Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 13:23
Static task
static1
Behavioral task
behavioral1
Sample
b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3.exe
Resource
win10v2004-20241007-en
General
-
Target
b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3.exe
-
Size
537KB
-
MD5
d49c21694613ed18eb1bfcb48c9bd1ce
-
SHA1
cfa3c6ceef6f0a90618f7d31cabc2e193de0460c
-
SHA256
b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3
-
SHA512
85e2d465aec35da92ec965da4001cacaabc88bdf08be6f2d77cf23c321e6064fdd1f75739e6e0eafbe922910a93a1ac01240192688df21a8c303cf09a76a227e
-
SSDEEP
12288:xMrly90fzimHhWpg8z0eUqWHWwoJs3CtXlb:8y4HYPAem2wAs34t
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr328749.exe healer behavioral1/memory/4108-15-0x0000000000100000-0x000000000010A000-memory.dmp healer -
Healer family
-
Processes:
jr328749.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr328749.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr328749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr328749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr328749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr328749.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr328749.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2268-22-0x0000000004D30000-0x0000000004D76000-memory.dmp family_redline behavioral1/memory/2268-24-0x0000000004DF0000-0x0000000004E34000-memory.dmp family_redline behavioral1/memory/2268-32-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-38-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-36-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-34-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-78-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-66-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-44-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-30-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-28-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-26-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-25-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-88-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-87-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-84-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-82-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-80-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-76-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-74-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-72-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-70-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-68-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-64-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-62-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-60-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-58-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-56-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-54-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-52-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-50-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-48-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-46-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-42-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/2268-40-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziMu9240.exejr328749.exeku286448.exepid process 1932 ziMu9240.exe 4108 jr328749.exe 2268 ku286448.exe -
Processes:
jr328749.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr328749.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3.exeziMu9240.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziMu9240.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3228 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku286448.exeb87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3.exeziMu9240.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku286448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziMu9240.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr328749.exepid process 4108 jr328749.exe 4108 jr328749.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr328749.exeku286448.exedescription pid process Token: SeDebugPrivilege 4108 jr328749.exe Token: SeDebugPrivilege 2268 ku286448.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3.exeziMu9240.exedescription pid process target process PID 3648 wrote to memory of 1932 3648 b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3.exe ziMu9240.exe PID 3648 wrote to memory of 1932 3648 b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3.exe ziMu9240.exe PID 3648 wrote to memory of 1932 3648 b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3.exe ziMu9240.exe PID 1932 wrote to memory of 4108 1932 ziMu9240.exe jr328749.exe PID 1932 wrote to memory of 4108 1932 ziMu9240.exe jr328749.exe PID 1932 wrote to memory of 2268 1932 ziMu9240.exe ku286448.exe PID 1932 wrote to memory of 2268 1932 ziMu9240.exe ku286448.exe PID 1932 wrote to memory of 2268 1932 ziMu9240.exe ku286448.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3.exe"C:\Users\Admin\AppData\Local\Temp\b87c85304f7e2accc1b3972bb88f57e21bed1a2cf692eb32a694b7062ad032f3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMu9240.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMu9240.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr328749.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr328749.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku286448.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku286448.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD52918a3d39fe9d4486eefad66d427a7e9
SHA1888c113960b98dec4b88f424a29ebab7c91a6c85
SHA256bd332f00acb0f72f37593614c6ae76635064e126daa820a8f2982eb855bac5dc
SHA5120e4b79228d5d22c2ab421a0072130908f058746b2c1b0176f39f8b131380a6e9c684f7ed41534bc1bf0093bf2d590802e76870279f42dd940c424c48cf398e4d
-
Filesize
14KB
MD5ae0351754577158ea0e284eb135397b4
SHA1933178809dfef6e58efb19f84c45e5693115ee2a
SHA256e40df3e749b5fc7a02c40b56f3271883dc910d51eb7835ff3838640a5982ac9c
SHA5126a32ec57384ed01e3925bbb40c59084887b77db98f072f9a23eafa5541a1e9f4391bff4b3bde97d842114eaccd510f8a1216a5cfd6b903979d1019cf550cfe31
-
Filesize
352KB
MD5d65adbd74de6a71bd969f938b7268f32
SHA17c642d58a394a42725f0f52eaa46d2f91c6c9567
SHA2567f9b3a40832a3948385c7fe3ada9273b2d125e949abe8a7d923e2f22078aede3
SHA512778e25135df37f7407977d57d66d3bd2e26dbd172f6044650a85a7d7a6bb0826049047df11a2bf80394e67dd44ec48b5936980a30c13ddb02a9da9117df700dc