Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
225645e0b59891552549eae58d89b43d46700b50f5de9b5842cfd97da794af92.exe
Resource
win10v2004-20241007-en
General
-
Target
225645e0b59891552549eae58d89b43d46700b50f5de9b5842cfd97da794af92.exe
-
Size
522KB
-
MD5
dea31a31dde369a5062d5574adfb10e8
-
SHA1
d138e6645ac75a0a8be6c25d5a5c321869be29b5
-
SHA256
225645e0b59891552549eae58d89b43d46700b50f5de9b5842cfd97da794af92
-
SHA512
36fc17729b3c3ed4d21c99f089a62ea0c28d2b17d4ead471710db15312ad6a90c7db7e17edefd9af4c07bc901864fc9c4d4cce9df2d6c4ab7dce263dc4a095f2
-
SSDEEP
12288:0MrPy90gcm8nBYhpt3J0J8Sj44ozWK8zjvgniRWkr9V:TyfOvWSc4hKXMWk7
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr752778.exe healer behavioral1/memory/4596-15-0x0000000000910000-0x000000000091A000-memory.dmp healer -
Healer family
-
Processes:
jr752778.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr752778.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr752778.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr752778.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr752778.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr752778.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr752778.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1644-22-0x00000000026D0000-0x0000000002716000-memory.dmp family_redline behavioral1/memory/1644-24-0x0000000002750000-0x0000000002794000-memory.dmp family_redline behavioral1/memory/1644-34-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-40-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-88-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-86-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-84-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-82-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-80-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-76-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-74-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-72-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-70-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-68-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-66-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-62-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-60-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-58-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-56-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-55-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-52-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-48-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-46-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-44-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-42-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-38-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-36-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-32-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-30-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-78-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-64-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-50-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-28-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-26-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/1644-25-0x0000000002750000-0x000000000278F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zibY1003.exejr752778.exeku705811.exepid process 4180 zibY1003.exe 4596 jr752778.exe 1644 ku705811.exe -
Processes:
jr752778.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr752778.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
225645e0b59891552549eae58d89b43d46700b50f5de9b5842cfd97da794af92.exezibY1003.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 225645e0b59891552549eae58d89b43d46700b50f5de9b5842cfd97da794af92.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zibY1003.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
225645e0b59891552549eae58d89b43d46700b50f5de9b5842cfd97da794af92.exezibY1003.exeku705811.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 225645e0b59891552549eae58d89b43d46700b50f5de9b5842cfd97da794af92.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zibY1003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku705811.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr752778.exepid process 4596 jr752778.exe 4596 jr752778.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr752778.exeku705811.exedescription pid process Token: SeDebugPrivilege 4596 jr752778.exe Token: SeDebugPrivilege 1644 ku705811.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
225645e0b59891552549eae58d89b43d46700b50f5de9b5842cfd97da794af92.exezibY1003.exedescription pid process target process PID 5068 wrote to memory of 4180 5068 225645e0b59891552549eae58d89b43d46700b50f5de9b5842cfd97da794af92.exe zibY1003.exe PID 5068 wrote to memory of 4180 5068 225645e0b59891552549eae58d89b43d46700b50f5de9b5842cfd97da794af92.exe zibY1003.exe PID 5068 wrote to memory of 4180 5068 225645e0b59891552549eae58d89b43d46700b50f5de9b5842cfd97da794af92.exe zibY1003.exe PID 4180 wrote to memory of 4596 4180 zibY1003.exe jr752778.exe PID 4180 wrote to memory of 4596 4180 zibY1003.exe jr752778.exe PID 4180 wrote to memory of 1644 4180 zibY1003.exe ku705811.exe PID 4180 wrote to memory of 1644 4180 zibY1003.exe ku705811.exe PID 4180 wrote to memory of 1644 4180 zibY1003.exe ku705811.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\225645e0b59891552549eae58d89b43d46700b50f5de9b5842cfd97da794af92.exe"C:\Users\Admin\AppData\Local\Temp\225645e0b59891552549eae58d89b43d46700b50f5de9b5842cfd97da794af92.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibY1003.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibY1003.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr752778.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr752778.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku705811.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku705811.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1644
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5026d710d128e40687d0ce5328285abe5
SHA157bf178cd1b7c054d402e48ec60e8b03bb0117a3
SHA25648de1e4eda8f9fc3c41291a56c4181bc32ffdf879ce3db36b2d0ac5dbb2744c5
SHA512e3c41cf0930da35c933fb1190cee203535ae92ef941eabf373e0695ae38b4140d9fa36cbde00ca83d84998b9e5ddf5d55cab7d3ed0b2b0952e10ac5dbd3d09a2
-
Filesize
15KB
MD5d22e1e305d014b6afaf3907ce13627ba
SHA1ef335a90433a5c3c2fd96882524de15e339d0518
SHA2569263e70cff30de13fd6d0d591c8bfa9da0b7eaf7825255a9c248ae6232a0f646
SHA5128d820ad48963add8f02b188c7b85b4c93eea5addf3277727ae741bfc84b44c77e13c869e1037ee7253baf14848838116b20065b78947b981cdcc4241f68c8076
-
Filesize
294KB
MD53c4b22d4156dd2660f09bd236387b208
SHA168695333f8aa40cb4498eba82ed6e37169f84b6d
SHA256f4c19735d5379fe6dd9da964ab3e0bbe679716d6d4ec1a48f81b917d961eb597
SHA5122812a70aee8ed6422de5cf1b8b55eaaa53375e90c3b8ba63b7b3d532eff4247ac3a97f9f837ec22dd759c0c46b9fc2d51627d74cf5e8bb7f42920f565c093f0c