Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
fc8c2f09cf780c1bf2e3945e906f78201ab3d18c80cb4391e02359e437022f6b.exe
Resource
win10v2004-20241007-en
General
-
Target
fc8c2f09cf780c1bf2e3945e906f78201ab3d18c80cb4391e02359e437022f6b.exe
-
Size
537KB
-
MD5
fb4897077c6881a78a0c6a0c5b24cb60
-
SHA1
22f0816f4a4529b035b2030a358d4455705d1a2e
-
SHA256
fc8c2f09cf780c1bf2e3945e906f78201ab3d18c80cb4391e02359e437022f6b
-
SHA512
0132be3c76ccab3e5117a52dadf44fcaa914968df0025b4c90d5e7fc3799180e0158d0af5ed392fd958c028bb7f22332dcdb359256e13f037572df6064ef3265
-
SSDEEP
12288:BMrMy90rprvNCXvNsepFUkDHSwCu53/C6/BA:xyqzsXvuepFlywCu53/5pA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr479156.exe healer behavioral1/memory/1160-15-0x0000000000AF0000-0x0000000000AFA000-memory.dmp healer -
Healer family
-
Processes:
jr479156.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr479156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr479156.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr479156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr479156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr479156.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr479156.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1524-22-0x00000000027B0000-0x00000000027F6000-memory.dmp family_redline behavioral1/memory/1524-24-0x00000000028A0000-0x00000000028E4000-memory.dmp family_redline behavioral1/memory/1524-46-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-68-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-88-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-86-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-84-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-82-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-80-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-78-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-76-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-74-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-72-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-70-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-66-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-64-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-62-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-60-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-58-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-56-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-54-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-52-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-50-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-48-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-44-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-42-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-38-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-36-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-34-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-32-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-40-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-30-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-28-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-26-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/1524-25-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zidg8455.exejr479156.exeku392368.exepid process 3920 zidg8455.exe 1160 jr479156.exe 1524 ku392368.exe -
Processes:
jr479156.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr479156.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fc8c2f09cf780c1bf2e3945e906f78201ab3d18c80cb4391e02359e437022f6b.exezidg8455.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fc8c2f09cf780c1bf2e3945e906f78201ab3d18c80cb4391e02359e437022f6b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidg8455.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fc8c2f09cf780c1bf2e3945e906f78201ab3d18c80cb4391e02359e437022f6b.exezidg8455.exeku392368.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc8c2f09cf780c1bf2e3945e906f78201ab3d18c80cb4391e02359e437022f6b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zidg8455.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku392368.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr479156.exepid process 1160 jr479156.exe 1160 jr479156.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr479156.exeku392368.exedescription pid process Token: SeDebugPrivilege 1160 jr479156.exe Token: SeDebugPrivilege 1524 ku392368.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fc8c2f09cf780c1bf2e3945e906f78201ab3d18c80cb4391e02359e437022f6b.exezidg8455.exedescription pid process target process PID 4516 wrote to memory of 3920 4516 fc8c2f09cf780c1bf2e3945e906f78201ab3d18c80cb4391e02359e437022f6b.exe zidg8455.exe PID 4516 wrote to memory of 3920 4516 fc8c2f09cf780c1bf2e3945e906f78201ab3d18c80cb4391e02359e437022f6b.exe zidg8455.exe PID 4516 wrote to memory of 3920 4516 fc8c2f09cf780c1bf2e3945e906f78201ab3d18c80cb4391e02359e437022f6b.exe zidg8455.exe PID 3920 wrote to memory of 1160 3920 zidg8455.exe jr479156.exe PID 3920 wrote to memory of 1160 3920 zidg8455.exe jr479156.exe PID 3920 wrote to memory of 1524 3920 zidg8455.exe ku392368.exe PID 3920 wrote to memory of 1524 3920 zidg8455.exe ku392368.exe PID 3920 wrote to memory of 1524 3920 zidg8455.exe ku392368.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc8c2f09cf780c1bf2e3945e906f78201ab3d18c80cb4391e02359e437022f6b.exe"C:\Users\Admin\AppData\Local\Temp\fc8c2f09cf780c1bf2e3945e906f78201ab3d18c80cb4391e02359e437022f6b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidg8455.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidg8455.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr479156.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr479156.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku392368.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku392368.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD521ed967adaa95aeb231f9c7c72cf5d7e
SHA1c34db32af142c128c56003674c0050bd3b06d8d7
SHA25629bf93c8fcca3a1d079a926a6bf618925ebd6868985cd7718cdbc2c0ae7edac1
SHA512e84b224c728fdbf1825a3cbb842d91de97213552ca15ecaafd6c85866ea1cb604b9d894bc5d01731709ccbbf9e60b717cd6b02adc2bce397ae6e5d1fdc16fe5e
-
Filesize
13KB
MD531b27ebe55181fcce72054cf621f0915
SHA147453079e0859a591ec2d3892780e9a7fc093600
SHA256ac2598b15cd51f577522aec244c128762ff0033f6d3494cc15870f036bbc1604
SHA51270dc7ef2808a8beb0ec9b720e6313c6b7eae16e04cde2f7b334d3c68c33d8e5c42c7504a3393aa74fe95a53ad368fc8377ee9c47df2813e9012cc5648bf35cf1
-
Filesize
352KB
MD5b7b0dbe43794580ef57dc219f4002482
SHA137858eca79e84d50d3035fb57f15ac4de621eb48
SHA2562006613ef9e6cf95640e0715cc33be31176883541875a55ff8c0d2d4e2b727c8
SHA512a02af811889de315838b7e368c768db9e873239fee064851f70179aa3c2d87d0dad1839746bf0c0fb8c1291c29ca4310e661125cf908bca6563b98247cb6ca39