Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 18:46
Static task
static1
Behavioral task
behavioral1
Sample
983f051474e1bf0fe4cf6393d7c4cbd87f3d1ebf30875a599371ca948521b33c.exe
Resource
win10v2004-20241007-en
General
-
Target
983f051474e1bf0fe4cf6393d7c4cbd87f3d1ebf30875a599371ca948521b33c.exe
-
Size
537KB
-
MD5
97cc183cb5bd32020f174ae28ed9c005
-
SHA1
8e32753a34c909f04dca1d3fcea81e56d77c5aec
-
SHA256
983f051474e1bf0fe4cf6393d7c4cbd87f3d1ebf30875a599371ca948521b33c
-
SHA512
7e99c2d7156435ec434988a5700467f2fdbfd1bcc8a04b7f8b4d57e9d31eba18e79e0bcd62f6289bd6a26bd4a5763d12388295bd4b1ebfa89b60702ca8269259
-
SSDEEP
12288:mMr6y90xGMTE4FbHNoauYm455rUAvHtwccE5kw+A9c297V:YyWGMdTusrfNwA57V
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr323477.exe healer behavioral1/memory/540-15-0x0000000000770000-0x000000000077A000-memory.dmp healer -
Healer family
-
Processes:
jr323477.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr323477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr323477.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr323477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr323477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr323477.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr323477.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
Processes:
resource yara_rule behavioral1/memory/864-22-0x0000000002A00000-0x0000000002A46000-memory.dmp family_redline behavioral1/memory/864-24-0x00000000054D0000-0x0000000005514000-memory.dmp family_redline behavioral1/memory/864-74-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-50-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-28-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-26-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-25-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-88-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-86-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-84-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-82-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-80-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-78-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-76-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-72-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-70-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-69-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-66-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-67-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-64-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-62-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-60-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-58-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-56-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-54-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-52-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-48-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-46-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-44-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-42-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-40-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-38-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-36-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-34-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-32-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline behavioral1/memory/864-30-0x00000000054D0000-0x000000000550F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zigy1645.exejr323477.exeku875652.exepid process 1676 zigy1645.exe 540 jr323477.exe 864 ku875652.exe -
Processes:
jr323477.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr323477.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
983f051474e1bf0fe4cf6393d7c4cbd87f3d1ebf30875a599371ca948521b33c.exezigy1645.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 983f051474e1bf0fe4cf6393d7c4cbd87f3d1ebf30875a599371ca948521b33c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zigy1645.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
983f051474e1bf0fe4cf6393d7c4cbd87f3d1ebf30875a599371ca948521b33c.exezigy1645.exeku875652.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 983f051474e1bf0fe4cf6393d7c4cbd87f3d1ebf30875a599371ca948521b33c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zigy1645.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku875652.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr323477.exepid process 540 jr323477.exe 540 jr323477.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr323477.exeku875652.exedescription pid process Token: SeDebugPrivilege 540 jr323477.exe Token: SeDebugPrivilege 864 ku875652.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
983f051474e1bf0fe4cf6393d7c4cbd87f3d1ebf30875a599371ca948521b33c.exezigy1645.exedescription pid process target process PID 4424 wrote to memory of 1676 4424 983f051474e1bf0fe4cf6393d7c4cbd87f3d1ebf30875a599371ca948521b33c.exe zigy1645.exe PID 4424 wrote to memory of 1676 4424 983f051474e1bf0fe4cf6393d7c4cbd87f3d1ebf30875a599371ca948521b33c.exe zigy1645.exe PID 4424 wrote to memory of 1676 4424 983f051474e1bf0fe4cf6393d7c4cbd87f3d1ebf30875a599371ca948521b33c.exe zigy1645.exe PID 1676 wrote to memory of 540 1676 zigy1645.exe jr323477.exe PID 1676 wrote to memory of 540 1676 zigy1645.exe jr323477.exe PID 1676 wrote to memory of 864 1676 zigy1645.exe ku875652.exe PID 1676 wrote to memory of 864 1676 zigy1645.exe ku875652.exe PID 1676 wrote to memory of 864 1676 zigy1645.exe ku875652.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\983f051474e1bf0fe4cf6393d7c4cbd87f3d1ebf30875a599371ca948521b33c.exe"C:\Users\Admin\AppData\Local\Temp\983f051474e1bf0fe4cf6393d7c4cbd87f3d1ebf30875a599371ca948521b33c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigy1645.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigy1645.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr323477.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr323477.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:540 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku875652.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku875652.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:864
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD55bbedf88fca67e5b94655a77fa4aeff1
SHA1bdc4a5c9412655550ac9343c1274a3f4228546c8
SHA25666f82225b6c7d9097a1accf801244e7d3f42cd1e1b3d99172512c50cea5b7b99
SHA512a6e2433946ecdb33ea0fafaa457bc2ee141a2fd440d9696016fb730bbd4ded40ad8c5158df5aa25fbcfcccebd67fafb7323ab4d5e3932cf30c3f8bb48e4dea80
-
Filesize
14KB
MD58ced650b152213709c18b28bf4b3841c
SHA12fa52dabb9d6e26f8408c4638f74e541cb5d42d0
SHA256cfb8aeffeb2e394648b327bbe6d1867a1afe89177633fb418fdb86f4b6e56e83
SHA512eff99cb4431037072726e26608a69c32a846f198ea6f95e3027d06b8ccaae8763d0660361aa5b3714cbbd4919580e9e690493c0dd1fb97dc35c179a85a00267d
-
Filesize
352KB
MD56a9b33929e2605131704908e7778de5f
SHA11d0188a9b615503ca7920db9f3b400f055f1f81f
SHA256d276ba94a7035f4e89ae97c90f5c639aa7ba03de0f20324bb8d6b12e2af3b914
SHA512565388572d04fd310775a8088e3f708ea0d5502bcd63e4b5e7cc04a233f48a3b38f1872d5cd2756a71785480d99c2ed88499eb04167f5fb6088fae7772b59183