Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427.exe
Resource
win10v2004-20241007-en
General
-
Target
125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427.exe
-
Size
530KB
-
MD5
aa6265ab3a4c6bbe4a7153f958913720
-
SHA1
95be1115daa9af2b35f95eec9060fd1e0faeb3f3
-
SHA256
125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427
-
SHA512
05ba3afc1fe3e587fb8738138bc09cf9f96a3043b11eab8c8c58cf2d1e1c0feb4e3c7b3d834558ae8699fb60a15f34202f10dc999e8e9781e3ad33697fd27bbd
-
SSDEEP
12288:2Mrsy90f6fbmoxaYEqXKqDuoFBiD/yLn5r1gVttS:+yMC9xaYdXK0zw2Zs8
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr245200.exe healer behavioral1/memory/2084-15-0x0000000000CE0000-0x0000000000CEA000-memory.dmp healer -
Healer family
-
Processes:
jr245200.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr245200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr245200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr245200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr245200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr245200.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr245200.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3192-22-0x00000000028C0000-0x0000000002906000-memory.dmp family_redline behavioral1/memory/3192-24-0x0000000004E00000-0x0000000004E44000-memory.dmp family_redline behavioral1/memory/3192-34-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-30-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-28-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-26-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-25-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-52-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-88-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-86-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-84-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-83-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-80-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-79-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-76-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-74-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-72-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-70-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-68-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-66-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-64-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-62-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-58-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-56-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-54-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-50-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-49-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-46-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-44-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-42-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-40-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-38-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-36-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-32-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline behavioral1/memory/3192-60-0x0000000004E00000-0x0000000004E3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziHF5339.exejr245200.exeku415734.exepid process 3920 ziHF5339.exe 2084 jr245200.exe 3192 ku415734.exe -
Processes:
jr245200.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr245200.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427.exeziHF5339.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziHF5339.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427.exeziHF5339.exeku415734.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziHF5339.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku415734.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr245200.exepid process 2084 jr245200.exe 2084 jr245200.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr245200.exeku415734.exedescription pid process Token: SeDebugPrivilege 2084 jr245200.exe Token: SeDebugPrivilege 3192 ku415734.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427.exeziHF5339.exedescription pid process target process PID 1712 wrote to memory of 3920 1712 125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427.exe ziHF5339.exe PID 1712 wrote to memory of 3920 1712 125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427.exe ziHF5339.exe PID 1712 wrote to memory of 3920 1712 125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427.exe ziHF5339.exe PID 3920 wrote to memory of 2084 3920 ziHF5339.exe jr245200.exe PID 3920 wrote to memory of 2084 3920 ziHF5339.exe jr245200.exe PID 3920 wrote to memory of 3192 3920 ziHF5339.exe ku415734.exe PID 3920 wrote to memory of 3192 3920 ziHF5339.exe ku415734.exe PID 3920 wrote to memory of 3192 3920 ziHF5339.exe ku415734.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427.exe"C:\Users\Admin\AppData\Local\Temp\125933754ec383d27f61edbd46a2a46c5906fabb681416e29f01beae3d72f427.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHF5339.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHF5339.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr245200.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr245200.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku415734.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku415734.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3192
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5e05dcf24e4716c52be43d60525032cdf
SHA12ab068e5f9af0cdedf84d8807e5f39a6af7c4f9e
SHA256934dd40c66db8735450d34f06daebf3361f533c857083193e86d427d34a3702e
SHA512ea1e310ccb849bb8042e0e247eee2e4e84e0b7bc2073fa03c4224fc131e0f1f051de5e1d7f7f4a76dab4eedb28273b5ffb48f3cc466e44e5db4d2ec3551c4dd2
-
Filesize
12KB
MD59c36ad66a89ba21a17305b1e7908955a
SHA1f69d054c52c13b20e4b165aeb5d88a28d4ad565a
SHA256f9c80c97f2fc5d4a942e552d652b3c8412f31d74da3e6cd7febb1681971bbe64
SHA5125c88c1adc8c5a865476b4511db408fb814dab3d023f26d60512aa874de11728a0bdb798a5ecaf18551d2f4fc127ea6684de7f127597baaa95b5f5e2fa4ee033e
-
Filesize
434KB
MD5de2911f9dc3086ffc3b461792f5d23e9
SHA1bc8fa3cc0dc5fbe6d45fed63f7b4c422ec640aed
SHA25655d42d04eeee30b4e2fbb2bafddc46e8c3d935734d37215f32e966a0ed60bde1
SHA512fb1b00521650a9fbb4a5dc41bec6d50665c776166daea3b8605fdadb7c6c46687992b066e1e83d277b5204cb334a1f7abc16c5fb5dc0b336be98ab2335f2cd64