Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:18
Static task
static1
Behavioral task
behavioral1
Sample
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe
Resource
win10v2004-20241007-en
General
-
Target
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe
-
Size
522KB
-
MD5
31a1ee1cab9bf1c1eb59e6037b82ac3c
-
SHA1
c2d425801ce4a579752db058f92d52284f6e7a9f
-
SHA256
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69
-
SHA512
a970333c38f333268c480ad6f1897b776047fd958ee47c0de7f32a8a845d06ee4702032feafdcb85ae8fc5f08e4b1cef508fff9d93ffc64c0d37147c3985780f
-
SSDEEP
12288:1Mriy90lXc+tQNsTzKyvKib4vl6IAWPYv53mA:3yicYNKiMsI6h/
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr488774.exe healer behavioral1/memory/2816-15-0x0000000000CC0000-0x0000000000CCA000-memory.dmp healer -
Healer family
-
Processes:
jr488774.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr488774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr488774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr488774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr488774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr488774.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr488774.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1004-22-0x0000000002490000-0x00000000024D6000-memory.dmp family_redline behavioral1/memory/1004-24-0x0000000004AE0000-0x0000000004B24000-memory.dmp family_redline behavioral1/memory/1004-26-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-25-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-38-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-32-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-88-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-86-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-84-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-82-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-80-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-78-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-76-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-74-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-72-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-70-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-66-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-64-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-62-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-60-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-58-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-56-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-54-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-52-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-50-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-48-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-44-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-42-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-41-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-36-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-35-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-30-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-28-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-68-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/1004-46-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zieq1714.exejr488774.exeku026854.exepid process 3364 zieq1714.exe 2816 jr488774.exe 1004 ku026854.exe -
Processes:
jr488774.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr488774.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exezieq1714.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieq1714.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exezieq1714.exeku026854.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zieq1714.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku026854.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr488774.exepid process 2816 jr488774.exe 2816 jr488774.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr488774.exeku026854.exedescription pid process Token: SeDebugPrivilege 2816 jr488774.exe Token: SeDebugPrivilege 1004 ku026854.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exezieq1714.exedescription pid process target process PID 2000 wrote to memory of 3364 2000 c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe zieq1714.exe PID 2000 wrote to memory of 3364 2000 c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe zieq1714.exe PID 2000 wrote to memory of 3364 2000 c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe zieq1714.exe PID 3364 wrote to memory of 2816 3364 zieq1714.exe jr488774.exe PID 3364 wrote to memory of 2816 3364 zieq1714.exe jr488774.exe PID 3364 wrote to memory of 1004 3364 zieq1714.exe ku026854.exe PID 3364 wrote to memory of 1004 3364 zieq1714.exe ku026854.exe PID 3364 wrote to memory of 1004 3364 zieq1714.exe ku026854.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe"C:\Users\Admin\AppData\Local\Temp\c581efc1f6da0e948c0d8e0de66c0eb9ffbf68fd539b92e8ce209096bef4eb69.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieq1714.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieq1714.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr488774.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr488774.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku026854.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku026854.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1004
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
379KB
MD5f5bdcf71d160518833ae1712191bdb67
SHA1fb6147f49f6c743deb80f78e29923e58258c4216
SHA25612540d2edcd78e7a57e31081dbee5f607bf42571176c14082ef0b61ee20a19d9
SHA512651bd12d827dd69e9196909251121b07da92bf44e0d3fb1d98df021f89ae856ab9e6c9b603b27697ced27fd2dac15038aaa949f4f2370c9e2d9245d4c7ae1161
-
Filesize
11KB
MD53980b618ff21d8baeeadddebb90911c3
SHA16d8715ba96900b25420b079bee6dad97c05b655c
SHA256e56621e7053a7d7ae74116a68fd38f6577c86f9dd1e74933c05c47d70ac802a8
SHA512e4a2b6aa79a1a856bbe0b87707e1cae03a23c3a8b389fa58a4e28a7af889a776cfe52e34db5aac33dc81160c66bae9296ecdb66d30aa885200c3c5768fe36d99
-
Filesize
294KB
MD57f8a3951bc8301931b50f587c602c8b8
SHA1eb3b5ea515fbd2e57047404cd14b7d21c5d69f87
SHA256a26716fec9df7807bac477d3fc330049c29aee079a42d81c662fe9fc0c894c30
SHA512a42cb452c30c4ece5e0173ee2e6783915b84b384bb295f6b43f5e2b176ba4b9e1677a1ee82e6fae9b1a6311a3503bce80952409eec895d662ffc892be49de3f3