Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:23
Static task
static1
Behavioral task
behavioral1
Sample
5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb.exe
Resource
win10v2004-20241007-en
General
-
Target
5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb.exe
-
Size
529KB
-
MD5
322383a9447a8ceb07fec4739003b0b7
-
SHA1
4f94ba9eab7b02dffd6b580f88d42552b25c146b
-
SHA256
5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb
-
SHA512
c7a62c0fb0395ecda77fdd96556c4dc584dfc3494ec10ba6bcf3f46fa706de7c8d54be694be8b0b3c11282c66a0a271189529df0cc135df1cfd064b990eb40e5
-
SSDEEP
12288:aMrsy90m0JOras0+hvrhLQhV2+fHlpLcZkAOA:6ykJtwhv9kZrLcaAV
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr681890.exe healer behavioral1/memory/956-15-0x0000000000500000-0x000000000050A000-memory.dmp healer -
Healer family
-
Processes:
jr681890.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr681890.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr681890.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr681890.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr681890.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr681890.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr681890.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3272-22-0x0000000004D80000-0x0000000004DC6000-memory.dmp family_redline behavioral1/memory/3272-24-0x0000000004E40000-0x0000000004E84000-memory.dmp family_redline behavioral1/memory/3272-26-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-70-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-88-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-86-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-84-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-82-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-80-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-78-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-76-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-74-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-72-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-68-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-66-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-64-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-62-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-60-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-58-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-56-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-54-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-52-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-50-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-48-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-46-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-44-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-42-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-40-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-38-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-34-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-32-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-30-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-28-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-36-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/3272-25-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziVQ2385.exejr681890.exeku043617.exepid process 4712 ziVQ2385.exe 956 jr681890.exe 3272 ku043617.exe -
Processes:
jr681890.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr681890.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb.exeziVQ2385.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVQ2385.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb.exeziVQ2385.exeku043617.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziVQ2385.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku043617.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr681890.exepid process 956 jr681890.exe 956 jr681890.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr681890.exeku043617.exedescription pid process Token: SeDebugPrivilege 956 jr681890.exe Token: SeDebugPrivilege 3272 ku043617.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb.exeziVQ2385.exedescription pid process target process PID 3248 wrote to memory of 4712 3248 5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb.exe ziVQ2385.exe PID 3248 wrote to memory of 4712 3248 5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb.exe ziVQ2385.exe PID 3248 wrote to memory of 4712 3248 5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb.exe ziVQ2385.exe PID 4712 wrote to memory of 956 4712 ziVQ2385.exe jr681890.exe PID 4712 wrote to memory of 956 4712 ziVQ2385.exe jr681890.exe PID 4712 wrote to memory of 3272 4712 ziVQ2385.exe ku043617.exe PID 4712 wrote to memory of 3272 4712 ziVQ2385.exe ku043617.exe PID 4712 wrote to memory of 3272 4712 ziVQ2385.exe ku043617.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb.exe"C:\Users\Admin\AppData\Local\Temp\5955964c92f2cd7def8723d5904d3944208af0410ba7e85269b6952f4d4903eb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVQ2385.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVQ2385.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr681890.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr681890.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku043617.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku043617.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3272
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5576c09c0cfbb77c89a39af946a55632d
SHA18c656ce90327133560c130918eed7acdf3247e46
SHA2568d0f17947d2b5004c6948d235456efac6218b2f2384abdbe963754ede01a4b7f
SHA51202a61272e6bd667e4727503e62f3c3c9f5a8af58f1b8cb0d78dedb047b98e1335cca110a6e536fb21667a31d59b9848d77c040e46fde7d6d96d1893259452e19
-
Filesize
12KB
MD5153bb8cc10de77bdfb1f6a60f9e16200
SHA155d3a2a7e72bf2d689bffa4ca424ee89014014c5
SHA256d53f7147c623c601509ca17f311af5eea2f5179ff07912c4092d726029f3ec8a
SHA5122057a8e979d5350b06e2d342a90a7e8f88f7274e3427a58474bd8fd5326d7f8ad6319e2de1be73d28e6902ca4135b8ff9b9ded08d9c164a7af34c71935e6e1cf
-
Filesize
434KB
MD56e2aa772fbfeebcdc88998382404adb3
SHA162af1fc20de3d7997cc29db80a3ee0a80873c286
SHA25642664a97a85e1384c01c87d31fa93854f74887e15f7cfcb5945392d5af8f0ecd
SHA512520c54d4c9c75b2e60012480ad5ecd065d942252c421261692aa77d5ed44cde012b1870f24f6f01e1a32af249b8c7ba7620794feca91eb2ff8a5cc96ddfe5216