Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826.exe
Resource
win10v2004-20241007-en
General
-
Target
a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826.exe
-
Size
531KB
-
MD5
e9fd00e2e059898180f2b8b8d8817928
-
SHA1
a65e93655da32f704d0cdb2b1a4ead13d75fa45c
-
SHA256
a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826
-
SHA512
2d2e2174a2f4492403eaa1e5448c0d7e05988ccebdcf17d8bf779a2a3917bfb3d11aae092a2a169dbb64d891385f67aad7013d9b374a6058969d8b947e2d74ab
-
SSDEEP
12288:OMrfy90zmDZorXZ88WqI3szU+f5KXa/PeiR3WwgDQx3:dyDqXZ88W73szLAEeioq3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr742402.exe healer behavioral1/memory/1532-15-0x0000000000170000-0x000000000017A000-memory.dmp healer -
Healer family
-
Processes:
jr742402.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr742402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr742402.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr742402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr742402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr742402.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr742402.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4344-22-0x0000000002660000-0x00000000026A6000-memory.dmp family_redline behavioral1/memory/4344-24-0x0000000005150000-0x0000000005194000-memory.dmp family_redline behavioral1/memory/4344-26-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-25-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-74-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-60-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-36-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-30-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-28-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-88-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-86-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-84-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-82-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-80-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-78-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-76-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-72-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-70-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-68-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-66-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-65-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-62-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-58-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-56-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-54-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-52-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-51-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-48-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-46-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-44-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-42-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-40-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-38-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-34-0x0000000005150000-0x000000000518F000-memory.dmp family_redline behavioral1/memory/4344-32-0x0000000005150000-0x000000000518F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziFH2452.exejr742402.exeku779085.exepid process 3948 ziFH2452.exe 1532 jr742402.exe 4344 ku779085.exe -
Processes:
jr742402.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr742402.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826.exeziFH2452.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziFH2452.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2884 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826.exeziFH2452.exeku779085.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziFH2452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku779085.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr742402.exepid process 1532 jr742402.exe 1532 jr742402.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr742402.exeku779085.exedescription pid process Token: SeDebugPrivilege 1532 jr742402.exe Token: SeDebugPrivilege 4344 ku779085.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826.exeziFH2452.exedescription pid process target process PID 4240 wrote to memory of 3948 4240 a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826.exe ziFH2452.exe PID 4240 wrote to memory of 3948 4240 a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826.exe ziFH2452.exe PID 4240 wrote to memory of 3948 4240 a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826.exe ziFH2452.exe PID 3948 wrote to memory of 1532 3948 ziFH2452.exe jr742402.exe PID 3948 wrote to memory of 1532 3948 ziFH2452.exe jr742402.exe PID 3948 wrote to memory of 4344 3948 ziFH2452.exe ku779085.exe PID 3948 wrote to memory of 4344 3948 ziFH2452.exe ku779085.exe PID 3948 wrote to memory of 4344 3948 ziFH2452.exe ku779085.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826.exe"C:\Users\Admin\AppData\Local\Temp\a538fb2500e3d1184e59b2e8b8fe6fb801a2ce739d752122a3bee3a2dd3f4826.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFH2452.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFH2452.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr742402.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr742402.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku779085.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku779085.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4344
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2884
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD574b5180e3778c0ace66feb781116fc55
SHA1ae513077a1c4684a70fa18a3499dcecd9ca8fadb
SHA256e83b79e6b7aa8b8837a9c47b6b88555c061666dcdc7399b3e832b9157857f461
SHA512aac587de005cc184071f4f61f5e047877909caad29bb8ac950714257bb45478fcaf24c07e6b7dc461552919831303c793bd9d0f35540ee25153917cb466b92b4
-
Filesize
11KB
MD514959933c7186ef2b7fa09eba0e1c555
SHA1da03e1907f6f0909a6ddc3af5176dde0ab0cdb86
SHA2568dfbd6bb294be50629de7d578ef4962ea3fc530d3c426515a217bc4f040ef70e
SHA512af0cf9d46256e8934386b76c939c79ff30db2ff992c9a3efbcc6b97c9354e56c81810e8bfe1a42a0a2ae3bf56bec7901c817c88a085f5c6157368b2979046870
-
Filesize
434KB
MD56b3e64aa4573f6319cc67aaced52497d
SHA1f1fe2c85e5b8ece203d0691e0a184c78e40bc129
SHA25603650ddc5d2a539a53c93cb5cf5ab09607e61d35e2a9a0848013ba6bc981451b
SHA5123cf8c1a83908f6ab85e3e1dbdcca10e0503cea4a25eab7a243f7147a0cbd9059709ab33e50c9c8cf8ac1cb347fe171a202c68cfa8c05543cb31c56e953d7d4fe