Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:34
Static task
static1
Behavioral task
behavioral1
Sample
511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0.exe
Resource
win10v2004-20241007-en
General
-
Target
511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0.exe
-
Size
538KB
-
MD5
e2769b4f09ddf6088b282750a5d50fcc
-
SHA1
c5f59455c706239415d07a652ae9f6929a340eb7
-
SHA256
511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0
-
SHA512
ed3ee7bb5190299fa78c8b515ddf10254e4d31bf4ad1a1e8d25737b2ceec8e9430ab35d38dba7b48859b007f063bc447be652070e2e755872108c9958e6e5a0f
-
SSDEEP
12288:+Mray90AFEC/4BLmM1pBZ7ip6tGx16bgXsy:IyTaWWLmMSumAgt
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr161146.exe healer behavioral1/memory/2120-15-0x0000000000FD0000-0x0000000000FDA000-memory.dmp healer -
Healer family
-
Processes:
jr161146.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr161146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr161146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr161146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr161146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr161146.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr161146.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4676-22-0x0000000002780000-0x00000000027C6000-memory.dmp family_redline behavioral1/memory/4676-24-0x0000000002890000-0x00000000028D4000-memory.dmp family_redline behavioral1/memory/4676-36-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-40-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-88-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-86-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-84-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-82-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-80-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-78-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-74-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-72-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-70-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-68-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-66-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-64-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-62-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-60-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-58-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-56-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-52-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-50-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-49-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-46-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-42-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-38-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-34-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-32-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-30-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-76-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-54-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-44-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-28-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-26-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4676-25-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zipF0869.exejr161146.exeku940419.exepid process 4108 zipF0869.exe 2120 jr161146.exe 4676 ku940419.exe -
Processes:
jr161146.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr161146.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0.exezipF0869.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipF0869.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2588 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku940419.exe511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0.exezipF0869.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku940419.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zipF0869.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr161146.exepid process 2120 jr161146.exe 2120 jr161146.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr161146.exeku940419.exedescription pid process Token: SeDebugPrivilege 2120 jr161146.exe Token: SeDebugPrivilege 4676 ku940419.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0.exezipF0869.exedescription pid process target process PID 2988 wrote to memory of 4108 2988 511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0.exe zipF0869.exe PID 2988 wrote to memory of 4108 2988 511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0.exe zipF0869.exe PID 2988 wrote to memory of 4108 2988 511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0.exe zipF0869.exe PID 4108 wrote to memory of 2120 4108 zipF0869.exe jr161146.exe PID 4108 wrote to memory of 2120 4108 zipF0869.exe jr161146.exe PID 4108 wrote to memory of 4676 4108 zipF0869.exe ku940419.exe PID 4108 wrote to memory of 4676 4108 zipF0869.exe ku940419.exe PID 4108 wrote to memory of 4676 4108 zipF0869.exe ku940419.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0.exe"C:\Users\Admin\AppData\Local\Temp\511f8562a8f18432cc85a8fad7fa2833510580bb446f4fa09b9efeac50e13de0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipF0869.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipF0869.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr161146.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr161146.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku940419.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku940419.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2588
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD552f7f565ccc1e3861d1215e4f155ec08
SHA11844ab8028e108eb7feb1e1190e198b4e101a892
SHA2568ff7b31d848bebea7441ef05e79aed4c8c614674386f78c182b6a0eb452ec144
SHA51277f16bed6c56e131fa072be02cc486627e95339be7b74375b6d730fbee586a30a7bb65cc9ca96fecd5b0f39791762068d763d0769276a831e4266e706c7cd78e
-
Filesize
13KB
MD5ef17b7ccd5021fdd1e4edee1c521dfb4
SHA11c1d14da4590252e3c278afb9661192d3624f061
SHA25664136b8ce42867a690b47acc478e75a9ebe52c6efd6281b5a771079f74ae8d26
SHA5126c42aae122cf3f2e7beb19281a8f97f21829059f0f0d802b227d4c0a44a8b2ceee553219d02be86adf71c0d2149afa7d16338a56a67ae99b087d93789761a42b
-
Filesize
353KB
MD5d663e906500a3f17f2dbb03ed276809a
SHA12d405872f87f23ee43da8c4d5c520955ce8280f6
SHA2560711f6aa20036f28f03b8a399de9c0a73371106d03cd7bd55925c140a73e31a3
SHA512ca712767137eb782bea721c0c04cf45291eb944e064e519f281f5eff9365074ace99526470461ca4a8f9d85ad54f2b32574b46302b34f337b814c446a0f6d950