Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 14:39
Static task
static1
Behavioral task
behavioral1
Sample
5eb860b5499f0a96d8a2542c27aa9916ec29c275a7544b1471af087ff377f323.exe
Resource
win10v2004-20241007-en
General
-
Target
5eb860b5499f0a96d8a2542c27aa9916ec29c275a7544b1471af087ff377f323.exe
-
Size
531KB
-
MD5
a198049000af5cee1c964506234bb4cc
-
SHA1
6d88c9750da6d7020429f58fb09b034cc03dc258
-
SHA256
5eb860b5499f0a96d8a2542c27aa9916ec29c275a7544b1471af087ff377f323
-
SHA512
57c5dd7ad5056917db7e10e4ff4e94bb2248ebe68249c635a426c3f9e7fb03a66eeb6e45ea4f8d60b61a462c64555ad9657dd9c0179504be6e3d35da00f09a7c
-
SSDEEP
12288:TMrQy90lJE+steXesFXev3uXiR21HKb14iPRZv:Hy0JgteOmONR21c1PRZv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr939519.exe healer behavioral1/memory/4052-15-0x00000000002E0000-0x00000000002EA000-memory.dmp healer -
Healer family
-
Processes:
jr939519.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr939519.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr939519.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr939519.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr939519.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr939519.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr939519.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2868-22-0x0000000006810000-0x0000000006856000-memory.dmp family_redline behavioral1/memory/2868-24-0x00000000068D0000-0x0000000006914000-memory.dmp family_redline behavioral1/memory/2868-28-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-38-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-89-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-86-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-84-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-82-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-80-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-78-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-76-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-74-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-72-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-70-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-68-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-66-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-64-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-62-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-60-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-58-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-54-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-52-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-50-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-48-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-46-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-44-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-42-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-40-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-36-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-34-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-32-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-30-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-56-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-26-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline behavioral1/memory/2868-25-0x00000000068D0000-0x000000000690F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zigv6146.exejr939519.exeku686699.exepid process 760 zigv6146.exe 4052 jr939519.exe 2868 ku686699.exe -
Processes:
jr939519.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr939519.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5eb860b5499f0a96d8a2542c27aa9916ec29c275a7544b1471af087ff377f323.exezigv6146.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5eb860b5499f0a96d8a2542c27aa9916ec29c275a7544b1471af087ff377f323.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zigv6146.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5eb860b5499f0a96d8a2542c27aa9916ec29c275a7544b1471af087ff377f323.exezigv6146.exeku686699.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5eb860b5499f0a96d8a2542c27aa9916ec29c275a7544b1471af087ff377f323.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zigv6146.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku686699.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr939519.exepid process 4052 jr939519.exe 4052 jr939519.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr939519.exeku686699.exedescription pid process Token: SeDebugPrivilege 4052 jr939519.exe Token: SeDebugPrivilege 2868 ku686699.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5eb860b5499f0a96d8a2542c27aa9916ec29c275a7544b1471af087ff377f323.exezigv6146.exedescription pid process target process PID 4920 wrote to memory of 760 4920 5eb860b5499f0a96d8a2542c27aa9916ec29c275a7544b1471af087ff377f323.exe zigv6146.exe PID 4920 wrote to memory of 760 4920 5eb860b5499f0a96d8a2542c27aa9916ec29c275a7544b1471af087ff377f323.exe zigv6146.exe PID 4920 wrote to memory of 760 4920 5eb860b5499f0a96d8a2542c27aa9916ec29c275a7544b1471af087ff377f323.exe zigv6146.exe PID 760 wrote to memory of 4052 760 zigv6146.exe jr939519.exe PID 760 wrote to memory of 4052 760 zigv6146.exe jr939519.exe PID 760 wrote to memory of 2868 760 zigv6146.exe ku686699.exe PID 760 wrote to memory of 2868 760 zigv6146.exe ku686699.exe PID 760 wrote to memory of 2868 760 zigv6146.exe ku686699.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5eb860b5499f0a96d8a2542c27aa9916ec29c275a7544b1471af087ff377f323.exe"C:\Users\Admin\AppData\Local\Temp\5eb860b5499f0a96d8a2542c27aa9916ec29c275a7544b1471af087ff377f323.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigv6146.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigv6146.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr939519.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr939519.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku686699.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku686699.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2868
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD5612dd6d44799d6b3d062f0dbb3d216a3
SHA16dd7798c6018fb4d2e3e3f514979debed279b165
SHA256eb9cc892b8c64bd75835d931f321e6ba02771469596c6aae965f07523310c69e
SHA512e7ef08dc27a12b436434a293862d4e21fa867cb0049cd5a1095996990a07bbd5ff6450edb503397c383a082d9747bf22b4435c068668fa0f1e4aa8c0ad94b9df
-
Filesize
12KB
MD51d65c924f42f33d7a81d69abfcbfaf5b
SHA11454f7ea78cddb484598560d49f461b8afff4e09
SHA256019c415ee43490c87103319379cd491145316f9eb0c821bbc5f9eecacc11f284
SHA51264d2601d42e15d2b4bf440c99ebf2ea6f0045b574b2142196683d1a8512aa6e1b5e284cd597780d5ff6cd33f707b05cf437e465abdaf13e9c9e966a2bd064d74
-
Filesize
435KB
MD52dd5cdd98e0a54a62ce4e32e1fcabbd9
SHA1b936b9192c9f0baf48acb994b0f160a2feab356e
SHA2564b533cd7ba9f43a9c193d3855797e19ebda0f0bba3aba9b2ffaac9e686a5e0e3
SHA512fd7d20ebe6f01055edbc58a36cd8db82150d095cf0af067dc84b5271198470792ca56549852069adbbd0fe497a79e98185ca2feed195658f9631160972244982