Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:26
Static task
static1
Behavioral task
behavioral1
Sample
6eb998b4792f905b1886f4b8224afb7a6967a30f23187d140cd1858d1218e80e.exe
Resource
win10v2004-20241007-en
General
-
Target
6eb998b4792f905b1886f4b8224afb7a6967a30f23187d140cd1858d1218e80e.exe
-
Size
522KB
-
MD5
179138cf8797d5e01115b340d663d5ef
-
SHA1
19b505ea1eb4164adc449e495f73e3f2208f9d5b
-
SHA256
6eb998b4792f905b1886f4b8224afb7a6967a30f23187d140cd1858d1218e80e
-
SHA512
e650f0f64c6bea7c31b640a62b83535dc1b9fea45be18f9c98ea422d25141d9c2b19da1d5a5993e23750480992a9ed0ca58e902cd906e65dae126bacbaf66a3e
-
SSDEEP
12288:QMrDy90/9oMoCAq7pajULtxh32W+IJn05CWccyRA:Dypd47pVxxh32W+M05p1yRA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr811205.exe healer behavioral1/memory/4016-15-0x00000000007F0000-0x00000000007FA000-memory.dmp healer -
Healer family
-
Processes:
jr811205.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr811205.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr811205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr811205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr811205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr811205.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr811205.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4560-22-0x0000000002580000-0x00000000025C6000-memory.dmp family_redline behavioral1/memory/4560-24-0x0000000002740000-0x0000000002784000-memory.dmp family_redline behavioral1/memory/4560-38-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-88-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-86-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-84-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-82-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-80-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-76-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-74-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-72-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-70-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-68-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-66-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-64-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-62-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-60-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-58-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-56-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-54-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-52-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-50-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-48-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-46-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-44-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-42-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-40-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-36-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-34-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-32-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-30-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-78-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-28-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-26-0x0000000002740000-0x000000000277F000-memory.dmp family_redline behavioral1/memory/4560-25-0x0000000002740000-0x000000000277F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziVw5039.exejr811205.exeku061561.exepid process 468 ziVw5039.exe 4016 jr811205.exe 4560 ku061561.exe -
Processes:
jr811205.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr811205.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6eb998b4792f905b1886f4b8224afb7a6967a30f23187d140cd1858d1218e80e.exeziVw5039.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6eb998b4792f905b1886f4b8224afb7a6967a30f23187d140cd1858d1218e80e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVw5039.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6eb998b4792f905b1886f4b8224afb7a6967a30f23187d140cd1858d1218e80e.exeziVw5039.exeku061561.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6eb998b4792f905b1886f4b8224afb7a6967a30f23187d140cd1858d1218e80e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziVw5039.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku061561.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr811205.exepid process 4016 jr811205.exe 4016 jr811205.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr811205.exeku061561.exedescription pid process Token: SeDebugPrivilege 4016 jr811205.exe Token: SeDebugPrivilege 4560 ku061561.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
6eb998b4792f905b1886f4b8224afb7a6967a30f23187d140cd1858d1218e80e.exeziVw5039.exedescription pid process target process PID 396 wrote to memory of 468 396 6eb998b4792f905b1886f4b8224afb7a6967a30f23187d140cd1858d1218e80e.exe ziVw5039.exe PID 396 wrote to memory of 468 396 6eb998b4792f905b1886f4b8224afb7a6967a30f23187d140cd1858d1218e80e.exe ziVw5039.exe PID 396 wrote to memory of 468 396 6eb998b4792f905b1886f4b8224afb7a6967a30f23187d140cd1858d1218e80e.exe ziVw5039.exe PID 468 wrote to memory of 4016 468 ziVw5039.exe jr811205.exe PID 468 wrote to memory of 4016 468 ziVw5039.exe jr811205.exe PID 468 wrote to memory of 4560 468 ziVw5039.exe ku061561.exe PID 468 wrote to memory of 4560 468 ziVw5039.exe ku061561.exe PID 468 wrote to memory of 4560 468 ziVw5039.exe ku061561.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6eb998b4792f905b1886f4b8224afb7a6967a30f23187d140cd1858d1218e80e.exe"C:\Users\Admin\AppData\Local\Temp\6eb998b4792f905b1886f4b8224afb7a6967a30f23187d140cd1858d1218e80e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVw5039.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVw5039.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr811205.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr811205.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku061561.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku061561.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4560
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5dc46a5465e257c9916bc38c956698d13
SHA1b7c2f5e1ae7e4d287797bd9f3afa6097df9d69f8
SHA256acbcffb43fb4d2a855081f402dce4295febd339521ef6c4a5c50277f325c0e4a
SHA5128c2301076e6e5952089533554759bc56b3259c39830b497c64544f43de64b305ebcf0599b6a1bf28641883090fcec82e046b2ac13ceb4bf65084e76847d30309
-
Filesize
14KB
MD5fe39f7b29d1ec59aba47630b6bd9b1e1
SHA11a36aaedc62dc87d9be6e96af55d8fe88446a898
SHA256bc579445df78d1c41e452bf92ff376b40c058aca3ac56a806bd425eb263722d1
SHA51206dcdde878b79b8f9707c25ec1a39ea6312e73d4aa8c884474182521f2b904c6631b301d8fea9cd3bde355784d7d55ed53deb28ce88e6f84837682357b08ab14
-
Filesize
295KB
MD5e168f7223530ec9e7d7a04e50820cb77
SHA124aa91f3b3110106cdc4eb319a07ebac09fb06c4
SHA256758f94f3f77d4187262e034dec303911cbdef4370b03337765d777fec8841899
SHA5126c29373b3c314e72825af4894f547d36e68f9e8a82cc46a0b9c854295efc14d0743b3ed260b1d6882414c0886abdbc6d3cda8a0c2c84e417509498293da0818f