Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43.exe
Resource
win10v2004-20241007-en
General
-
Target
0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43.exe
-
Size
530KB
-
MD5
a8725d27bf7b59a1ec0735209ff41f4b
-
SHA1
0841c8aea28949a2a60d46efb125ac40b2965015
-
SHA256
0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43
-
SHA512
ddc6ed6bea17856eafb14f247fe2a934524fcd97540066c7577525ef6d985b1e4a7a01c4f275ecf0ebbd131ae5c69b1c149988f44dda20b54719f437d13fd733
-
SSDEEP
12288:dMrky90n5a05+rd/0P9TpG111PV16jbfm:FygwR/0PdyvPV16jrm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr745615.exe healer behavioral1/memory/2448-15-0x0000000000800000-0x000000000080A000-memory.dmp healer -
Healer family
-
Processes:
jr745615.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr745615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr745615.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr745615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr745615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr745615.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr745615.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1664-22-0x00000000028C0000-0x0000000002906000-memory.dmp family_redline behavioral1/memory/1664-24-0x00000000053F0000-0x0000000005434000-memory.dmp family_redline behavioral1/memory/1664-36-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-40-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-88-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-86-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-84-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-82-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-80-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-76-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-74-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-72-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-70-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-68-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-66-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-64-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-62-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-60-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-56-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-54-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-52-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-50-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-48-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-46-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-44-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-42-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-38-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-34-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-32-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-30-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-78-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-58-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-28-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-26-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/1664-25-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziZd5182.exejr745615.exeku772156.exepid process 1784 ziZd5182.exe 2448 jr745615.exe 1664 ku772156.exe -
Processes:
jr745615.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr745615.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43.exeziZd5182.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziZd5182.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku772156.exe0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43.exeziZd5182.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku772156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziZd5182.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr745615.exepid process 2448 jr745615.exe 2448 jr745615.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr745615.exeku772156.exedescription pid process Token: SeDebugPrivilege 2448 jr745615.exe Token: SeDebugPrivilege 1664 ku772156.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43.exeziZd5182.exedescription pid process target process PID 3084 wrote to memory of 1784 3084 0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43.exe ziZd5182.exe PID 3084 wrote to memory of 1784 3084 0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43.exe ziZd5182.exe PID 3084 wrote to memory of 1784 3084 0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43.exe ziZd5182.exe PID 1784 wrote to memory of 2448 1784 ziZd5182.exe jr745615.exe PID 1784 wrote to memory of 2448 1784 ziZd5182.exe jr745615.exe PID 1784 wrote to memory of 1664 1784 ziZd5182.exe ku772156.exe PID 1784 wrote to memory of 1664 1784 ziZd5182.exe ku772156.exe PID 1784 wrote to memory of 1664 1784 ziZd5182.exe ku772156.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43.exe"C:\Users\Admin\AppData\Local\Temp\0df3b350b419160d759f577879e00417f1ca24198357d656883a1b88d1bc2a43.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZd5182.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZd5182.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr745615.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr745615.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku772156.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku772156.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1664
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD51b34f659beae4c8d5fd0ea7c698b855b
SHA151dfd69d7964bfae4d8410f7d8950c83b429394b
SHA2560a610ccdad72f12e255c38b471179ee8afa0ee0ae3233636bd1dcb37205a3ffe
SHA512217ba315d34469be6185b1b084ef1a33644ec166584281e27687a054ac13af77c605a0aad32db3df20bdfce632c90585b3f6418d46b4434312dafa82e7a535a9
-
Filesize
12KB
MD5cea9b9dbeb7b69e04cf011e72a75c2d1
SHA13d4163afb1c2ecac4a09c395d707621eeedcc286
SHA2560b9f4021e83d7da3c7506d28a1aaa8dce95728b6fd133b5565c9bd0e45636c89
SHA512b0131bde853576fcddaaac2a0de217e562e6fb0c3bd9f36bc8dff8b8c097b5a99341049eb4d3c9f65b5dea428ecc938762913c6d3f4004d4cd993f26564f2d53
-
Filesize
353KB
MD54e3fe03966ba5af9d13a2ea264b69d4b
SHA101a85e782a6637370cef3f016d5677edcd949200
SHA2560e93f0490f9ca7c77a8f2c3141fc7a1c38dcfdaabbb6e60514821572e9bac62d
SHA512d8545dc6a8ba13cad956cd55cb05f9f8a8252c2fe63fe3e6fc8e07c72992f008d1d63d8c92833908eda8989f70eaf93625bb40a3c847136eeb0f9a712113e9bc