"C:\Users\Admin\AppData\Local\Temp\d42afdf3bd63bca4b5e7d4e82b023a9223e78b85a61e3c1688aa749986b57071.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTL8654.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTL8654.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr166612.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr166612.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku566008.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku566008.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:972
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD56b610d9b90805b256ea9ae46c7e2bac6
SHA152d74a3ab49fa2b212f4aa7a0a6c42f9f5b2be87
SHA256924142dc93d5fcadce79b8eadeb4f54d72e37d1a98400d8391e97883a9e7099f
SHA512f887002cd6440b8ec24d2611dc346deb79afbbe870be3a95ef374e577da9ecf483b2bee9c84835fdc2a34740f76fe17e60d580686f751190667d20ceff2b39d4
-
Filesize
12KB
MD525e4663c42516141fa451b33b3131820
SHA1f9219b1953692c4ba5bec64df262b1744ee803ef
SHA256464616285efc70149394433b9347ba6ab76825cdd31c4b2b6df21518867dd69f
SHA51255750bfb493eedf26398ccbaa209228b2e2bbe60e997df452fb9e38812f811b4ae954be09bffbae3ae01ded5711545983affd5bb2cafc3762162f02fed277744
-
Filesize
342KB
MD50afaec71b08ff2aec3235170907aaa9b
SHA136d5b40a9d3a41c25ea6f172a43e77f21848b057
SHA256b410524ff8acf30a5a5c0458430de52d8f433bed4c2ad8666f867642ae42de3f
SHA5127200751973178dea90f5bf0b68e15863113387d712eb4ee66bd2a0ea2fe61bcd1fb0f35473b0ac7dcb853550dbe2168a6694705d1ee449cf0fdb5049d60d647a