Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:41
Static task
static1
Behavioral task
behavioral1
Sample
c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exe
Resource
win10v2004-20241007-en
General
-
Target
c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exe
-
Size
530KB
-
MD5
e855686c0d686a35634ed481775ac171
-
SHA1
9a1748ed972e0557e4a12bfb2e681ad81a385963
-
SHA256
c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f
-
SHA512
3bcca81370034abdbfa83162d933033c52f38b40b061e339f8e5ebbf21370f9c85f9c4a4c72dd019846b755bc4c1332abd87114fd4aaa39d0cde142c9c67ecba
-
SSDEEP
12288:9Mrcy901Ci4I5kwbzPqhtzDeqOR1qwAEY7V2y:1ytiQSq9JOR1frY70y
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr037102.exe healer behavioral1/memory/4384-15-0x00000000006D0000-0x00000000006DA000-memory.dmp healer -
Healer family
-
Processes:
jr037102.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr037102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr037102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr037102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr037102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr037102.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr037102.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 36 IoCs
Processes:
resource yara_rule behavioral1/memory/1772-22-0x0000000004D50000-0x0000000004D96000-memory.dmp family_redline behavioral1/memory/1772-24-0x0000000004E10000-0x0000000004E54000-memory.dmp family_redline behavioral1/memory/1772-29-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-60-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-88-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-86-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-84-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-82-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-80-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-78-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-76-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-74-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-68-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-66-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-64-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-63-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-58-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-56-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-54-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-50-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-48-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-46-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-44-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-42-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-40-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-38-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-36-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-34-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-32-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-30-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-28-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-72-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-71-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-52-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-26-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/1772-25-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziPn4154.exejr037102.exeku024835.exepid process 3524 ziPn4154.exe 4384 jr037102.exe 1772 ku024835.exe -
Processes:
jr037102.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr037102.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exeziPn4154.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziPn4154.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5552 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exeziPn4154.exeku024835.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziPn4154.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku024835.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr037102.exepid process 4384 jr037102.exe 4384 jr037102.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr037102.exeku024835.exedescription pid process Token: SeDebugPrivilege 4384 jr037102.exe Token: SeDebugPrivilege 1772 ku024835.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exeziPn4154.exedescription pid process target process PID 1304 wrote to memory of 3524 1304 c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exe ziPn4154.exe PID 1304 wrote to memory of 3524 1304 c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exe ziPn4154.exe PID 1304 wrote to memory of 3524 1304 c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exe ziPn4154.exe PID 3524 wrote to memory of 4384 3524 ziPn4154.exe jr037102.exe PID 3524 wrote to memory of 4384 3524 ziPn4154.exe jr037102.exe PID 3524 wrote to memory of 1772 3524 ziPn4154.exe ku024835.exe PID 3524 wrote to memory of 1772 3524 ziPn4154.exe ku024835.exe PID 3524 wrote to memory of 1772 3524 ziPn4154.exe ku024835.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exe"C:\Users\Admin\AppData\Local\Temp\c945e5621cee7c651a6a75e35a1fe2d7c5da810ee3ae8c7a414dcacfeb8d910f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPn4154.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPn4154.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr037102.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr037102.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku024835.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku024835.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5552
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD5d3f83fb9d107a9c11810ed52d744831b
SHA18418ed296d56d8658b867ba6614ef3b1b801925b
SHA2562e29f517a030a26c5ed660757543640574f5dce47e4badb2f9187e2cdf460f47
SHA5126cf43d4f75f347dbe1f963702e5444348230583fed65e5c4b6aa34e863718825b9eb799c4a0dafc7c26e9ffedf75bb47d16e89acab7995b886b429515438484a
-
Filesize
12KB
MD563c36985ee4b73ccfd2ceef851e42ed7
SHA1177cbabc3ddf183ca9a7dc8da971622b33320c7f
SHA25688772b757d61396fddc9bfdb4fb7c5978c5868134caa46e226e0a2fb7eba494b
SHA512cb7dd2769e239722c7a13d8e47382215c89f8b16f0e6185092b489271d1528ddab3ff4b0c0630dd6e109502249d2dbcc515853d6db6152407f4a2add80482f58
-
Filesize
353KB
MD52c7bdbae0f3efd39570c224004f4670c
SHA18b96a3e6e116e2040d05a995dc3d3f1d75816747
SHA2561b485808228a5468f8dee744698213eaa97e148abb5cdffd03203d7487840e0a
SHA5120f91a2ff59ef9318042cc9dedaa24cc84711a1d1d0e8dab0863a37e7587fb447c60d0a5bb485f96a790c4c5fb8851938dc4252059acdc95cbf4bfcbc06f07675