Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:55
Static task
static1
Behavioral task
behavioral1
Sample
c8a39c23435626b9e38977420efe90796a03f2a221669122076199c1052b9f06.exe
Resource
win10v2004-20241007-en
General
-
Target
c8a39c23435626b9e38977420efe90796a03f2a221669122076199c1052b9f06.exe
-
Size
530KB
-
MD5
0f13f3f616a459c75abab18c25c29495
-
SHA1
c1ba19ebf5dc90bd4277014484b80f5af0d241c9
-
SHA256
c8a39c23435626b9e38977420efe90796a03f2a221669122076199c1052b9f06
-
SHA512
e31ca843f46fcfc7c6f13d3fd46497e37461bf2845d1512af64ce3582bb8679fb0aa56236c100c58798a09918bfcdbeb0c974e8b158e56b40b54d9913c3d8d06
-
SSDEEP
12288:0Mr3y90jNX7AJsjYdZcH9TDwAhIzyugcYaLg4VbvA+:TyCNrAJJd+5IzBgcYa0Qb
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr848422.exe healer behavioral1/memory/2892-15-0x0000000000450000-0x000000000045A000-memory.dmp healer -
Healer family
-
Processes:
jr848422.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr848422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr848422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr848422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr848422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr848422.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr848422.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2148-22-0x0000000002720000-0x0000000002766000-memory.dmp family_redline behavioral1/memory/2148-24-0x00000000028E0000-0x0000000002924000-memory.dmp family_redline behavioral1/memory/2148-30-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-64-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-88-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-86-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-84-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-82-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-80-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-78-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-76-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-74-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-72-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-70-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-68-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-66-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-62-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-60-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-58-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-56-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-54-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-52-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-50-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-48-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-46-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-44-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-42-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-40-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-38-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-36-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-34-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-32-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-28-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-26-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline behavioral1/memory/2148-25-0x00000000028E0000-0x000000000291F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zisX4160.exejr848422.exeku010833.exepid process 3888 zisX4160.exe 2892 jr848422.exe 2148 ku010833.exe -
Processes:
jr848422.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr848422.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c8a39c23435626b9e38977420efe90796a03f2a221669122076199c1052b9f06.exezisX4160.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c8a39c23435626b9e38977420efe90796a03f2a221669122076199c1052b9f06.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zisX4160.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c8a39c23435626b9e38977420efe90796a03f2a221669122076199c1052b9f06.exezisX4160.exeku010833.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8a39c23435626b9e38977420efe90796a03f2a221669122076199c1052b9f06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zisX4160.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku010833.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr848422.exepid process 2892 jr848422.exe 2892 jr848422.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr848422.exeku010833.exedescription pid process Token: SeDebugPrivilege 2892 jr848422.exe Token: SeDebugPrivilege 2148 ku010833.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c8a39c23435626b9e38977420efe90796a03f2a221669122076199c1052b9f06.exezisX4160.exedescription pid process target process PID 4208 wrote to memory of 3888 4208 c8a39c23435626b9e38977420efe90796a03f2a221669122076199c1052b9f06.exe zisX4160.exe PID 4208 wrote to memory of 3888 4208 c8a39c23435626b9e38977420efe90796a03f2a221669122076199c1052b9f06.exe zisX4160.exe PID 4208 wrote to memory of 3888 4208 c8a39c23435626b9e38977420efe90796a03f2a221669122076199c1052b9f06.exe zisX4160.exe PID 3888 wrote to memory of 2892 3888 zisX4160.exe jr848422.exe PID 3888 wrote to memory of 2892 3888 zisX4160.exe jr848422.exe PID 3888 wrote to memory of 2148 3888 zisX4160.exe ku010833.exe PID 3888 wrote to memory of 2148 3888 zisX4160.exe ku010833.exe PID 3888 wrote to memory of 2148 3888 zisX4160.exe ku010833.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8a39c23435626b9e38977420efe90796a03f2a221669122076199c1052b9f06.exe"C:\Users\Admin\AppData\Local\Temp\c8a39c23435626b9e38977420efe90796a03f2a221669122076199c1052b9f06.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisX4160.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisX4160.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr848422.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr848422.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku010833.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku010833.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2148
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5a69970306f20393e0c2e71c175262383
SHA18408913766b7669e83ac93a95ec7914a471ed604
SHA256790db222536b072edf5f8fd54c183928de6277271e2adfecff29bc5da3d8bec6
SHA512b1c12f681652211e3fc0df7bb8452bc3a3142d22d791bd57d90f961fe3e9a95225b6f05d3f87a4e632392429cc601e86bfdea23187fb11557f55e830da0b6fa3
-
Filesize
12KB
MD5523b4afa2fe40bd2aad22dd509a91946
SHA1b0eb9975e4ff08253e1294b8b546fea6bfaf6247
SHA256bfbc2077b6d96f82c015b3e0df9c86e333277c8a217e13ed946f3a6d35b27e25
SHA512490a042154426a8c12f99d313e980fe203f48182b964af6effa0d2012e66fc252608deb1e0310d5043a2a3d8c278ec04c6b8f56d3e66e1317ab037fc8d64b1a5
-
Filesize
434KB
MD575109d7fd30e9d615e09d1e2e4433117
SHA15fe712045d1502c9cc59cff05c66a3d4be98cc2f
SHA2568023d06b2df9e8b5ee2056dfd578c9bf1b3617f204d085bb561938d36d642c99
SHA51241ecef60b07c80d8f696c1922277674132f4b669efffde49670c557b3320c1f5c820491a093dcf0a2a3187a47c9fc4e0607a962bcaacffe213ae3b9bf0de1b2b