Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:49
Static task
static1
Behavioral task
behavioral1
Sample
6434494ffa021f4270781656f2018d1c968a7eb2a4a10cc1c83f9f6fb5d03ccb.exe
Resource
win10v2004-20241007-en
General
-
Target
6434494ffa021f4270781656f2018d1c968a7eb2a4a10cc1c83f9f6fb5d03ccb.exe
-
Size
560KB
-
MD5
f6463500c931f2765870efcbad1be8d6
-
SHA1
cf8cf362813923b16a2a6b6cbd0af97ac2519f55
-
SHA256
6434494ffa021f4270781656f2018d1c968a7eb2a4a10cc1c83f9f6fb5d03ccb
-
SHA512
c1fc4b09255c0281baffa84bc874d806590bf1b82f28ac1aaa754de5e5bb6dd15f587f59c7514d3e35ef9c6c60c7748dc65167071b97da52f2613cc2e8b257f3
-
SSDEEP
12288:hMrGy90BaVSCInfWNCfkoXPMFZwHY92yoSBLDfUl:Dy5InfIVgEMJyBnfUl
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr597555.exe healer behavioral1/memory/1768-15-0x00000000002E0000-0x00000000002EA000-memory.dmp healer -
Healer family
-
Processes:
jr597555.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr597555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr597555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr597555.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr597555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr597555.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr597555.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4872-22-0x00000000023F0000-0x0000000002436000-memory.dmp family_redline behavioral1/memory/4872-24-0x00000000029D0000-0x0000000002A14000-memory.dmp family_redline behavioral1/memory/4872-70-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-80-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-88-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-84-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-82-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-78-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-76-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-74-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-72-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-68-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-66-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-64-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-63-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-60-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-58-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-56-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-54-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-52-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-50-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-46-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-44-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-42-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-40-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-38-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-36-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-34-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-32-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-30-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-86-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-48-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-28-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-26-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline behavioral1/memory/4872-25-0x00000000029D0000-0x0000000002A0F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziwJ3613.exejr597555.exeku536235.exepid process 2348 ziwJ3613.exe 1768 jr597555.exe 4872 ku536235.exe -
Processes:
jr597555.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr597555.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziwJ3613.exe6434494ffa021f4270781656f2018d1c968a7eb2a4a10cc1c83f9f6fb5d03ccb.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziwJ3613.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6434494ffa021f4270781656f2018d1c968a7eb2a4a10cc1c83f9f6fb5d03ccb.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2616 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6434494ffa021f4270781656f2018d1c968a7eb2a4a10cc1c83f9f6fb5d03ccb.exeziwJ3613.exeku536235.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6434494ffa021f4270781656f2018d1c968a7eb2a4a10cc1c83f9f6fb5d03ccb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziwJ3613.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku536235.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr597555.exepid process 1768 jr597555.exe 1768 jr597555.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr597555.exeku536235.exedescription pid process Token: SeDebugPrivilege 1768 jr597555.exe Token: SeDebugPrivilege 4872 ku536235.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
6434494ffa021f4270781656f2018d1c968a7eb2a4a10cc1c83f9f6fb5d03ccb.exeziwJ3613.exedescription pid process target process PID 1184 wrote to memory of 2348 1184 6434494ffa021f4270781656f2018d1c968a7eb2a4a10cc1c83f9f6fb5d03ccb.exe ziwJ3613.exe PID 1184 wrote to memory of 2348 1184 6434494ffa021f4270781656f2018d1c968a7eb2a4a10cc1c83f9f6fb5d03ccb.exe ziwJ3613.exe PID 1184 wrote to memory of 2348 1184 6434494ffa021f4270781656f2018d1c968a7eb2a4a10cc1c83f9f6fb5d03ccb.exe ziwJ3613.exe PID 2348 wrote to memory of 1768 2348 ziwJ3613.exe jr597555.exe PID 2348 wrote to memory of 1768 2348 ziwJ3613.exe jr597555.exe PID 2348 wrote to memory of 4872 2348 ziwJ3613.exe ku536235.exe PID 2348 wrote to memory of 4872 2348 ziwJ3613.exe ku536235.exe PID 2348 wrote to memory of 4872 2348 ziwJ3613.exe ku536235.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6434494ffa021f4270781656f2018d1c968a7eb2a4a10cc1c83f9f6fb5d03ccb.exe"C:\Users\Admin\AppData\Local\Temp\6434494ffa021f4270781656f2018d1c968a7eb2a4a10cc1c83f9f6fb5d03ccb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwJ3613.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwJ3613.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr597555.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr597555.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku536235.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku536235.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2616
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD54ca2c9d610442dd8a83c1e31b43b5185
SHA173bec5b05a647c131c891bba8bf914f8c2186d02
SHA256457d78fc46ec34b381395fdbad7ffd9887c91760efdb9b1bd218101999565553
SHA5125fba3be7a36d28307f5344bfb10c83d70367f1464aa2166c4316956d2679d56e4accfd4c30d854e8645ae2eb6a26c6d3a9d88d587336f3fd408525d5a905a271
-
Filesize
12KB
MD568b8bfa01c068c353717a8618a9f4b0d
SHA1fffd5813eea67360d576f839f24f288e8361e62f
SHA256fb23274124b9ffefbe86ae654fa3a6fbcfc055588ed55632584f13d2ad2f7801
SHA5122886cf79fd98f0adad4681c9320c0965e1b963e5fb8355b805b912e0c3f9caf48d1c940ffe9a416d171a03b373395c6a03ee3a5dd7727386a493c74d2f7cba69
-
Filesize
372KB
MD5b4147d9e87292958af53b3d3dc92ca55
SHA14483f846b6d2154081b7df18683e43376b7abf14
SHA256858b4b21e294d7ce8ba647a37413cfecdca719ffc80906cba6cf6041a4191d9a
SHA512b439e0325458fb336056241771bdbd3a44767eb6e7b2264603b34c14d8306bc462deda6782434618ed9128a087d3db1ce4bbf7bd51324664fc11cd6e5d2bf919