Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:23
Static task
static1
Behavioral task
behavioral1
Sample
4765cb66bfaebd25c0a66eb791c6776160b96508fdf20856760aa4ff7a7f66f8.exe
Resource
win10v2004-20241007-en
General
-
Target
4765cb66bfaebd25c0a66eb791c6776160b96508fdf20856760aa4ff7a7f66f8.exe
-
Size
560KB
-
MD5
34520a028ec97a9e9a2843afac0e3000
-
SHA1
88896651723ff1862417b4c5abe29b610f833d85
-
SHA256
4765cb66bfaebd25c0a66eb791c6776160b96508fdf20856760aa4ff7a7f66f8
-
SHA512
4be8a043409fbbe6c3a06b7d2c75a360742db8e23c99a49c06607d286750cec27e5a1d39d537365a62957cca6967abbd1df240a6a11dd08942c0ac29ecde893f
-
SSDEEP
12288:HMrBy90JuEwGGKpzMiaKzKAq8laggbM0v+5n:iy7fGG/ibzqcgbM0v+N
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr587987.exe healer behavioral1/memory/1164-15-0x00000000003A0000-0x00000000003AA000-memory.dmp healer -
Healer family
-
Processes:
jr587987.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr587987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr587987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr587987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr587987.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr587987.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr587987.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2112-22-0x0000000002980000-0x00000000029C6000-memory.dmp family_redline behavioral1/memory/2112-24-0x0000000004F40000-0x0000000004F84000-memory.dmp family_redline behavioral1/memory/2112-30-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-32-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-80-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-88-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-86-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-84-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-82-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-78-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-76-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-74-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-72-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-70-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-68-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-64-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-56-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-54-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-52-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-46-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-44-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-42-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-40-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-38-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-36-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-66-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-62-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-60-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-58-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-50-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-48-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-34-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-28-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-26-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline behavioral1/memory/2112-25-0x0000000004F40000-0x0000000004F7F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziRe6332.exejr587987.exeku302144.exepid process 1988 ziRe6332.exe 1164 jr587987.exe 2112 ku302144.exe -
Processes:
jr587987.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr587987.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4765cb66bfaebd25c0a66eb791c6776160b96508fdf20856760aa4ff7a7f66f8.exeziRe6332.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4765cb66bfaebd25c0a66eb791c6776160b96508fdf20856760aa4ff7a7f66f8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziRe6332.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4765cb66bfaebd25c0a66eb791c6776160b96508fdf20856760aa4ff7a7f66f8.exeziRe6332.exeku302144.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4765cb66bfaebd25c0a66eb791c6776160b96508fdf20856760aa4ff7a7f66f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziRe6332.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku302144.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr587987.exepid process 1164 jr587987.exe 1164 jr587987.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr587987.exeku302144.exedescription pid process Token: SeDebugPrivilege 1164 jr587987.exe Token: SeDebugPrivilege 2112 ku302144.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4765cb66bfaebd25c0a66eb791c6776160b96508fdf20856760aa4ff7a7f66f8.exeziRe6332.exedescription pid process target process PID 900 wrote to memory of 1988 900 4765cb66bfaebd25c0a66eb791c6776160b96508fdf20856760aa4ff7a7f66f8.exe ziRe6332.exe PID 900 wrote to memory of 1988 900 4765cb66bfaebd25c0a66eb791c6776160b96508fdf20856760aa4ff7a7f66f8.exe ziRe6332.exe PID 900 wrote to memory of 1988 900 4765cb66bfaebd25c0a66eb791c6776160b96508fdf20856760aa4ff7a7f66f8.exe ziRe6332.exe PID 1988 wrote to memory of 1164 1988 ziRe6332.exe jr587987.exe PID 1988 wrote to memory of 1164 1988 ziRe6332.exe jr587987.exe PID 1988 wrote to memory of 2112 1988 ziRe6332.exe ku302144.exe PID 1988 wrote to memory of 2112 1988 ziRe6332.exe ku302144.exe PID 1988 wrote to memory of 2112 1988 ziRe6332.exe ku302144.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4765cb66bfaebd25c0a66eb791c6776160b96508fdf20856760aa4ff7a7f66f8.exe"C:\Users\Admin\AppData\Local\Temp\4765cb66bfaebd25c0a66eb791c6776160b96508fdf20856760aa4ff7a7f66f8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRe6332.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRe6332.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr587987.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr587987.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku302144.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku302144.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2112
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD549ec585f9ed1c1b1b4b19d0173af401f
SHA17346e6a95dc8b519a5983497a60422af69ed197e
SHA256a972ceed2b9000a936ee79be4d017ca19ec3dc56b7105313c69db9adeafe05dd
SHA5124c3190218c649985bc827449e38b217f747bb186f52eb385c2a6eebf7a560385fe98c27ea68fad7f1efec0ff434915d575d166633e5eb7971cd4cd36bdb73a5a
-
Filesize
12KB
MD5d605249aadff47cc463af6936672bfd6
SHA114a55fe08af6db592b6a1ef266db36961a32b245
SHA256be0fb0ec61d76cbea75cd868f8cb86fb13bf33f29f2a094259d28a1274858474
SHA51293bb7cef91c8efe4dc3696ddb6c752326a7af297cc3499c4af757c3472db9232ef5ee370386a688be5baa7e05e573644c18f394fa5b3f79e96c2ff3f672ebf73
-
Filesize
370KB
MD56951ee75f4565f523ec376780f14b168
SHA1e861988ea12151213a6cf473d016d791aa49f0d0
SHA25662cebb4c533d824da205c27b271b2356a04e3b2abab1949806f3b47207884990
SHA5123bd85da8b583a796f62f417b7d6861c226553e4b156a2ccf16953004317006838fe8839c1563a8f4b4d0724e0d6af10848ac6341e527b830f8856ae901a21aa5