Analysis
-
max time kernel
143s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
e7b81ed069fc4d98cb254c3b66e0369dc4b613fb2b8282be3df940951ac58c2f.exe
Resource
win10v2004-20241007-en
General
-
Target
e7b81ed069fc4d98cb254c3b66e0369dc4b613fb2b8282be3df940951ac58c2f.exe
-
Size
522KB
-
MD5
402d83d97cb8bedd53485c7546bb4046
-
SHA1
cb36869e23472421f6e2ebcb203104ce2e3e70f7
-
SHA256
e7b81ed069fc4d98cb254c3b66e0369dc4b613fb2b8282be3df940951ac58c2f
-
SHA512
5c63c827a7ef22ab8056f32ab50c4824cfbc99ce50b4326eedee77a3d6d05639fc37e3abdf0faa85435f732406bd03e7b74751ca2c72dd626f0c20968d0561b0
-
SSDEEP
12288:IMrly90nemfMxlBouf4oWbNmsArLiCHi98SlKGc:9yhzlKugb8sA6CC98S0Gc
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr687293.exe healer behavioral1/memory/4596-15-0x0000000000B80000-0x0000000000B8A000-memory.dmp healer -
Healer family
-
Processes:
jr687293.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr687293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr687293.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr687293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr687293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr687293.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr687293.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4796-22-0x0000000002400000-0x0000000002446000-memory.dmp family_redline behavioral1/memory/4796-24-0x00000000027C0000-0x0000000002804000-memory.dmp family_redline behavioral1/memory/4796-56-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-64-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-88-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-84-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-82-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-80-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-78-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-76-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-72-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-70-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-68-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-66-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-62-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-60-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-58-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-54-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-52-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-50-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-48-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-46-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-42-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-40-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-38-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-36-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-35-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-32-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-86-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-74-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-44-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-30-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-28-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-26-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline behavioral1/memory/4796-25-0x00000000027C0000-0x00000000027FF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziNX0645.exejr687293.exeku965221.exepid process 5092 ziNX0645.exe 4596 jr687293.exe 4796 ku965221.exe -
Processes:
jr687293.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr687293.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e7b81ed069fc4d98cb254c3b66e0369dc4b613fb2b8282be3df940951ac58c2f.exeziNX0645.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e7b81ed069fc4d98cb254c3b66e0369dc4b613fb2b8282be3df940951ac58c2f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziNX0645.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
e7b81ed069fc4d98cb254c3b66e0369dc4b613fb2b8282be3df940951ac58c2f.exeziNX0645.exeku965221.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7b81ed069fc4d98cb254c3b66e0369dc4b613fb2b8282be3df940951ac58c2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziNX0645.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku965221.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr687293.exepid process 4596 jr687293.exe 4596 jr687293.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr687293.exeku965221.exedescription pid process Token: SeDebugPrivilege 4596 jr687293.exe Token: SeDebugPrivilege 4796 ku965221.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e7b81ed069fc4d98cb254c3b66e0369dc4b613fb2b8282be3df940951ac58c2f.exeziNX0645.exedescription pid process target process PID 4912 wrote to memory of 5092 4912 e7b81ed069fc4d98cb254c3b66e0369dc4b613fb2b8282be3df940951ac58c2f.exe ziNX0645.exe PID 4912 wrote to memory of 5092 4912 e7b81ed069fc4d98cb254c3b66e0369dc4b613fb2b8282be3df940951ac58c2f.exe ziNX0645.exe PID 4912 wrote to memory of 5092 4912 e7b81ed069fc4d98cb254c3b66e0369dc4b613fb2b8282be3df940951ac58c2f.exe ziNX0645.exe PID 5092 wrote to memory of 4596 5092 ziNX0645.exe jr687293.exe PID 5092 wrote to memory of 4596 5092 ziNX0645.exe jr687293.exe PID 5092 wrote to memory of 4796 5092 ziNX0645.exe ku965221.exe PID 5092 wrote to memory of 4796 5092 ziNX0645.exe ku965221.exe PID 5092 wrote to memory of 4796 5092 ziNX0645.exe ku965221.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7b81ed069fc4d98cb254c3b66e0369dc4b613fb2b8282be3df940951ac58c2f.exe"C:\Users\Admin\AppData\Local\Temp\e7b81ed069fc4d98cb254c3b66e0369dc4b613fb2b8282be3df940951ac58c2f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNX0645.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNX0645.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr687293.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr687293.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku965221.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku965221.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4796
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
379KB
MD595ec02e46aec84a1759e29f44626c2c0
SHA17eb3f5cb3922ca32f9dd9abf869df52ff00bfba3
SHA2561a90f702bb86e047040294379930027224edbc931b6dce244c8594245ca38651
SHA5122018df26a1428e68935db2ec54d289b58e7b207bb97359840d728196e616015de6e6daedb076e9cd8579503ae250c0162d97cfc7bc33737f1a356d204b9b918a
-
Filesize
15KB
MD5bb402a8600d5dfd8fc1591def76edfe4
SHA1b01117298010441c44db7abb7618f70a7d59e2a6
SHA25657f2c0c1bc3be7ceeca1e3a1409038e816863abe3486861d82b452202db41fa6
SHA512af30ce0e355916ac44b441fb7842d09fe7e9479f5e1fca53b2d90d2c19414e697306fbaead45fd281e628cd80c0e830bc1618d0f7d5445f173d05dff4c449c76
-
Filesize
295KB
MD5578617cb8ff580330b070b1d4daade7f
SHA195185e7deca0d6f32608ada360553239a9df8cac
SHA256cfd0e362bdafd893b614c65aa48ccfb5aba23e0f6f7c188477ddab85a4649239
SHA51296a81aa667ed9ee0d03e11d5bc16e00677caf414e63f4bce54e617678f6763392856c28d531a26671ea741a0f638ca6f08ab17d61eadc0d942b3db93c3a509a4