Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 21:21
Static task
static1
Behavioral task
behavioral1
Sample
e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c.exe
Resource
win10v2004-20241007-en
General
-
Target
e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c.exe
-
Size
522KB
-
MD5
1c1b97e3fc4ebc7d8ceb6f0a5123de20
-
SHA1
97e35ba7f1a99b062f9abfc3877193a81e283bba
-
SHA256
e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c
-
SHA512
a5da1dc88dba0cc2a6be977e9292c359752bd9811a1719f926044671f345de56ed8ffc4106dea2dc18dbd9b1d6b3141cd689128861a0c6a7d918f7685fcaeb74
-
SSDEEP
12288:2Mrwy90Fg++ICy8M7RGMF7OtFqJtvU5JNJsGzYTcYY:2yF+7CWR9F7uEtvIJsGzYcF
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr143656.exe healer behavioral1/memory/1632-15-0x0000000000800000-0x000000000080A000-memory.dmp healer -
Healer family
-
Processes:
jr143656.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr143656.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr143656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr143656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr143656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr143656.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr143656.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3188-22-0x0000000002430000-0x0000000002476000-memory.dmp family_redline behavioral1/memory/3188-24-0x0000000004AA0000-0x0000000004AE4000-memory.dmp family_redline behavioral1/memory/3188-28-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-34-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-88-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-86-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-84-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-80-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-78-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-76-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-74-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-72-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-70-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-68-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-66-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-64-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-62-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-60-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-58-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-56-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-52-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-50-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-48-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-46-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-44-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-42-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-40-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-38-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-36-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-32-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-30-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-82-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-54-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-26-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3188-25-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zirR8295.exejr143656.exeku181427.exepid process 2172 zirR8295.exe 1632 jr143656.exe 3188 ku181427.exe -
Processes:
jr143656.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr143656.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c.exezirR8295.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zirR8295.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
zirR8295.exeku181427.exee473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zirR8295.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku181427.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr143656.exepid process 1632 jr143656.exe 1632 jr143656.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr143656.exeku181427.exedescription pid process Token: SeDebugPrivilege 1632 jr143656.exe Token: SeDebugPrivilege 3188 ku181427.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c.exezirR8295.exedescription pid process target process PID 2876 wrote to memory of 2172 2876 e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c.exe zirR8295.exe PID 2876 wrote to memory of 2172 2876 e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c.exe zirR8295.exe PID 2876 wrote to memory of 2172 2876 e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c.exe zirR8295.exe PID 2172 wrote to memory of 1632 2172 zirR8295.exe jr143656.exe PID 2172 wrote to memory of 1632 2172 zirR8295.exe jr143656.exe PID 2172 wrote to memory of 3188 2172 zirR8295.exe ku181427.exe PID 2172 wrote to memory of 3188 2172 zirR8295.exe ku181427.exe PID 2172 wrote to memory of 3188 2172 zirR8295.exe ku181427.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c.exe"C:\Users\Admin\AppData\Local\Temp\e473e39e9b1a701150bc531c8343a891deb5ec97e10c9181ced7b2946777cd6c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirR8295.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirR8295.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr143656.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr143656.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku181427.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku181427.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3188
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
379KB
MD5c98d4fb86e16871a0747bc15bea463ea
SHA1ba2fe5d66ba7aed0dca6f22735375b24ca8c022b
SHA25619e9a1cb57a7531535ca7868cfe62236a0837bb1fc4c26d81eba28ef6d9f2e32
SHA51222cd6529cba4c3a626df2814cc634eb228a5bc2261a2dfea8bfc690596f3f0449a38fdc0faeabe3b11ac6053e2c7930a30d84e05b07c6426a18e05c566880011
-
Filesize
11KB
MD562333705c6e94740ed1ea6373b5d044d
SHA105e1892ad2bf472902b3a5491781c19fdbbd8177
SHA256d41e4af4a3e4f45c734298ebe777ead8dcadfd1fb18717b3251117bbd5dafd47
SHA512e21d711a22edf987c6ffe04fba89aa3a1d6d18aec4a8e12db8724627ba9e6ca3cfb5ffed3f552523039785fecab8ac3235d5f1acc97f0b64b7cbbd0c946b747e
-
Filesize
294KB
MD570aadd4b26bd2bfe5e36a15436c10e81
SHA13533970f0765bf5309dc801f7bea01417ccfadab
SHA25653cf8cf0b6c9a07e93d4ce0eaa5ea6e2cad342b515453eed49d8412e319e996f
SHA5122048cd9905938029a8a3f0e590b2d79df9f4bdc58d26824d40b2dc0da7ddb658bd9a9bdd080e6112e6d07f3bf136cd9dea4db290be95ecca214385b09a17e1cd