Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
72488774a8a2375ac7a6302cb896031b7cc284d9fa4c0e677a46f96175eb78eb.exe
Resource
win10v2004-20241007-en
General
-
Target
72488774a8a2375ac7a6302cb896031b7cc284d9fa4c0e677a46f96175eb78eb.exe
-
Size
559KB
-
MD5
d2a6f56fadce015386099c28d0f1fea7
-
SHA1
b080027387c696e1d5c79aee09a5a0dbc82236d9
-
SHA256
72488774a8a2375ac7a6302cb896031b7cc284d9fa4c0e677a46f96175eb78eb
-
SHA512
a3913dfa0767623b56c45ad79746c69799f73d41f7b0b717391427e8c01c09a687e56583c98255084c580e617380f40c0f60784ec47a47d9237e0ef6700539c3
-
SSDEEP
12288:pMrMy90Dk09G3t//oQlxbcqKFB6aPR330ZQUHIgtzYC3tR:1yo81AixgqO6yliZoEbR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr865441.exe healer behavioral1/memory/2716-15-0x0000000000D50000-0x0000000000D5A000-memory.dmp healer -
Healer family
-
Processes:
jr865441.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr865441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr865441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr865441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr865441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr865441.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr865441.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4428-22-0x0000000004E60000-0x0000000004EA6000-memory.dmp family_redline behavioral1/memory/4428-24-0x0000000004F30000-0x0000000004F74000-memory.dmp family_redline behavioral1/memory/4428-26-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-40-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-89-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-86-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-84-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-82-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-80-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-78-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-76-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-72-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-70-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-68-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-66-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-64-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-60-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-58-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-54-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-52-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-50-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-48-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-46-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-45-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-38-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-36-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-34-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-32-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-30-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-28-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-74-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-62-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-56-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-42-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline behavioral1/memory/4428-25-0x0000000004F30000-0x0000000004F6F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziAc7296.exejr865441.exeku972723.exepid process 376 ziAc7296.exe 2716 jr865441.exe 4428 ku972723.exe -
Processes:
jr865441.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr865441.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
72488774a8a2375ac7a6302cb896031b7cc284d9fa4c0e677a46f96175eb78eb.exeziAc7296.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 72488774a8a2375ac7a6302cb896031b7cc284d9fa4c0e677a46f96175eb78eb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAc7296.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
72488774a8a2375ac7a6302cb896031b7cc284d9fa4c0e677a46f96175eb78eb.exeziAc7296.exeku972723.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72488774a8a2375ac7a6302cb896031b7cc284d9fa4c0e677a46f96175eb78eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziAc7296.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku972723.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr865441.exepid process 2716 jr865441.exe 2716 jr865441.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr865441.exeku972723.exedescription pid process Token: SeDebugPrivilege 2716 jr865441.exe Token: SeDebugPrivilege 4428 ku972723.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
72488774a8a2375ac7a6302cb896031b7cc284d9fa4c0e677a46f96175eb78eb.exeziAc7296.exedescription pid process target process PID 764 wrote to memory of 376 764 72488774a8a2375ac7a6302cb896031b7cc284d9fa4c0e677a46f96175eb78eb.exe ziAc7296.exe PID 764 wrote to memory of 376 764 72488774a8a2375ac7a6302cb896031b7cc284d9fa4c0e677a46f96175eb78eb.exe ziAc7296.exe PID 764 wrote to memory of 376 764 72488774a8a2375ac7a6302cb896031b7cc284d9fa4c0e677a46f96175eb78eb.exe ziAc7296.exe PID 376 wrote to memory of 2716 376 ziAc7296.exe jr865441.exe PID 376 wrote to memory of 2716 376 ziAc7296.exe jr865441.exe PID 376 wrote to memory of 4428 376 ziAc7296.exe ku972723.exe PID 376 wrote to memory of 4428 376 ziAc7296.exe ku972723.exe PID 376 wrote to memory of 4428 376 ziAc7296.exe ku972723.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72488774a8a2375ac7a6302cb896031b7cc284d9fa4c0e677a46f96175eb78eb.exe"C:\Users\Admin\AppData\Local\Temp\72488774a8a2375ac7a6302cb896031b7cc284d9fa4c0e677a46f96175eb78eb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAc7296.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAc7296.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr865441.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr865441.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku972723.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku972723.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4428
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406KB
MD567014ad4e132ae1a850fe09677e29f4d
SHA18f7adb20011b86eb4b62b9b5684cd6162ed5d645
SHA2564a5fb142ed811c48556db13a5f7892e29cadf885c67691fc751622bd785137d9
SHA5122f0e72baa72de7500863be394db97ed3241fce65343b0345374b89c49c4d7851674d6a5a62936f242ce4a3c213ce9f5154fd7a4583551638b152c13d347ba162
-
Filesize
11KB
MD50b391156cba12a67f7af2af41210d35a
SHA175dc0c40819f56b8af50e9a1937956daf513e1a5
SHA256e8e16da741c20d825acfbfa71f1e6ee94a869c2196325faebf5c6bbddef0c72e
SHA51238dc6b8f8fab5fec65fa0f843db2b0abad08e6921d48646162c72dc147b148b932913f58846214cb5de5df1309ee3218d4afb81038736186d154c1f346b9b3ea
-
Filesize
372KB
MD5adf6d607bb4061c5316163c72c6d9370
SHA16bc52066ab784c02437c98cdd654f4a1a108d40a
SHA256a0ac6ab52c2fb61b5e63f2a3db4042179ea5d5632c89963eef879644d81fe671
SHA512efd619575d9bc754b0fcf9d6aad80ceaaf434d728d53fdee555e3761c175c09dff89367c45a51ec62ec4bf0ae0e5cd9f40580ae004de20eb2a4a4acf8297cabe