Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
ce5786bac68207f603e950c81187003a0a5f31fcaff9c854bf90e949e2f5ecc0.exe
Resource
win10v2004-20241007-en
General
-
Target
ce5786bac68207f603e950c81187003a0a5f31fcaff9c854bf90e949e2f5ecc0.exe
-
Size
537KB
-
MD5
421d5bbdbba98d6746ef056f45dbeef0
-
SHA1
f3b5d681d1c3ce8de6df1a684c559532e08184a3
-
SHA256
ce5786bac68207f603e950c81187003a0a5f31fcaff9c854bf90e949e2f5ecc0
-
SHA512
d67c75cf186389951f347788704cfa70baa67d6cc26b9a87e43a970101d887aeba534c16f5bc2e2f6432bb1a598162c9bdcb624642c02e6417b9a0b0b0dc42bc
-
SSDEEP
12288:IMruy90SkALP0Wvl5Ds2n6qT7zmUKEHEwLOzJfiPpqYS:2yJkALrDs2nPzmykw2iQf
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr319118.exe healer behavioral1/memory/4576-15-0x0000000000CB0000-0x0000000000CBA000-memory.dmp healer -
Healer family
-
Processes:
jr319118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr319118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr319118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr319118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr319118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr319118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr319118.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4304-22-0x0000000002820000-0x0000000002866000-memory.dmp family_redline behavioral1/memory/4304-24-0x0000000004E00000-0x0000000004E44000-memory.dmp family_redline behavioral1/memory/4304-50-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-48-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-46-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-88-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-86-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-82-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-80-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-78-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-76-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-75-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-72-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-70-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-68-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-66-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-64-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-62-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-60-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-58-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-56-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-54-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-52-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-44-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-42-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-40-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-38-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-36-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-34-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-32-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-30-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-28-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-84-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-26-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/4304-25-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zilI1578.exejr319118.exeku521352.exepid process 3616 zilI1578.exe 4576 jr319118.exe 4304 ku521352.exe -
Processes:
jr319118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr319118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ce5786bac68207f603e950c81187003a0a5f31fcaff9c854bf90e949e2f5ecc0.exezilI1578.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce5786bac68207f603e950c81187003a0a5f31fcaff9c854bf90e949e2f5ecc0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zilI1578.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ce5786bac68207f603e950c81187003a0a5f31fcaff9c854bf90e949e2f5ecc0.exezilI1578.exeku521352.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce5786bac68207f603e950c81187003a0a5f31fcaff9c854bf90e949e2f5ecc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zilI1578.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku521352.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr319118.exepid process 4576 jr319118.exe 4576 jr319118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr319118.exeku521352.exedescription pid process Token: SeDebugPrivilege 4576 jr319118.exe Token: SeDebugPrivilege 4304 ku521352.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ce5786bac68207f603e950c81187003a0a5f31fcaff9c854bf90e949e2f5ecc0.exezilI1578.exedescription pid process target process PID 4772 wrote to memory of 3616 4772 ce5786bac68207f603e950c81187003a0a5f31fcaff9c854bf90e949e2f5ecc0.exe zilI1578.exe PID 4772 wrote to memory of 3616 4772 ce5786bac68207f603e950c81187003a0a5f31fcaff9c854bf90e949e2f5ecc0.exe zilI1578.exe PID 4772 wrote to memory of 3616 4772 ce5786bac68207f603e950c81187003a0a5f31fcaff9c854bf90e949e2f5ecc0.exe zilI1578.exe PID 3616 wrote to memory of 4576 3616 zilI1578.exe jr319118.exe PID 3616 wrote to memory of 4576 3616 zilI1578.exe jr319118.exe PID 3616 wrote to memory of 4304 3616 zilI1578.exe ku521352.exe PID 3616 wrote to memory of 4304 3616 zilI1578.exe ku521352.exe PID 3616 wrote to memory of 4304 3616 zilI1578.exe ku521352.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce5786bac68207f603e950c81187003a0a5f31fcaff9c854bf90e949e2f5ecc0.exe"C:\Users\Admin\AppData\Local\Temp\ce5786bac68207f603e950c81187003a0a5f31fcaff9c854bf90e949e2f5ecc0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilI1578.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zilI1578.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr319118.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr319118.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku521352.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku521352.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4304
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD57bc10b95b14d5647c0e6776948852185
SHA1305807e76ee6deb036fdcfdcf6ff5faf374f7100
SHA256801ee5f2dcc3e87c4cc0ebf62d671cd89edf24595ea0232a37c9980bdee37427
SHA512efbc20f941b8e9a78aa023a9f3dee582e8c2152366f27fd78e246c6071218d47066596dacf777ac4f4503717f32fc3c3ca35f83b58feac3cb470993448551689
-
Filesize
14KB
MD5990d34105e99f4ef37d9c9128c0736a3
SHA169824786e70f737ffb6d5c965081f9b8126d82db
SHA256fd4a1afa0d9fb42afbc6caed0965c11a67fac8199998c4e0f132ad5a10805b31
SHA512777222da0f9e0bc5d91575cf92c4defd7129b99a1d9d1a7fd2aea0e63a0a84e55ba7634355f466f4d78c32265870dec46c59d66536033ade618bae78ecea8736
-
Filesize
352KB
MD568bac3f15b92314e8f0916acf51f8830
SHA1bb6cbbb927f29d105a3014159e7c8b986738dd4f
SHA256c8c4cb6443b89e96123d42adff685b6eae52c4352e4f4c6742249720043f9f05
SHA5124bdd99d3fba0d559ca4cdecda453080246d5eba0963ce632f84ad0db4ba2c4ed55af51718b9997afab6ccf8b9d3b7d184673e9292a31a69e0a5be3b302aa644b