Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 13:12
Static task
static1
Behavioral task
behavioral1
Sample
57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exe
Resource
win10v2004-20241007-en
General
-
Target
57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exe
-
Size
537KB
-
MD5
80536f48f444c150e44d8c9522bb5f67
-
SHA1
d2914d2015c60725e753f4c0f8c44ab2867fee35
-
SHA256
57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b
-
SHA512
d4351f030555b8ec3a407cb723e2deb8ee606c504b0de828a44dc583dea18bab25f00b26b590949de1a37bfdffb7d188863fc9e0b611279e26837a1c6e64611e
-
SSDEEP
12288:7Mryy90ZXoVGrpTMVw3rUYeHew0RVN3oxF6R:9yuk+wVw3rC+w0R7o6R
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr380677.exe healer behavioral1/memory/2428-15-0x0000000000C60000-0x0000000000C6A000-memory.dmp healer -
Healer family
-
Processes:
jr380677.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr380677.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr380677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr380677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr380677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr380677.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr380677.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3764-22-0x00000000026D0000-0x0000000002716000-memory.dmp family_redline behavioral1/memory/3764-24-0x0000000002980000-0x00000000029C4000-memory.dmp family_redline behavioral1/memory/3764-38-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-36-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-88-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-86-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-84-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-82-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-80-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-78-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-74-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-72-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-70-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-68-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-66-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-64-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-62-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-60-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-58-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-54-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-52-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-50-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-48-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-46-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-44-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-42-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-40-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-34-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-32-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-30-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-76-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-56-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-28-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-26-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline behavioral1/memory/3764-25-0x0000000002980000-0x00000000029BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zifw1127.exejr380677.exeku885898.exepid process 3584 zifw1127.exe 2428 jr380677.exe 3764 ku885898.exe -
Processes:
jr380677.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr380677.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exezifw1127.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zifw1127.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exezifw1127.exeku885898.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zifw1127.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku885898.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr380677.exepid process 2428 jr380677.exe 2428 jr380677.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr380677.exeku885898.exedescription pid process Token: SeDebugPrivilege 2428 jr380677.exe Token: SeDebugPrivilege 3764 ku885898.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exezifw1127.exedescription pid process target process PID 1124 wrote to memory of 3584 1124 57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exe zifw1127.exe PID 1124 wrote to memory of 3584 1124 57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exe zifw1127.exe PID 1124 wrote to memory of 3584 1124 57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exe zifw1127.exe PID 3584 wrote to memory of 2428 3584 zifw1127.exe jr380677.exe PID 3584 wrote to memory of 2428 3584 zifw1127.exe jr380677.exe PID 3584 wrote to memory of 3764 3584 zifw1127.exe ku885898.exe PID 3584 wrote to memory of 3764 3584 zifw1127.exe ku885898.exe PID 3584 wrote to memory of 3764 3584 zifw1127.exe ku885898.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exe"C:\Users\Admin\AppData\Local\Temp\57460b09a17bbfceac49a160e25a821b9c810755e5890d0a2d4df7a1f93fef6b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifw1127.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifw1127.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr380677.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr380677.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku885898.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku885898.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3764
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD57b9de847628648c3e6f16cab640fc324
SHA10121dba2dd8ce363551c6ab740d41677ad760d3f
SHA2569eb9366f3e6736e1285f81f16e66f9a58de2c1228df15858224e161a17b8760b
SHA512ece1290efdc7b13e88a62999c71f27a53f7b409f27c3c066329b541a09553bec345acc540a45c217a52c20e41e0d6cb67259eb3faea1cd19cd085ce29c34026b
-
Filesize
13KB
MD52c35c9a60829e4f20fb404062bf2196a
SHA14aa7722f1425e12dc58dbdb61b901dc3af21fb63
SHA25656287aea6b3aa68167b13bba7ea083a5ef2e8c8c9f31c491e3bcf2943584203b
SHA5121038d280f6abd984ee16def1b968b883977b86e15cc1a0dd1b70d4c27da4439288ac067d6e41934917d349285341c3d7e0266d5de5b7db92db5f6f031c005c7d
-
Filesize
352KB
MD5c142ba3050940de925a364c6b61a148f
SHA1fad3b4bd59854cb1c052a1f05007410a61064a9b
SHA2566bb6604fb75c47673b4716674ebb3fca17de3e41f9e35068b0017f60a85e67c5
SHA512cd71a68d652cbb5040307d9272df8a8ef2738040bd218d069199a0fe5602723b2edd7c00cf072d14516d1f67b4f608da3a753761376c02e475b211218a95a735