Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:15
Static task
static1
Behavioral task
behavioral1
Sample
808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exe
Resource
win10v2004-20241007-en
General
-
Target
808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exe
-
Size
534KB
-
MD5
c08a47390134cb61562000af6e434d24
-
SHA1
eafefbe4dfbaa29c8c1507e110853cd453c6b73a
-
SHA256
808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4
-
SHA512
f7a72134228811e35655ad30ee36fe3f5f6dd7b59f49507319e394a4a477f02fda003214a419b4fe241633bc1863d7290d9ccb91adc25bd60ec4a2e58c423bab
-
SSDEEP
12288:IMrqy90e67T6cLx5olAzEyqBpOCGrL/O61poVrePDT1:Syy5ypBpOhbEry1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr994584.exe healer behavioral1/memory/3672-15-0x0000000000120000-0x000000000012A000-memory.dmp healer -
Healer family
-
Processes:
jr994584.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr994584.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr994584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr994584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr994584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr994584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr994584.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3616-22-0x00000000022E0000-0x0000000002326000-memory.dmp family_redline behavioral1/memory/3616-24-0x0000000002550000-0x0000000002594000-memory.dmp family_redline behavioral1/memory/3616-30-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-36-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-89-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-84-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-82-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-80-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-79-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-76-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-74-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-72-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-70-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-68-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-64-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-62-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-60-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-58-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-56-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-54-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-52-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-48-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-46-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-44-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-42-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-40-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-38-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-34-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-32-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-86-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-66-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-50-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-28-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-26-0x0000000002550000-0x000000000258F000-memory.dmp family_redline behavioral1/memory/3616-25-0x0000000002550000-0x000000000258F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zieo2541.exejr994584.exeku672592.exepid process 2984 zieo2541.exe 3672 jr994584.exe 3616 ku672592.exe -
Processes:
jr994584.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr994584.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
zieo2541.exe808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieo2541.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exezieo2541.exeku672592.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zieo2541.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku672592.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr994584.exepid process 3672 jr994584.exe 3672 jr994584.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr994584.exeku672592.exedescription pid process Token: SeDebugPrivilege 3672 jr994584.exe Token: SeDebugPrivilege 3616 ku672592.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exezieo2541.exedescription pid process target process PID 2408 wrote to memory of 2984 2408 808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exe zieo2541.exe PID 2408 wrote to memory of 2984 2408 808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exe zieo2541.exe PID 2408 wrote to memory of 2984 2408 808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exe zieo2541.exe PID 2984 wrote to memory of 3672 2984 zieo2541.exe jr994584.exe PID 2984 wrote to memory of 3672 2984 zieo2541.exe jr994584.exe PID 2984 wrote to memory of 3616 2984 zieo2541.exe ku672592.exe PID 2984 wrote to memory of 3616 2984 zieo2541.exe ku672592.exe PID 2984 wrote to memory of 3616 2984 zieo2541.exe ku672592.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exe"C:\Users\Admin\AppData\Local\Temp\808f46eda5cc5186e6b9134e3117df2ed1efdff316f47e0f5691783b0bac37a4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieo2541.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieo2541.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr994584.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr994584.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku672592.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku672592.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3616
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD53f604f1b7d7ac5989c4aa16de5c5e3ce
SHA1803123a6d72b543fbee60b08d1a91c92b7f9ccec
SHA256bfb0652eb4a224d003b56e8c9dd1d0637b86de5d437c58a726c5970284c6f8a1
SHA5120593f0d46cc6aaa1fe083e262a5d1858b50856b81d1767ff8a8a4159e5a5848dbba11cfab3ee9ab7a198d39fc728af074a591aaa366d49b436fab1e40b827203
-
Filesize
11KB
MD5e8ed1f81397f5f52efbbeb3d4e4c11a2
SHA1db8f98b1d64afa55ca3702a0aa99aee275121080
SHA25637f44c0ef6d51e0d14c1e542015bd61890e740e0867f6212b90a56452627355f
SHA51272af2dd2ca0169c85f430a0b0e3f0adc34e3bca50853a99564caa56a377005821b10bb6519c397dd5d08f6a835442fb9370d6d566508f8d256de4c470311b2d4
-
Filesize
318KB
MD512b6727bf2ca6825c1dea3f2129fc3f8
SHA1ef6a1770368574872e32e2d1bfd01b5277152143
SHA256fbd74b0411f355bd72805cf07cd6675c7839ad9871342e629bd6e4f671430d07
SHA512a35a6b27a4ead65937cb7616465d2931aff7c042fcb7c5d40fadbe932bdd87935c8eeaa129f0efaa8d6281dc2b6f40fe2cef4c47325b1c87515213bf66ba040d