Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:49
Static task
static1
Behavioral task
behavioral1
Sample
7f49b52ec48e7599fcf3262ccc66444d6282994e21687f91b1c32a02f2bb89bf.exe
Resource
win10v2004-20241007-en
General
-
Target
7f49b52ec48e7599fcf3262ccc66444d6282994e21687f91b1c32a02f2bb89bf.exe
-
Size
529KB
-
MD5
1c8ada3844ddcb3657bd93ab0635d082
-
SHA1
4293c8e73890c9e548051d7d4b04da6a291189cc
-
SHA256
7f49b52ec48e7599fcf3262ccc66444d6282994e21687f91b1c32a02f2bb89bf
-
SHA512
a829f425874e3d0e67d9276edc7b1282142c80ef46bc4a33b6cd442a90ba5dd3bbc24fc7a17d853e6490f2524fa545b96c60462ad335c42a31a61644c6fc13e1
-
SSDEEP
12288:DMrry90id4FmUyGf9+UhxLlVs5vE85xoQyfBiTZfH:QyXd4MmhxL7s5vE8Tum9H
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr161534.exe healer behavioral1/memory/2484-15-0x0000000000AD0000-0x0000000000ADA000-memory.dmp healer -
Healer family
-
Processes:
jr161534.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr161534.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr161534.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr161534.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr161534.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr161534.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr161534.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/988-22-0x0000000004DA0000-0x0000000004DE6000-memory.dmp family_redline behavioral1/memory/988-24-0x00000000071D0000-0x0000000007214000-memory.dmp family_redline behavioral1/memory/988-30-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-40-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-88-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-86-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-84-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-80-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-78-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-77-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-74-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-72-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-70-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-68-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-66-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-62-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-60-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-59-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-56-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-54-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-52-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-50-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-48-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-46-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-44-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-38-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-36-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-34-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-32-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-82-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-64-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-42-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-28-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-26-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline behavioral1/memory/988-25-0x00000000071D0000-0x000000000720F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zivG9391.exejr161534.exeku944475.exepid process 1592 zivG9391.exe 2484 jr161534.exe 988 ku944475.exe -
Processes:
jr161534.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr161534.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7f49b52ec48e7599fcf3262ccc66444d6282994e21687f91b1c32a02f2bb89bf.exezivG9391.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7f49b52ec48e7599fcf3262ccc66444d6282994e21687f91b1c32a02f2bb89bf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zivG9391.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2696 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7f49b52ec48e7599fcf3262ccc66444d6282994e21687f91b1c32a02f2bb89bf.exezivG9391.exeku944475.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f49b52ec48e7599fcf3262ccc66444d6282994e21687f91b1c32a02f2bb89bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zivG9391.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku944475.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr161534.exepid process 2484 jr161534.exe 2484 jr161534.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr161534.exeku944475.exedescription pid process Token: SeDebugPrivilege 2484 jr161534.exe Token: SeDebugPrivilege 988 ku944475.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
7f49b52ec48e7599fcf3262ccc66444d6282994e21687f91b1c32a02f2bb89bf.exezivG9391.exedescription pid process target process PID 884 wrote to memory of 1592 884 7f49b52ec48e7599fcf3262ccc66444d6282994e21687f91b1c32a02f2bb89bf.exe zivG9391.exe PID 884 wrote to memory of 1592 884 7f49b52ec48e7599fcf3262ccc66444d6282994e21687f91b1c32a02f2bb89bf.exe zivG9391.exe PID 884 wrote to memory of 1592 884 7f49b52ec48e7599fcf3262ccc66444d6282994e21687f91b1c32a02f2bb89bf.exe zivG9391.exe PID 1592 wrote to memory of 2484 1592 zivG9391.exe jr161534.exe PID 1592 wrote to memory of 2484 1592 zivG9391.exe jr161534.exe PID 1592 wrote to memory of 988 1592 zivG9391.exe ku944475.exe PID 1592 wrote to memory of 988 1592 zivG9391.exe ku944475.exe PID 1592 wrote to memory of 988 1592 zivG9391.exe ku944475.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f49b52ec48e7599fcf3262ccc66444d6282994e21687f91b1c32a02f2bb89bf.exe"C:\Users\Admin\AppData\Local\Temp\7f49b52ec48e7599fcf3262ccc66444d6282994e21687f91b1c32a02f2bb89bf.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivG9391.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zivG9391.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr161534.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr161534.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku944475.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku944475.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:988
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2696
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD518fb4526eb9a24f41ae06fff847e96e7
SHA145717d55dc233c261412a9ac2800b76e31ddb038
SHA25622d784cf89f6639ab90a56a6decbc6f42cb394db5ca73a667beb7878bee58b38
SHA51288033532747efc5c35ff66cc72771d795ba3444680bffc6249715d11412c1e9c84897741b78158d8660acac1947dc4305a5441ffef5a975822980a04437bc79a
-
Filesize
11KB
MD54b19e2b183af99788f81179d61bbd287
SHA1eb3d2d48c3bb704c2f469a76af2867b4aaaec660
SHA2567170e37b5077c1b6e099a45f301268e4c2c3dc0d901466528e1ecb8eec111880
SHA5123b3637af9561901244f60bb80bf45fba4360f1e32a9804493e310a8c04bb97ad94e2f90723964cea8e6d4cf2ddb364f9c5ee754795a19c584ff5d371e16b5b46
-
Filesize
354KB
MD50292c55dad880cc1da46618f8409d0cb
SHA1ca78d10b3d38369769c5ff825e35c2b2384175fa
SHA25658480ea73e2c6b75d34656492635825daf7c62df35a045f5aeb86daf4c961ea9
SHA512c238007fd55db9fc4d514217bd996ab1c73342b8f8aa53667ce455e9bac012a7fb0c54627024bce5b06748360c5e04fb5b79233dfe4275a08a40b8f9816f4adb