Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
155419fd6c9610a2143a7fcf13de2f8bdbea4496ea0a1b4a042a18606a5ebb46.exe
Resource
win10v2004-20241007-en
General
-
Target
155419fd6c9610a2143a7fcf13de2f8bdbea4496ea0a1b4a042a18606a5ebb46.exe
-
Size
562KB
-
MD5
f672e82d348da8bd5de75c189cfe2511
-
SHA1
b4babb86ec0742f2e36d8e66602b04ee06725c05
-
SHA256
155419fd6c9610a2143a7fcf13de2f8bdbea4496ea0a1b4a042a18606a5ebb46
-
SHA512
b5876b0547f81979091f2d89d16e253c1a27fd017509afa099fb0e02ba404d3e8135ad0e29a5b2dfc604ce3ff5864f040d949a1e0a8358699841e733756bcc0f
-
SSDEEP
12288:AMr0y90ERLZeTkCFlTc/byl4j5DXPMtZyi1Z0af7L3BzES4T:Ey3eTvlTu+l4FzEPysZff2t
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr214955.exe healer behavioral1/memory/4884-15-0x0000000000440000-0x000000000044A000-memory.dmp healer -
Healer family
-
Processes:
jr214955.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr214955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr214955.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr214955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr214955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr214955.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr214955.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2704-22-0x00000000027B0000-0x00000000027F6000-memory.dmp family_redline behavioral1/memory/2704-24-0x0000000004E00000-0x0000000004E44000-memory.dmp family_redline behavioral1/memory/2704-26-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-28-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-82-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-60-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-48-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-32-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-25-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-88-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-86-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-84-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-80-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-78-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-77-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-74-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-72-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-70-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-68-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-66-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-64-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-62-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-58-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-56-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-55-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-52-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-50-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-46-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-44-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-42-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-40-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-38-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-36-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-34-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/2704-30-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zibG4475.exejr214955.exeku823198.exepid process 2648 zibG4475.exe 4884 jr214955.exe 2704 ku823198.exe -
Processes:
jr214955.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr214955.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
155419fd6c9610a2143a7fcf13de2f8bdbea4496ea0a1b4a042a18606a5ebb46.exezibG4475.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 155419fd6c9610a2143a7fcf13de2f8bdbea4496ea0a1b4a042a18606a5ebb46.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zibG4475.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku823198.exe155419fd6c9610a2143a7fcf13de2f8bdbea4496ea0a1b4a042a18606a5ebb46.exezibG4475.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku823198.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 155419fd6c9610a2143a7fcf13de2f8bdbea4496ea0a1b4a042a18606a5ebb46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zibG4475.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr214955.exepid process 4884 jr214955.exe 4884 jr214955.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr214955.exeku823198.exedescription pid process Token: SeDebugPrivilege 4884 jr214955.exe Token: SeDebugPrivilege 2704 ku823198.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
155419fd6c9610a2143a7fcf13de2f8bdbea4496ea0a1b4a042a18606a5ebb46.exezibG4475.exedescription pid process target process PID 2340 wrote to memory of 2648 2340 155419fd6c9610a2143a7fcf13de2f8bdbea4496ea0a1b4a042a18606a5ebb46.exe zibG4475.exe PID 2340 wrote to memory of 2648 2340 155419fd6c9610a2143a7fcf13de2f8bdbea4496ea0a1b4a042a18606a5ebb46.exe zibG4475.exe PID 2340 wrote to memory of 2648 2340 155419fd6c9610a2143a7fcf13de2f8bdbea4496ea0a1b4a042a18606a5ebb46.exe zibG4475.exe PID 2648 wrote to memory of 4884 2648 zibG4475.exe jr214955.exe PID 2648 wrote to memory of 4884 2648 zibG4475.exe jr214955.exe PID 2648 wrote to memory of 2704 2648 zibG4475.exe ku823198.exe PID 2648 wrote to memory of 2704 2648 zibG4475.exe ku823198.exe PID 2648 wrote to memory of 2704 2648 zibG4475.exe ku823198.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\155419fd6c9610a2143a7fcf13de2f8bdbea4496ea0a1b4a042a18606a5ebb46.exe"C:\Users\Admin\AppData\Local\Temp\155419fd6c9610a2143a7fcf13de2f8bdbea4496ea0a1b4a042a18606a5ebb46.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibG4475.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibG4475.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr214955.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr214955.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku823198.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku823198.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2704
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD556e679e163f2502ef9f6e08259f4b211
SHA12a41df08004fc1519bd051ac9b246d04b48ba734
SHA256fdbb4c456659255a27386ae4bdaee93b2024d5ad9d788b20f43de2996fcd746a
SHA5124644edd259c6ff8806ba375fa10c59488ddfb87a3944c2c24b4c3aed40313d2968a2a98696ddee1a14a9718b5a29b23f694d3756dca1c2fa459766c6ff9a7676
-
Filesize
12KB
MD5753266a2bb570c7491e72cfa834f49f8
SHA12122ba980df29c4ccbb414fb80ea96c74d05e7c9
SHA2560097b09988c9473925d6b46a45e5193cf6f102c1bf3f90de819dbfd162d7bd85
SHA5128d625aa976aa83883e7f016102500a06aba979ef37da51d66e034a26e0fd8976324de7e8fc6739a5dd76284e5ef0338ce031f4766de1726b4273a67a605f20a0
-
Filesize
372KB
MD5a152838a77d45fe1ae59ccef35204d39
SHA158675a0257d73394ce337b27c3cff27d65ec1d5a
SHA2562383d4d7ecc2301a0e72cb15fc54c17d83ed050ea097e0280c712ff38bce16f6
SHA512afbc1edd337fc64b87a2075195fc1dfffe9aa0246638090a3338491ad72a8d1f6779061204b113b4ae08292c8552318f6854d6dabc3c356ade06754fdd83aecb