Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 13:24
Static task
static1
Behavioral task
behavioral1
Sample
42e0b9e43e60cf9d7f7f6b065f12da18bd1df7281ddb6bfcf25d5fa1b71a5ddb.exe
Resource
win10v2004-20241007-en
General
-
Target
42e0b9e43e60cf9d7f7f6b065f12da18bd1df7281ddb6bfcf25d5fa1b71a5ddb.exe
-
Size
530KB
-
MD5
e13b6b25b229ea2b993391d19f2a2da0
-
SHA1
acf3a4277b231622a3efa3eae09d60f0fd55e008
-
SHA256
42e0b9e43e60cf9d7f7f6b065f12da18bd1df7281ddb6bfcf25d5fa1b71a5ddb
-
SHA512
a89f6d0cc82cfb1983a044e4693c38f25ef9989959deaa04d035a05fe36344f6ddb82058b67018a42012aec739b327a7ea1df074e7a526bda37344b4de64159b
-
SSDEEP
12288:TMr0y90fIjm10R2jxx5fHVf5KXa/Imanug/zyyrA:DyAxK2R5Azmfys
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr205744.exe healer behavioral1/memory/980-15-0x0000000000EF0000-0x0000000000EFA000-memory.dmp healer -
Healer family
-
Processes:
jr205744.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr205744.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr205744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr205744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr205744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr205744.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr205744.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/5012-22-0x0000000002480000-0x00000000024C6000-memory.dmp family_redline behavioral1/memory/5012-24-0x0000000004BA0000-0x0000000004BE4000-memory.dmp family_redline behavioral1/memory/5012-32-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-40-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-88-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-86-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-84-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-82-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-80-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-76-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-74-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-72-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-70-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-68-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-66-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-64-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-62-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-58-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-56-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-54-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-52-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-50-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-48-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-44-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-42-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-38-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-36-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-34-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-30-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-78-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-60-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-46-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-28-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-26-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline behavioral1/memory/5012-25-0x0000000004BA0000-0x0000000004BDF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziCn3984.exejr205744.exeku658938.exepid process 2600 ziCn3984.exe 980 jr205744.exe 5012 ku658938.exe -
Processes:
jr205744.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr205744.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
42e0b9e43e60cf9d7f7f6b065f12da18bd1df7281ddb6bfcf25d5fa1b71a5ddb.exeziCn3984.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 42e0b9e43e60cf9d7f7f6b065f12da18bd1df7281ddb6bfcf25d5fa1b71a5ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziCn3984.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
42e0b9e43e60cf9d7f7f6b065f12da18bd1df7281ddb6bfcf25d5fa1b71a5ddb.exeziCn3984.exeku658938.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42e0b9e43e60cf9d7f7f6b065f12da18bd1df7281ddb6bfcf25d5fa1b71a5ddb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziCn3984.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku658938.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr205744.exepid process 980 jr205744.exe 980 jr205744.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr205744.exeku658938.exedescription pid process Token: SeDebugPrivilege 980 jr205744.exe Token: SeDebugPrivilege 5012 ku658938.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
42e0b9e43e60cf9d7f7f6b065f12da18bd1df7281ddb6bfcf25d5fa1b71a5ddb.exeziCn3984.exedescription pid process target process PID 1112 wrote to memory of 2600 1112 42e0b9e43e60cf9d7f7f6b065f12da18bd1df7281ddb6bfcf25d5fa1b71a5ddb.exe ziCn3984.exe PID 1112 wrote to memory of 2600 1112 42e0b9e43e60cf9d7f7f6b065f12da18bd1df7281ddb6bfcf25d5fa1b71a5ddb.exe ziCn3984.exe PID 1112 wrote to memory of 2600 1112 42e0b9e43e60cf9d7f7f6b065f12da18bd1df7281ddb6bfcf25d5fa1b71a5ddb.exe ziCn3984.exe PID 2600 wrote to memory of 980 2600 ziCn3984.exe jr205744.exe PID 2600 wrote to memory of 980 2600 ziCn3984.exe jr205744.exe PID 2600 wrote to memory of 5012 2600 ziCn3984.exe ku658938.exe PID 2600 wrote to memory of 5012 2600 ziCn3984.exe ku658938.exe PID 2600 wrote to memory of 5012 2600 ziCn3984.exe ku658938.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\42e0b9e43e60cf9d7f7f6b065f12da18bd1df7281ddb6bfcf25d5fa1b71a5ddb.exe"C:\Users\Admin\AppData\Local\Temp\42e0b9e43e60cf9d7f7f6b065f12da18bd1df7281ddb6bfcf25d5fa1b71a5ddb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCn3984.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCn3984.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr205744.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr205744.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku658938.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku658938.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5012
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5936d791cc3228608b5bf97b9f7b597ae
SHA1add286a5fb5d8ee20cb42580dcc58d9cee5651a2
SHA25657d0e397eb6b5fcc4a1a748c570c9b1cca39423fa9d5e6b91836019897a6e87d
SHA5123a7f25da2a439454313b4daa2cbbd5586cd8ea6d05c9fa45190a873f0724f8bb13b950af3e27d6ca633b89e9111c15e7370c68468bb16c219c31bea05cb2e1c9
-
Filesize
12KB
MD543de0bcbae01c82461010af21613e73f
SHA1681fa84dbc500bfa30c2199449d5ba4a4e38d80a
SHA2560697adac4b35825d6cb65274171208be2f5111fe275e418e37f5431b23d521c7
SHA5129a50884586b25081b0c9c069b3cb22a1c4c99adc0a63efad03b2b77a36e57efe08b27e25282f5510ede4cbef4cae0af66ef39b752732744246c88e590309e2e0
-
Filesize
434KB
MD541f225d498fdb6bcf5bc49dace085496
SHA18321a8d48ded7707399f51e827b4dd56a1627e2d
SHA256ba57b7248f759fc98dfba77be7dfb5b2a9a6079696923934a6eed99b95b5c2d1
SHA5120165c515254f5e1926bf19d34f52d368d3cec3c55534f48abd386a4e6074503bd9162080902945f2a234038f5ae248071f5376a2c8f0fda4d1e2b0e65cf010f2