Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exe
Resource
win10v2004-20241007-en
General
-
Target
df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exe
-
Size
537KB
-
MD5
52d596bce457264dfd819cb6046591e5
-
SHA1
6e75172f51a1ec2a6e6c70e3cfab1652abb2a3b5
-
SHA256
df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45
-
SHA512
68594860f47c07259dbec3f830241b0ec0b5072484b4c4873ab0ed52362e3ee110d23b4ea8dd19aa57a7aea1b3ba869c5b0db13efe70555f112f83dbf929afcc
-
SSDEEP
12288:oMr8y90eEXUT4xozzUfQHZD9zgY8Xyds11Q+mE/uLI:UyAUTlUQSY8i+1GLI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr802368.exe healer behavioral1/memory/3276-15-0x0000000000760000-0x000000000076A000-memory.dmp healer -
Healer family
-
Processes:
jr802368.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr802368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr802368.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr802368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr802368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr802368.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr802368.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3532-22-0x00000000026D0000-0x0000000002716000-memory.dmp family_redline behavioral1/memory/3532-24-0x00000000027F0000-0x0000000002834000-memory.dmp family_redline behavioral1/memory/3532-38-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-88-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-86-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-84-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-82-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-78-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-76-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-74-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-72-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-70-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-68-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-66-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-64-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-62-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-60-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-58-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-56-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-54-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-52-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-50-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-48-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-46-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-44-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-42-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-40-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-36-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-34-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-32-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-30-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-80-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-28-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-26-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline behavioral1/memory/3532-25-0x00000000027F0000-0x000000000282F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziWk7743.exejr802368.exeku287618.exepid process 4564 ziWk7743.exe 3276 jr802368.exe 3532 ku287618.exe -
Processes:
jr802368.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr802368.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exeziWk7743.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWk7743.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4304 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziWk7743.exeku287618.exedf82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziWk7743.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku287618.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr802368.exepid process 3276 jr802368.exe 3276 jr802368.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr802368.exeku287618.exedescription pid process Token: SeDebugPrivilege 3276 jr802368.exe Token: SeDebugPrivilege 3532 ku287618.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exeziWk7743.exedescription pid process target process PID 1736 wrote to memory of 4564 1736 df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exe ziWk7743.exe PID 1736 wrote to memory of 4564 1736 df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exe ziWk7743.exe PID 1736 wrote to memory of 4564 1736 df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exe ziWk7743.exe PID 4564 wrote to memory of 3276 4564 ziWk7743.exe jr802368.exe PID 4564 wrote to memory of 3276 4564 ziWk7743.exe jr802368.exe PID 4564 wrote to memory of 3532 4564 ziWk7743.exe ku287618.exe PID 4564 wrote to memory of 3532 4564 ziWk7743.exe ku287618.exe PID 4564 wrote to memory of 3532 4564 ziWk7743.exe ku287618.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exe"C:\Users\Admin\AppData\Local\Temp\df82d79ba4a5f58bd6d0715aae1b438a0870af01767f6aab9a5c31e850a5fc45.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWk7743.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWk7743.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr802368.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr802368.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku287618.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku287618.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4304
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD546c742e063fd0b34416ac281950c8c3a
SHA179dd75ed4b62effb0dd926cd9c6c39dedc29e0ef
SHA256423822bd88892e073edf073006e1342a20715d292944215ee17aea2ba365ccb9
SHA512e8e4df2c4bb6da743b62baf5c88b79488a82207ee9b9be027b54c95f1c28fdc4e823e8168bffed8f970c5c069a93fe4c9df276e9a9b70d755d279e5d106d421d
-
Filesize
13KB
MD510969b391064b25d59c040f0fffaa28e
SHA1cfe3c4b487678e0bf582c4b5aa3fc6e60f74585b
SHA256211253c90cc4a6e090eb0e3ea543c7be5b2a84df67342e3fb75153729b03c81f
SHA5121fc7a929debbc26f248b40164f050ffcd0d422b46b6bf8dc016c2cc1abdbd493e2eb04c66dd8ca9b275ff6104d5527bb4865f4d15f159e310f7e39b24015d654
-
Filesize
353KB
MD56269d65aa861e78635e3f9c44b0ec5ae
SHA1c6a3fc0f707c5c6d7f01f36eb6888991a40ffce6
SHA256b7e126dc8695142fd20966ac17174ee35558691c5091c64ce274a977c3fdb87c
SHA5122a924256980c92b58fd30e242d0a2b8d6074e56e689815be00da9d69d004443c209af9ff53250cc1d050fce7f7d20f8cc9a2b2f177cc3b7d3e4dbc577210509d