Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
5d8fb7817b30d27573d4497a2058dad2bd9c37d6bba498ca66a52959fd903a8e.exe
Resource
win10v2004-20241007-en
General
-
Target
5d8fb7817b30d27573d4497a2058dad2bd9c37d6bba498ca66a52959fd903a8e.exe
-
Size
537KB
-
MD5
dc899e963fe4fa286096d4f75de293e9
-
SHA1
40e35207c77f4928a22e619676c37aedad5cf453
-
SHA256
5d8fb7817b30d27573d4497a2058dad2bd9c37d6bba498ca66a52959fd903a8e
-
SHA512
5563067549e836e143831c9deb328ee0e40fe0afb3c4c21d4ec6536c9cb45a7947b50453e76c0f01ec6b33120ce30c572055d6a9530ce1ba4d3f39bc4d3c6da5
-
SSDEEP
12288:UMrPy90afJx9dOnMlreGUE0HOw1qNidBl4diE:zyHfzDOM1eGguwMMdv4diE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr054841.exe healer behavioral1/memory/2832-15-0x0000000000640000-0x000000000064A000-memory.dmp healer -
Healer family
-
Processes:
jr054841.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr054841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr054841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr054841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr054841.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr054841.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr054841.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3012-22-0x0000000002760000-0x00000000027A6000-memory.dmp family_redline behavioral1/memory/3012-24-0x0000000004E50000-0x0000000004E94000-memory.dmp family_redline behavioral1/memory/3012-30-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-36-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-88-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-84-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-82-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-81-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-78-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-76-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-74-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-72-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-70-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-68-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-66-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-64-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-62-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-58-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-56-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-54-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-52-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-50-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-48-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-46-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-44-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-40-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-38-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-34-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-32-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-86-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-60-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-42-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-28-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-26-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/3012-25-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziYj8518.exejr054841.exeku147859.exepid process 4904 ziYj8518.exe 2832 jr054841.exe 3012 ku147859.exe -
Processes:
jr054841.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr054841.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5d8fb7817b30d27573d4497a2058dad2bd9c37d6bba498ca66a52959fd903a8e.exeziYj8518.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5d8fb7817b30d27573d4497a2058dad2bd9c37d6bba498ca66a52959fd903a8e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYj8518.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku147859.exe5d8fb7817b30d27573d4497a2058dad2bd9c37d6bba498ca66a52959fd903a8e.exeziYj8518.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku147859.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d8fb7817b30d27573d4497a2058dad2bd9c37d6bba498ca66a52959fd903a8e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziYj8518.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr054841.exepid process 2832 jr054841.exe 2832 jr054841.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr054841.exeku147859.exedescription pid process Token: SeDebugPrivilege 2832 jr054841.exe Token: SeDebugPrivilege 3012 ku147859.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5d8fb7817b30d27573d4497a2058dad2bd9c37d6bba498ca66a52959fd903a8e.exeziYj8518.exedescription pid process target process PID 4120 wrote to memory of 4904 4120 5d8fb7817b30d27573d4497a2058dad2bd9c37d6bba498ca66a52959fd903a8e.exe ziYj8518.exe PID 4120 wrote to memory of 4904 4120 5d8fb7817b30d27573d4497a2058dad2bd9c37d6bba498ca66a52959fd903a8e.exe ziYj8518.exe PID 4120 wrote to memory of 4904 4120 5d8fb7817b30d27573d4497a2058dad2bd9c37d6bba498ca66a52959fd903a8e.exe ziYj8518.exe PID 4904 wrote to memory of 2832 4904 ziYj8518.exe jr054841.exe PID 4904 wrote to memory of 2832 4904 ziYj8518.exe jr054841.exe PID 4904 wrote to memory of 3012 4904 ziYj8518.exe ku147859.exe PID 4904 wrote to memory of 3012 4904 ziYj8518.exe ku147859.exe PID 4904 wrote to memory of 3012 4904 ziYj8518.exe ku147859.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d8fb7817b30d27573d4497a2058dad2bd9c37d6bba498ca66a52959fd903a8e.exe"C:\Users\Admin\AppData\Local\Temp\5d8fb7817b30d27573d4497a2058dad2bd9c37d6bba498ca66a52959fd903a8e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYj8518.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYj8518.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr054841.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr054841.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku147859.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku147859.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3012
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5b88a77f33e4d2f0456d38c9d9f37297e
SHA108953f2045abdf8ea7fe15eadead6fd93804d38e
SHA25615b18f8ea34c4aeb46970924cec83330de7dd0d9ea0bbb375a2823888152202a
SHA51256189f4dbd094c80c01c62a8cb8280f3cbdac54e7bc2802fbc8724d15dcb4e96b8d231d36df8608ce1f04c0e35d422a4828a5900cc39dd2482b5dca11038a1fd
-
Filesize
14KB
MD51903e8400e2d9db24231896eaac28e75
SHA19b9f6bc019ec83e75056af73a9f4939e586224f4
SHA2567b08e126acfc0a9cb5c505fa7df3debc35c99de2ab0074359f08153385be07ab
SHA5125ff4f2a3800183956c44b9e19663d8ef50a9abb64d7560e0dcf68100dfede3a5fb77e842500a12ffe6890313548accfbff6b3caa43ca53a99fb9f77ebe4f7f14
-
Filesize
352KB
MD55966bebd19e4a4783cbe417872fc3fda
SHA138db3310cd1ddd04b6b00420a48672f31dbd67d8
SHA256d57acb3bc2c0ffe322e0e4c353034d5dc22a7d35cf90219ecdd46d6f4c37e454
SHA51268e19d57d3bbde01574ecc1ac858eb40dc573b87be4614e172783e01922de5710285b0687867d74d18a43c1a628b441f410792a6dd2b0542dbf1667b65fba808