Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:24
Static task
static1
Behavioral task
behavioral1
Sample
fefa8145b6d261e5beeefbfda311e301008ff83591b949ab05916d1b24dd9109.exe
Resource
win10v2004-20241007-en
General
-
Target
fefa8145b6d261e5beeefbfda311e301008ff83591b949ab05916d1b24dd9109.exe
-
Size
533KB
-
MD5
5f329d929ccf1b7dccebe1a300fd5c27
-
SHA1
3c6d5040acc8307a5981f9c3bebbace6fbf2aa7c
-
SHA256
fefa8145b6d261e5beeefbfda311e301008ff83591b949ab05916d1b24dd9109
-
SHA512
7547f5498a4f3b87cf0e074dca09674f2caf59d5c6eee0e57aac17d0d21b7780562361ce5b9643f122656c6a6b85cd815190aae19c6aa93360a7d18c0e8611fd
-
SSDEEP
12288:IMr9y904ja//GQdZNUZLveGeWVgObqr+2HJ3ikoI:1yM/GmM9biJ3ikoI
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr440692.exe healer behavioral1/memory/1272-15-0x0000000000CE0000-0x0000000000CEA000-memory.dmp healer -
Healer family
-
Processes:
jr440692.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr440692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr440692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr440692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr440692.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr440692.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr440692.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/60-22-0x0000000004A10000-0x0000000004A56000-memory.dmp family_redline behavioral1/memory/60-24-0x0000000005070000-0x00000000050B4000-memory.dmp family_redline behavioral1/memory/60-26-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-38-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-88-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-86-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-84-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-82-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-80-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-78-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-74-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-72-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-70-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-68-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-66-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-64-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-62-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-60-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-58-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-56-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-54-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-52-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-50-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-48-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-46-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-42-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-40-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-36-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-34-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-32-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-30-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-28-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-76-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-44-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline behavioral1/memory/60-25-0x0000000005070000-0x00000000050AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zihm7256.exejr440692.exeku302647.exepid process 1984 zihm7256.exe 1272 jr440692.exe 60 ku302647.exe -
Processes:
jr440692.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr440692.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fefa8145b6d261e5beeefbfda311e301008ff83591b949ab05916d1b24dd9109.exezihm7256.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fefa8145b6d261e5beeefbfda311e301008ff83591b949ab05916d1b24dd9109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zihm7256.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fefa8145b6d261e5beeefbfda311e301008ff83591b949ab05916d1b24dd9109.exezihm7256.exeku302647.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fefa8145b6d261e5beeefbfda311e301008ff83591b949ab05916d1b24dd9109.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zihm7256.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku302647.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr440692.exepid process 1272 jr440692.exe 1272 jr440692.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr440692.exeku302647.exedescription pid process Token: SeDebugPrivilege 1272 jr440692.exe Token: SeDebugPrivilege 60 ku302647.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fefa8145b6d261e5beeefbfda311e301008ff83591b949ab05916d1b24dd9109.exezihm7256.exedescription pid process target process PID 3420 wrote to memory of 1984 3420 fefa8145b6d261e5beeefbfda311e301008ff83591b949ab05916d1b24dd9109.exe zihm7256.exe PID 3420 wrote to memory of 1984 3420 fefa8145b6d261e5beeefbfda311e301008ff83591b949ab05916d1b24dd9109.exe zihm7256.exe PID 3420 wrote to memory of 1984 3420 fefa8145b6d261e5beeefbfda311e301008ff83591b949ab05916d1b24dd9109.exe zihm7256.exe PID 1984 wrote to memory of 1272 1984 zihm7256.exe jr440692.exe PID 1984 wrote to memory of 1272 1984 zihm7256.exe jr440692.exe PID 1984 wrote to memory of 60 1984 zihm7256.exe ku302647.exe PID 1984 wrote to memory of 60 1984 zihm7256.exe ku302647.exe PID 1984 wrote to memory of 60 1984 zihm7256.exe ku302647.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fefa8145b6d261e5beeefbfda311e301008ff83591b949ab05916d1b24dd9109.exe"C:\Users\Admin\AppData\Local\Temp\fefa8145b6d261e5beeefbfda311e301008ff83591b949ab05916d1b24dd9109.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihm7256.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihm7256.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr440692.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr440692.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku302647.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku302647.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:60
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD501e1aa15dcf15c60480f9f52afb6ebb7
SHA1fe6d0306187e613075a6abef00589fc72906f11f
SHA2561419be5f34856278fec8b19df3751d441f74f98b49cc40cc88e4d4aed13d552a
SHA512f9eb4ef5b821638190d16b9d58d5c980c796ed0f09f86a6d9c5a99d8397376969cbfdee0bc430eb5aa20eed5f34749244c5dd4bb68f19f3ff076135d9efd4d30
-
Filesize
11KB
MD5e27fc2174dbba731cbd66b4e268b9af5
SHA1fa0a5c0e9ba4b9845fc81c7b4d077996ec17bbd8
SHA256a0dc443ce5fd5bbd5bddbca58344da09f98469ecb1406e17bdbfb4a913b97625
SHA512b912be118e7b72dd9d680b24409340b676ebfa30497f97f88eec50c3ac7ef24da12fce20e42f0cee1be4d7b8f9ea7ce713af3664b4094e326adb5744696d89d3
-
Filesize
318KB
MD5434d39fe04ef52067f4f4203338199ed
SHA12d2ed904dd20a2615fa0913441a3eff1d7c758a1
SHA256dccbe5d209e7f54ba20ed60fef94f2f4a50cac2ccb5ba80c040ec06ab275345d
SHA51284940a72fc11de3f7d8ff9f543dc9e4181baf25accb2ae065b3cc11374ccc0c6134fbc5cfc6437c01b13d1ea0f4422e3fed8a171524e15d8d6f049be7321b386