Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 15:50
Static task
static1
Behavioral task
behavioral1
Sample
bff720a3cd5333620e9c53731aec295dd44df13fd48185dff14f7af6f079771e.exe
Resource
win10v2004-20241007-en
General
-
Target
bff720a3cd5333620e9c53731aec295dd44df13fd48185dff14f7af6f079771e.exe
-
Size
530KB
-
MD5
8a183ce88d75c1dffff6cd6ad175851f
-
SHA1
fba108a63916e2634d141cc79157ee392a846d32
-
SHA256
bff720a3cd5333620e9c53731aec295dd44df13fd48185dff14f7af6f079771e
-
SHA512
25cda87a03fa2291c03aff1dee6b13e421e8462594154e7028e2473520f9ea8d33089d13fe27145e32d29f934946dd2535e53fabefa786a75cc1d49f567e67c5
-
SSDEEP
12288:UMruy90L8VwI7FGSsB+PvX3PXb4I2drVclCqcNX:qylVwIBG/kPvnMflSCjX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr122110.exe healer behavioral1/memory/2076-15-0x0000000000860000-0x000000000086A000-memory.dmp healer -
Healer family
-
Processes:
jr122110.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr122110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr122110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr122110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr122110.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr122110.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr122110.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2944-22-0x0000000004AA0000-0x0000000004AE6000-memory.dmp family_redline behavioral1/memory/2944-24-0x00000000072B0000-0x00000000072F4000-memory.dmp family_redline behavioral1/memory/2944-32-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-28-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-26-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-25-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-42-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-88-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-86-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-84-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-80-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-78-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-76-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-74-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-72-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-70-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-68-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-64-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-62-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-61-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-58-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-56-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-54-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-52-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-50-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-48-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-46-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-40-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-38-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-36-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-34-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-30-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-82-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-66-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline behavioral1/memory/2944-44-0x00000000072B0000-0x00000000072EF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziTs9814.exejr122110.exeku603463.exepid process 4060 ziTs9814.exe 2076 jr122110.exe 2944 ku603463.exe -
Processes:
jr122110.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr122110.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
bff720a3cd5333620e9c53731aec295dd44df13fd48185dff14f7af6f079771e.exeziTs9814.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bff720a3cd5333620e9c53731aec295dd44df13fd48185dff14f7af6f079771e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziTs9814.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3144 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku603463.exebff720a3cd5333620e9c53731aec295dd44df13fd48185dff14f7af6f079771e.exeziTs9814.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku603463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bff720a3cd5333620e9c53731aec295dd44df13fd48185dff14f7af6f079771e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziTs9814.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr122110.exepid process 2076 jr122110.exe 2076 jr122110.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr122110.exeku603463.exedescription pid process Token: SeDebugPrivilege 2076 jr122110.exe Token: SeDebugPrivilege 2944 ku603463.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bff720a3cd5333620e9c53731aec295dd44df13fd48185dff14f7af6f079771e.exeziTs9814.exedescription pid process target process PID 1740 wrote to memory of 4060 1740 bff720a3cd5333620e9c53731aec295dd44df13fd48185dff14f7af6f079771e.exe ziTs9814.exe PID 1740 wrote to memory of 4060 1740 bff720a3cd5333620e9c53731aec295dd44df13fd48185dff14f7af6f079771e.exe ziTs9814.exe PID 1740 wrote to memory of 4060 1740 bff720a3cd5333620e9c53731aec295dd44df13fd48185dff14f7af6f079771e.exe ziTs9814.exe PID 4060 wrote to memory of 2076 4060 ziTs9814.exe jr122110.exe PID 4060 wrote to memory of 2076 4060 ziTs9814.exe jr122110.exe PID 4060 wrote to memory of 2944 4060 ziTs9814.exe ku603463.exe PID 4060 wrote to memory of 2944 4060 ziTs9814.exe ku603463.exe PID 4060 wrote to memory of 2944 4060 ziTs9814.exe ku603463.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bff720a3cd5333620e9c53731aec295dd44df13fd48185dff14f7af6f079771e.exe"C:\Users\Admin\AppData\Local\Temp\bff720a3cd5333620e9c53731aec295dd44df13fd48185dff14f7af6f079771e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTs9814.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTs9814.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr122110.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr122110.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku603463.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku603463.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3144
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD5b0e336a1fdf9da4a4a1124efd9c40a37
SHA1951bdf3dd4f71bcb7f02ee2a1dde621dd45239e5
SHA2567377da239d4eacc383e935bcbac40e10f32d1360d72fbadd650389ab5706ca5b
SHA5122241055dc08ba04d26f893819aca307587374fa32ed7462f54af8a5e90787baf74aa3d6aa0419f01580f1ad474f1831e649cab9af6139f9892eb37cc795f0e80
-
Filesize
12KB
MD5fdd97220f049dfdbfbb3bedaec53b84f
SHA14939dd2e359d14812ec1b10c186e3bcb3ebfff20
SHA256b40e1b39fbbabecc60cff0dcd3030d9ce191c11aa7657cbb103c0078033fc452
SHA5129e43b3b8ec66763ed9622289501522227e8dc20faba9da3bf45df643300ef34c42cc3897e21d43dd7b23e8deb2c4b79920c8a0cf44068df2d0768ed40f278737
-
Filesize
342KB
MD592b109a3e48894cfbb3eee2bf16a0616
SHA14e8502603558a5b6bec27c41c6385e06ed5c9bff
SHA256b6b7811203f96203485f96830ec574934f4457bd04faffed5494152527c7211a
SHA5123d4a9990066aa53a91fc592fa687a6d7f6fc78e521080bd160e67aad825df1cdcca3449761e1de69ffbe6712b2d521a755cd6240f2997f0fe6b5298e26ab38a1