Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95.exe
Resource
win10v2004-20241007-en
General
-
Target
d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95.exe
-
Size
530KB
-
MD5
f74832accaf28a4f8804a01114d7b4d3
-
SHA1
05c7d413390cc544cac02965078c3ab547292aff
-
SHA256
d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95
-
SHA512
c6dcdbac37b190d962c06595a4d734899e50c7356c315120904df53e1a0c8e21994ca448393a7bc57409c52ca8a100fea1468f86436928bb57ff25a0c577b783
-
SSDEEP
12288:gMrUy90RlAs6JLWxODILLTz3wCV1KaYQ7qBtkcEDyVDUnKN7:Eykt4ILPzACV0lQuyQx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr268048.exe healer behavioral1/memory/4388-15-0x0000000000090000-0x000000000009A000-memory.dmp healer -
Healer family
-
Processes:
jr268048.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr268048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr268048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr268048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr268048.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr268048.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr268048.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1560-22-0x00000000070B0000-0x00000000070F6000-memory.dmp family_redline behavioral1/memory/1560-24-0x0000000007730000-0x0000000007774000-memory.dmp family_redline behavioral1/memory/1560-26-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-86-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-88-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-84-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-83-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-80-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-78-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-76-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-74-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-72-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-70-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-68-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-66-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-64-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-60-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-58-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-57-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-54-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-52-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-50-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-48-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-46-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-44-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-42-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-40-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-38-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-36-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-32-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-30-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-28-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-62-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-34-0x0000000007730000-0x000000000776F000-memory.dmp family_redline behavioral1/memory/1560-25-0x0000000007730000-0x000000000776F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziUI4381.exejr268048.exeku900808.exepid process 4960 ziUI4381.exe 4388 jr268048.exe 1560 ku900808.exe -
Processes:
jr268048.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr268048.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95.exeziUI4381.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziUI4381.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95.exeziUI4381.exeku900808.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziUI4381.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku900808.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr268048.exepid process 4388 jr268048.exe 4388 jr268048.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr268048.exeku900808.exedescription pid process Token: SeDebugPrivilege 4388 jr268048.exe Token: SeDebugPrivilege 1560 ku900808.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95.exeziUI4381.exedescription pid process target process PID 4796 wrote to memory of 4960 4796 d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95.exe ziUI4381.exe PID 4796 wrote to memory of 4960 4796 d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95.exe ziUI4381.exe PID 4796 wrote to memory of 4960 4796 d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95.exe ziUI4381.exe PID 4960 wrote to memory of 4388 4960 ziUI4381.exe jr268048.exe PID 4960 wrote to memory of 4388 4960 ziUI4381.exe jr268048.exe PID 4960 wrote to memory of 1560 4960 ziUI4381.exe ku900808.exe PID 4960 wrote to memory of 1560 4960 ziUI4381.exe ku900808.exe PID 4960 wrote to memory of 1560 4960 ziUI4381.exe ku900808.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95.exe"C:\Users\Admin\AppData\Local\Temp\d25d7f81562fbdbe1fd7664a721a7394e947b270206537ee7294da3ebb610a95.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUI4381.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUI4381.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr268048.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr268048.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku900808.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku900808.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1560
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5e01082c2c691608743fb8735486f2e89
SHA1d17e5a71cfb49f8b3ceec79d97ad2a4acecd35b2
SHA2569da533e4019eebcb7b05a4a53d684b6a8f187d99937f801940e39348f9804e51
SHA5124bbb1a15086a1c7bccfaca2a2c57ba31ddc799dee13e795e6e1ae8ca5318f90ece96c1ea499d7ef8d444d117941d11843f41a8f6a3f0414457efb812f4f354e1
-
Filesize
11KB
MD58ce39ad5969c1ea23005e8401a5165f5
SHA1a80ce9600e7b93de283b20ecc8746bb8772d9a57
SHA2562531efc96d9712965b124f2b952da47f616d569200976dbd12df8024dcc56d22
SHA5120b0b051d3c450b99c3f708bf0187ec0b5cf768fe37af5f0c74e2df89b356cb48a99bed3ae646c4597cf497dfa952fb6d566d947c84ed3c570213606290fd110c
-
Filesize
354KB
MD539ce62aba68769fdaa0443e362db09dd
SHA171bc5130136c4c92e4040aa238e5f83846cd121b
SHA2563722019efa80d21aac7217bd0a83ba27efdb05ddc46b8dfcc4fa4dc3e7ec27da
SHA5129fc2fe1a6bb53905d29fba61aea8a9d4549103ab9a6f74464184073a1853f871887d329584f69f20b79d817b56429ecb5ac86a9a3bae4df833b27ef30e91f24d