Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 15:05
Static task
static1
Behavioral task
behavioral1
Sample
a4f3d38aecd82fb4b3630f0dfed3fafb662a9790c67b22a099cd2cc8f6a64f88.exe
Resource
win10v2004-20241007-en
General
-
Target
a4f3d38aecd82fb4b3630f0dfed3fafb662a9790c67b22a099cd2cc8f6a64f88.exe
-
Size
560KB
-
MD5
07ea733394b0c1e1df24c5de750d2aa2
-
SHA1
da500d69a5efd4e1c34d2422f7b5fa8fca0eea77
-
SHA256
a4f3d38aecd82fb4b3630f0dfed3fafb662a9790c67b22a099cd2cc8f6a64f88
-
SHA512
dedb3495fc430e843a87c42de3fc9f48940b1cd0f6319313bfa18cdcf006674b906473695c60af2238bc0cadd1fde85b0e0c6513d19f671791fd7eeef6dd1352
-
SSDEEP
12288:SMrIy90MyNFgHlR9dNzaPLD/CK9EAxJPRAwGG7ozXlx:GypyTY9dNkLr9EAV3GmozXz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr258691.exe healer behavioral1/memory/3128-15-0x0000000000050000-0x000000000005A000-memory.dmp healer -
Healer family
-
Processes:
jr258691.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr258691.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr258691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr258691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr258691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr258691.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr258691.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2156-22-0x00000000026D0000-0x0000000002716000-memory.dmp family_redline behavioral1/memory/2156-24-0x0000000004F30000-0x0000000004F74000-memory.dmp family_redline behavioral1/memory/2156-36-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-38-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-34-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-32-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-80-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-30-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-28-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-26-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-25-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-88-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-86-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-84-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-82-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-78-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-77-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-74-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-73-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-70-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-68-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-66-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-64-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-63-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-60-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-59-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-56-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-55-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-52-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-50-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-48-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-46-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-44-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-42-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/2156-40-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziks7711.exejr258691.exeku542077.exepid process 5032 ziks7711.exe 3128 jr258691.exe 2156 ku542077.exe -
Processes:
jr258691.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr258691.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a4f3d38aecd82fb4b3630f0dfed3fafb662a9790c67b22a099cd2cc8f6a64f88.exeziks7711.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a4f3d38aecd82fb4b3630f0dfed3fafb662a9790c67b22a099cd2cc8f6a64f88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziks7711.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5956 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a4f3d38aecd82fb4b3630f0dfed3fafb662a9790c67b22a099cd2cc8f6a64f88.exeziks7711.exeku542077.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a4f3d38aecd82fb4b3630f0dfed3fafb662a9790c67b22a099cd2cc8f6a64f88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziks7711.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku542077.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr258691.exepid process 3128 jr258691.exe 3128 jr258691.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr258691.exeku542077.exedescription pid process Token: SeDebugPrivilege 3128 jr258691.exe Token: SeDebugPrivilege 2156 ku542077.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a4f3d38aecd82fb4b3630f0dfed3fafb662a9790c67b22a099cd2cc8f6a64f88.exeziks7711.exedescription pid process target process PID 3692 wrote to memory of 5032 3692 a4f3d38aecd82fb4b3630f0dfed3fafb662a9790c67b22a099cd2cc8f6a64f88.exe ziks7711.exe PID 3692 wrote to memory of 5032 3692 a4f3d38aecd82fb4b3630f0dfed3fafb662a9790c67b22a099cd2cc8f6a64f88.exe ziks7711.exe PID 3692 wrote to memory of 5032 3692 a4f3d38aecd82fb4b3630f0dfed3fafb662a9790c67b22a099cd2cc8f6a64f88.exe ziks7711.exe PID 5032 wrote to memory of 3128 5032 ziks7711.exe jr258691.exe PID 5032 wrote to memory of 3128 5032 ziks7711.exe jr258691.exe PID 5032 wrote to memory of 2156 5032 ziks7711.exe ku542077.exe PID 5032 wrote to memory of 2156 5032 ziks7711.exe ku542077.exe PID 5032 wrote to memory of 2156 5032 ziks7711.exe ku542077.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a4f3d38aecd82fb4b3630f0dfed3fafb662a9790c67b22a099cd2cc8f6a64f88.exe"C:\Users\Admin\AppData\Local\Temp\a4f3d38aecd82fb4b3630f0dfed3fafb662a9790c67b22a099cd2cc8f6a64f88.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziks7711.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziks7711.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr258691.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr258691.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku542077.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku542077.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2156
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5956
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406KB
MD5d42c913622ab316347852acc7b98bd1c
SHA1356ec4b943e2c6598b5d36bd6208ecd7688c5174
SHA2566a205725b65498b142adcb14f34a4c7a9d342e58a7de9e5eb038f7979d1bc3a2
SHA51206ab67a89603be417137b2a67a5157c4783896bd8ece5cd4b08180d767daf2ab35ee129d38c967cb99d60fda189ced1b376a20ce6f1c8010a15959367db71f23
-
Filesize
12KB
MD5da9bdccaa1caadbaf7e6a4aef153a00d
SHA109366d66fd9a7bbc4b1b8ca08dccd4c38b498d45
SHA256ce9312af8961b7c342d010b2ca0f88a534363d202884fe5de5788ed796c3b864
SHA512d45419025afdcfe55383c86160982e3bc4211f0a0c83f92e53b1c5836c736f1cea3d53f8deaf512838dd273f6d4ead4560b23dfa3fa9f549d3cd057dff599f12
-
Filesize
372KB
MD58e42f9d77a3daa8c532abfb3be41a671
SHA196530d52cae2df7be43fb6877990dace6c59734e
SHA2561e6ee15a92ae3019ab40c76fac91894c377a8c2527215ee023ab7c1f467db99f
SHA51276b178187004e39ffcd96022a303a533c9047cbd441d7bfaf723d3a039c240d4ab4da58aa7bc378fcd71d5946f0b117dc772d5d715aa990070cef44703f88b03