Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
d551a611f8cb6a99b8cc1e1b847d866553fd53df06e2ece61adb34f0552fb895.exe
Resource
win10v2004-20241007-en
General
-
Target
d551a611f8cb6a99b8cc1e1b847d866553fd53df06e2ece61adb34f0552fb895.exe
-
Size
521KB
-
MD5
05a2f0bbf359f335802c098328ee8e11
-
SHA1
d125f3c160348448d77ee4b60665f2fe70f10e97
-
SHA256
d551a611f8cb6a99b8cc1e1b847d866553fd53df06e2ece61adb34f0552fb895
-
SHA512
79357ebe8bf51d8ab6df6cbad83923ae5bb24cf7c5177ff5a9bdc67cf9324d5b082ea592934f15da78358efde7baab5fc071362dbc6d5d925de80a7530e95f8a
-
SSDEEP
12288:/Mrpy90Ci99RG4Nl9Is5FEqUugUO4HVIYHd+T:qyu04N8iFEhuHOuP9A
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr707415.exe healer behavioral1/memory/4472-15-0x0000000000DD0000-0x0000000000DDA000-memory.dmp healer -
Healer family
-
Processes:
jr707415.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr707415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr707415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr707415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr707415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr707415.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr707415.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2800-21-0x00000000024C0000-0x0000000002506000-memory.dmp family_redline behavioral1/memory/2800-23-0x0000000005060000-0x00000000050A4000-memory.dmp family_redline behavioral1/memory/2800-27-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-55-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-87-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-85-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-83-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-81-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-79-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-77-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-75-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-73-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-71-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-69-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-67-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-65-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-63-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-61-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-59-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-58-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-53-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-51-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-49-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-47-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-45-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-43-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-41-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-37-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-35-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-33-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-31-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-29-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-39-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-25-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/2800-24-0x0000000005060000-0x000000000509F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziJF0340.exejr707415.exeku260918.exepid process 2144 ziJF0340.exe 4472 jr707415.exe 2800 ku260918.exe -
Processes:
jr707415.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr707415.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d551a611f8cb6a99b8cc1e1b847d866553fd53df06e2ece61adb34f0552fb895.exeziJF0340.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d551a611f8cb6a99b8cc1e1b847d866553fd53df06e2ece61adb34f0552fb895.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziJF0340.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d551a611f8cb6a99b8cc1e1b847d866553fd53df06e2ece61adb34f0552fb895.exeziJF0340.exeku260918.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d551a611f8cb6a99b8cc1e1b847d866553fd53df06e2ece61adb34f0552fb895.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziJF0340.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku260918.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr707415.exepid process 4472 jr707415.exe 4472 jr707415.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr707415.exeku260918.exedescription pid process Token: SeDebugPrivilege 4472 jr707415.exe Token: SeDebugPrivilege 2800 ku260918.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d551a611f8cb6a99b8cc1e1b847d866553fd53df06e2ece61adb34f0552fb895.exeziJF0340.exedescription pid process target process PID 2508 wrote to memory of 2144 2508 d551a611f8cb6a99b8cc1e1b847d866553fd53df06e2ece61adb34f0552fb895.exe ziJF0340.exe PID 2508 wrote to memory of 2144 2508 d551a611f8cb6a99b8cc1e1b847d866553fd53df06e2ece61adb34f0552fb895.exe ziJF0340.exe PID 2508 wrote to memory of 2144 2508 d551a611f8cb6a99b8cc1e1b847d866553fd53df06e2ece61adb34f0552fb895.exe ziJF0340.exe PID 2144 wrote to memory of 4472 2144 ziJF0340.exe jr707415.exe PID 2144 wrote to memory of 4472 2144 ziJF0340.exe jr707415.exe PID 2144 wrote to memory of 2800 2144 ziJF0340.exe ku260918.exe PID 2144 wrote to memory of 2800 2144 ziJF0340.exe ku260918.exe PID 2144 wrote to memory of 2800 2144 ziJF0340.exe ku260918.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d551a611f8cb6a99b8cc1e1b847d866553fd53df06e2ece61adb34f0552fb895.exe"C:\Users\Admin\AppData\Local\Temp\d551a611f8cb6a99b8cc1e1b847d866553fd53df06e2ece61adb34f0552fb895.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJF0340.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJF0340.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr707415.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr707415.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku260918.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku260918.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2800
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
379KB
MD5a4b0cb7c24aa603c4879ede307013604
SHA12df338172c033e552c75a1e729d006408d1aafc9
SHA256cca0473798195491b11816441402934c7e2195769a89be0cfdbb12dbb6b8aa2b
SHA5121fd70c0e5b403276f033a1b9f605ba6cf61bf2401c0eef1dc7ce7cc8914c9eeac4fbc56f1dfb0fcc7a23950ed06fd05b5a11563c256f2e7e290d0ec6bc53a667
-
Filesize
15KB
MD5fb1ec127406d7859d6201552a71adcf2
SHA1ede86ea4116e245dd031eaa57e7bde594d043234
SHA256f0b1bc37ca380f6cd809f05f931c02bd8f3b3efece0f4f09de811f21d565e74d
SHA5125435040694ef075b7777fa4e59811721bd618fb9682416dc823452114ea7faae22dd6e429d3afd2df82ae934e7314f7b4e303a07306764e5e41d71f4c4d6970c
-
Filesize
294KB
MD5fdb733859c54730b2a5a19977f9a1ddc
SHA139a05c347eabe962d5a75aaaf3c29c12aa0be367
SHA2565005dc725745f7ccef35ec71303984386a46103765e4ebef92fd29f7411a3fde
SHA512548037fa8b74d5b41d17c38c797759765a6df53157c0e54fd62d6ef4e54f3f0b35fac798f1861f313a899bb5f30674743bb0c2492f623604c11a3ab969925f5a