Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 14:20
Static task
static1
Behavioral task
behavioral1
Sample
915f8ea6765aac4745503b93e1dfb97b221a03d4035d910bfe8244669d1fae9c.exe
Resource
win10v2004-20241007-en
General
-
Target
915f8ea6765aac4745503b93e1dfb97b221a03d4035d910bfe8244669d1fae9c.exe
-
Size
529KB
-
MD5
c3fa9c271fdce7456f7fe0f674e27e66
-
SHA1
937964bc3d19176952ad2f6421a5680b1bbf627b
-
SHA256
915f8ea6765aac4745503b93e1dfb97b221a03d4035d910bfe8244669d1fae9c
-
SHA512
607c6b2d7c9d43833d7f1ee64d6a503bf7cf61777215e8a21f7124f7a27b8048165a4fb66645e185c6f9f465569b611232864333a6c9006adb8578424fa64a42
-
SSDEEP
12288:6MrAy90AMg4O7sDd/VFwKwqvXXdGu26fevO41WwRSaAHcY7:uyagpoBBguzyO41DA18Y7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr391264.exe healer behavioral1/memory/4488-15-0x0000000000ED0000-0x0000000000EDA000-memory.dmp healer -
Healer family
-
Processes:
jr391264.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr391264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr391264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr391264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr391264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr391264.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr391264.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2032-22-0x00000000026E0000-0x0000000002726000-memory.dmp family_redline behavioral1/memory/2032-24-0x00000000053C0000-0x0000000005404000-memory.dmp family_redline behavioral1/memory/2032-30-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-44-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-88-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-84-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-82-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-80-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-78-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-76-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-74-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-72-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-68-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-66-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-64-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-63-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-58-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-56-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-54-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-52-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-50-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-48-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-42-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-40-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-38-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-36-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-34-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-32-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-86-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-70-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-60-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-46-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-28-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-26-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/2032-25-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziuZ8969.exejr391264.exeku869167.exepid process 5084 ziuZ8969.exe 4488 jr391264.exe 2032 ku869167.exe -
Processes:
jr391264.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr391264.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
915f8ea6765aac4745503b93e1dfb97b221a03d4035d910bfe8244669d1fae9c.exeziuZ8969.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 915f8ea6765aac4745503b93e1dfb97b221a03d4035d910bfe8244669d1fae9c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziuZ8969.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
915f8ea6765aac4745503b93e1dfb97b221a03d4035d910bfe8244669d1fae9c.exeziuZ8969.exeku869167.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 915f8ea6765aac4745503b93e1dfb97b221a03d4035d910bfe8244669d1fae9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziuZ8969.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku869167.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr391264.exepid process 4488 jr391264.exe 4488 jr391264.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr391264.exeku869167.exedescription pid process Token: SeDebugPrivilege 4488 jr391264.exe Token: SeDebugPrivilege 2032 ku869167.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
915f8ea6765aac4745503b93e1dfb97b221a03d4035d910bfe8244669d1fae9c.exeziuZ8969.exedescription pid process target process PID 3088 wrote to memory of 5084 3088 915f8ea6765aac4745503b93e1dfb97b221a03d4035d910bfe8244669d1fae9c.exe ziuZ8969.exe PID 3088 wrote to memory of 5084 3088 915f8ea6765aac4745503b93e1dfb97b221a03d4035d910bfe8244669d1fae9c.exe ziuZ8969.exe PID 3088 wrote to memory of 5084 3088 915f8ea6765aac4745503b93e1dfb97b221a03d4035d910bfe8244669d1fae9c.exe ziuZ8969.exe PID 5084 wrote to memory of 4488 5084 ziuZ8969.exe jr391264.exe PID 5084 wrote to memory of 4488 5084 ziuZ8969.exe jr391264.exe PID 5084 wrote to memory of 2032 5084 ziuZ8969.exe ku869167.exe PID 5084 wrote to memory of 2032 5084 ziuZ8969.exe ku869167.exe PID 5084 wrote to memory of 2032 5084 ziuZ8969.exe ku869167.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\915f8ea6765aac4745503b93e1dfb97b221a03d4035d910bfe8244669d1fae9c.exe"C:\Users\Admin\AppData\Local\Temp\915f8ea6765aac4745503b93e1dfb97b221a03d4035d910bfe8244669d1fae9c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuZ8969.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuZ8969.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr391264.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr391264.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku869167.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku869167.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2032
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD5768506ab0ebfe1e827e6c51ca555b575
SHA17fe6f197039a645761f9b6e69bf0387b46fa0940
SHA256247fb6748e693a6c9a91eae5f37932a5f56229613bcdd588a5a35f1747b50aa6
SHA512b5254fa6fa32622232ab03ba73e8af02b848a491ecaae59c4ef5fd046003f08d6762ecf19600bc679260ff3be7fc508084bea7661a84220f8635bdcec7cfb407
-
Filesize
12KB
MD57e7f528106781100fd767e76f5dea621
SHA1edcf87876582e09df3fa84b79cf891b62209569d
SHA256cf47dc61a3e50848fd76653ad41aca913940098245285c35f02130f594516ade
SHA5127e9000ff385c8977929a27400647bb07677aa3b84b2b2c7cdfa809248025592e257237b88ffbac5b55a4bde80dedd3f65f0244597325247f1252be063340d10b
-
Filesize
353KB
MD5a7a55a4b16516342b6bc65e479a67aec
SHA16402ca6fe33452f3603b5320c8316c733a447e48
SHA256ee8e0603aaf05d8861566ed3c503c45bb205a56ae758d90849643ed842d8d8a2
SHA51295b83f18b34874aa67a8854a1d5047ce2faa614bf358ce8d50744a932bf60f1f5fdf20a71cc736f36284add302d087c47d8797e5a5b13299e81a3a2451eaecb6