Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 14:28
Static task
static1
Behavioral task
behavioral1
Sample
cbbf8a29c79cdffb180aad2bafe641889acea43dffd30f41c38cd9371dd7ecd1.exe
Resource
win10v2004-20241007-en
General
-
Target
cbbf8a29c79cdffb180aad2bafe641889acea43dffd30f41c38cd9371dd7ecd1.exe
-
Size
537KB
-
MD5
2197b5b353c146befea900b92d115a4d
-
SHA1
431ab77c07e2c15c235bc302a96273a617089e61
-
SHA256
cbbf8a29c79cdffb180aad2bafe641889acea43dffd30f41c38cd9371dd7ecd1
-
SHA512
954810b8ffd05b91e8c3dd2ab4aa4d2ca09f6da86d52fadc64c509fdcdc3becdc24570aa300392b28562eae18e5712e76b2430875a94e90d46a73a1ccf193316
-
SSDEEP
12288:HMrLy90fJ9E6P83Z3X0OAyZbUhtmrRE1fbHouRi:EyGJ9NsUORZ2tmrRE1fL7i
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr128411.exe healer behavioral1/memory/4108-15-0x0000000000D90000-0x0000000000D9A000-memory.dmp healer -
Healer family
-
Processes:
jr128411.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr128411.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr128411.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr128411.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr128411.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr128411.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr128411.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3568-22-0x0000000002910000-0x0000000002956000-memory.dmp family_redline behavioral1/memory/3568-24-0x0000000004E60000-0x0000000004EA4000-memory.dmp family_redline behavioral1/memory/3568-34-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-42-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-88-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-86-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-82-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-80-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-78-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-76-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-74-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-72-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-70-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-66-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-64-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-63-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-60-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-58-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-56-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-54-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-52-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-50-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-48-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-44-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-40-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-38-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-36-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-32-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-84-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-68-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-46-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-30-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-28-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-26-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline behavioral1/memory/3568-25-0x0000000004E60000-0x0000000004E9F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziwx1293.exejr128411.exeku492613.exepid process 1176 ziwx1293.exe 4108 jr128411.exe 3568 ku492613.exe -
Processes:
jr128411.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr128411.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cbbf8a29c79cdffb180aad2bafe641889acea43dffd30f41c38cd9371dd7ecd1.exeziwx1293.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cbbf8a29c79cdffb180aad2bafe641889acea43dffd30f41c38cd9371dd7ecd1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziwx1293.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cbbf8a29c79cdffb180aad2bafe641889acea43dffd30f41c38cd9371dd7ecd1.exeziwx1293.exeku492613.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbbf8a29c79cdffb180aad2bafe641889acea43dffd30f41c38cd9371dd7ecd1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziwx1293.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku492613.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr128411.exepid process 4108 jr128411.exe 4108 jr128411.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr128411.exeku492613.exedescription pid process Token: SeDebugPrivilege 4108 jr128411.exe Token: SeDebugPrivilege 3568 ku492613.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
cbbf8a29c79cdffb180aad2bafe641889acea43dffd30f41c38cd9371dd7ecd1.exeziwx1293.exedescription pid process target process PID 1892 wrote to memory of 1176 1892 cbbf8a29c79cdffb180aad2bafe641889acea43dffd30f41c38cd9371dd7ecd1.exe ziwx1293.exe PID 1892 wrote to memory of 1176 1892 cbbf8a29c79cdffb180aad2bafe641889acea43dffd30f41c38cd9371dd7ecd1.exe ziwx1293.exe PID 1892 wrote to memory of 1176 1892 cbbf8a29c79cdffb180aad2bafe641889acea43dffd30f41c38cd9371dd7ecd1.exe ziwx1293.exe PID 1176 wrote to memory of 4108 1176 ziwx1293.exe jr128411.exe PID 1176 wrote to memory of 4108 1176 ziwx1293.exe jr128411.exe PID 1176 wrote to memory of 3568 1176 ziwx1293.exe ku492613.exe PID 1176 wrote to memory of 3568 1176 ziwx1293.exe ku492613.exe PID 1176 wrote to memory of 3568 1176 ziwx1293.exe ku492613.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbbf8a29c79cdffb180aad2bafe641889acea43dffd30f41c38cd9371dd7ecd1.exe"C:\Users\Admin\AppData\Local\Temp\cbbf8a29c79cdffb180aad2bafe641889acea43dffd30f41c38cd9371dd7ecd1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwx1293.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwx1293.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr128411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr128411.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku492613.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku492613.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3568
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5a804b9613463b3524eeed84b9015b34e
SHA148d4afad890ce9cf11f0622b3b12da852aab173b
SHA256e2b75588f45275b680611b5ddbe77d84f7fad68826bb8c54664201ab8e7651dc
SHA512b54a1b6fb3de4f14a6d8109689e212a309a3c3d129f232c68b53a34aff6fe18e32ac5e8f784ef71f058d4c774f94fd8502101c6249d348f3f86f8532586e3286
-
Filesize
12KB
MD55b9f6774c824b27373248e4abb0332a9
SHA199e76876df9b03779c32438ba7a364dfbcd4d8b8
SHA256e75f7d9b90cd4125dbc29b6f4b6a365d902bb2f91fb17170c654a902347b7ad8
SHA51248fbfc48e9eaa49b34f46ba2159a1d271c2087bcdd52e74f6c6465d01979ebec1dec76c0ad094bb873537664a6b94a60d1c9a1290ff37d274079c70b899f852d
-
Filesize
353KB
MD5006d4f760ae1ccfa78c704d188a1e1a8
SHA1adcf8a024d978b77ebe0563495d45f8e4a368f24
SHA2566f4acfe2e0c877c1a422ec3ac0a38b2c4f63bfdcef9c3b2b9791cc02aea0b03e
SHA512d4d371db1a43a85619a7109744c431238ea4b0a51bddc247dff010cbe0fe7545dc6c2c82db10aabb2b4d63aabbc3ad56a135497a22315d4ac297933fd4d5b1da