Analysis
-
max time kernel
143s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:12
Static task
static1
Behavioral task
behavioral1
Sample
c45c96f74ade340e71a22b72bf7ac829dfc474c1d27f80fa0430296fd2d32385.exe
Resource
win10v2004-20241007-en
General
-
Target
c45c96f74ade340e71a22b72bf7ac829dfc474c1d27f80fa0430296fd2d32385.exe
-
Size
530KB
-
MD5
36786093c01732fd3f0f20b1a8f75b01
-
SHA1
5fe2d6c72792c8c55927d9bc464be1d251eb7da3
-
SHA256
c45c96f74ade340e71a22b72bf7ac829dfc474c1d27f80fa0430296fd2d32385
-
SHA512
17afc38da798104d9f63022b0fe6380ddc0068d7264be874d1921b7501782cb562e7b9c0b7df527a2c36ca429eb189ec5854d1b3ea0384a7cf92acc9ecdfeb64
-
SSDEEP
12288:eMr4y90unhRiFW81a6eLcsQf5KXa/U/8aR/VDLxUQCV:ayThL2AP/8aR/hWv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr930814.exe healer behavioral1/memory/4604-14-0x0000000000760000-0x000000000076A000-memory.dmp healer -
Healer family
-
Processes:
jr930814.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr930814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr930814.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr930814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr930814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr930814.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr930814.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1728-23-0x0000000004AF0000-0x0000000004B36000-memory.dmp family_redline behavioral1/memory/1728-25-0x0000000004BB0000-0x0000000004BF4000-memory.dmp family_redline behavioral1/memory/1728-27-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-26-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-41-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-89-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-87-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-85-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-84-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-79-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-77-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-75-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-73-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-71-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-69-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-67-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-65-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-63-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-61-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-59-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-57-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-55-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-53-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-51-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-49-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-47-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-43-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-45-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-39-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-37-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-35-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-81-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-33-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-31-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline behavioral1/memory/1728-29-0x0000000004BB0000-0x0000000004BEF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziRp3958.exejr930814.exeku498717.exepid process 2696 ziRp3958.exe 4604 jr930814.exe 1728 ku498717.exe -
Processes:
jr930814.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr930814.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c45c96f74ade340e71a22b72bf7ac829dfc474c1d27f80fa0430296fd2d32385.exeziRp3958.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c45c96f74ade340e71a22b72bf7ac829dfc474c1d27f80fa0430296fd2d32385.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziRp3958.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c45c96f74ade340e71a22b72bf7ac829dfc474c1d27f80fa0430296fd2d32385.exeziRp3958.exeku498717.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c45c96f74ade340e71a22b72bf7ac829dfc474c1d27f80fa0430296fd2d32385.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziRp3958.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku498717.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr930814.exepid process 4604 jr930814.exe 4604 jr930814.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr930814.exeku498717.exedescription pid process Token: SeDebugPrivilege 4604 jr930814.exe Token: SeDebugPrivilege 1728 ku498717.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c45c96f74ade340e71a22b72bf7ac829dfc474c1d27f80fa0430296fd2d32385.exeziRp3958.exedescription pid process target process PID 1668 wrote to memory of 2696 1668 c45c96f74ade340e71a22b72bf7ac829dfc474c1d27f80fa0430296fd2d32385.exe ziRp3958.exe PID 1668 wrote to memory of 2696 1668 c45c96f74ade340e71a22b72bf7ac829dfc474c1d27f80fa0430296fd2d32385.exe ziRp3958.exe PID 1668 wrote to memory of 2696 1668 c45c96f74ade340e71a22b72bf7ac829dfc474c1d27f80fa0430296fd2d32385.exe ziRp3958.exe PID 2696 wrote to memory of 4604 2696 ziRp3958.exe jr930814.exe PID 2696 wrote to memory of 4604 2696 ziRp3958.exe jr930814.exe PID 2696 wrote to memory of 1728 2696 ziRp3958.exe ku498717.exe PID 2696 wrote to memory of 1728 2696 ziRp3958.exe ku498717.exe PID 2696 wrote to memory of 1728 2696 ziRp3958.exe ku498717.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45c96f74ade340e71a22b72bf7ac829dfc474c1d27f80fa0430296fd2d32385.exe"C:\Users\Admin\AppData\Local\Temp\c45c96f74ade340e71a22b72bf7ac829dfc474c1d27f80fa0430296fd2d32385.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRp3958.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRp3958.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr930814.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr930814.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku498717.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku498717.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1728
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD527162a5e141c7ca6b4817db9ec0232b1
SHA1c3d0ec91126825039f93441995443516bca8719e
SHA2566fc59ea0429d6af42bb1a0a74380aa50c731c43193e108a22d6b8731ad3df5f7
SHA5124761b48c5d801c65cf3f22efce2da3094acbda471f0562048917dc8d73bbdc495fd15c2b706379f376818d551bc4f199ef34dca85dfa5af60d302c8866336a1d
-
Filesize
11KB
MD5d347b1e2d1a275f3d01443bdbaedd279
SHA1e030cccca98ab29f73d0d2eda8a8449f8aa90f80
SHA25648c53a67eef87484e1ad94641979caf149a0fbc724adeced2b53a8773ae3f39e
SHA512b16eb80e24c9ae482a6ac1ab5e8cb29953bc3bac2ccfb6b4d82036d0b00e19da4419749254a3c22188c5cee735eae18ef0cf1968db6594dfcf79b13910dacff9
-
Filesize
434KB
MD55ee2aadd2e790ca19879bd5463952372
SHA11e73a266c5c947f1ac2cf73f670e71a43b7c83ce
SHA2564bbbf53aac35ec536f7d07867b926200cc3cadef4fe3ec4eb128a6bb0a922424
SHA512032e7717c0c51c51fa0a88229897ecc90d590ff99aad685ee068d28cdb22177134e6c75a0adc366f780f5c01a249a4ac334f7a3aa81002675721eb6d0283b879