Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exe
Resource
win10v2004-20241007-en
General
-
Target
f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exe
-
Size
537KB
-
MD5
79ef02aab5c9c30a3716774ed628c603
-
SHA1
b10575b6ea00411d8f6e9e488cff6840dff22346
-
SHA256
f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f
-
SHA512
7e10228fbb622bb4bb308ca94c75559614962223f521650956d0d982de2b3e0ca185fa7a96c238e3696b0bf8a005c3f60e0dece00b4acff6d900690851214dca
-
SSDEEP
12288:LMr0y90Hc5jQe/aJR2BwU8LHawTbK4NC92vGOlNW:vyl5riXQwR6wTu4gkv5W
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr592584.exe healer behavioral1/memory/4676-15-0x00000000008B0000-0x00000000008BA000-memory.dmp healer -
Healer family
-
Processes:
jr592584.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr592584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr592584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr592584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr592584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr592584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr592584.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1964-21-0x00000000027B0000-0x00000000027F6000-memory.dmp family_redline behavioral1/memory/1964-23-0x00000000029E0000-0x0000000002A24000-memory.dmp family_redline behavioral1/memory/1964-24-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-37-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-87-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-85-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-81-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-79-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-77-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-75-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-73-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-71-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-67-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-65-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-63-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-61-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-59-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-57-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-55-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-53-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-51-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-49-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-47-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-45-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-43-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-41-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-39-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-35-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-83-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-33-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-69-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-31-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-29-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-27-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline behavioral1/memory/1964-25-0x00000000029E0000-0x0000000002A1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziud4425.exejr592584.exeku712792.exepid process 972 ziud4425.exe 4676 jr592584.exe 1964 ku712792.exe -
Processes:
jr592584.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr592584.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziud4425.exef9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziud4425.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5672 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exeziud4425.exeku712792.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziud4425.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku712792.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr592584.exepid process 4676 jr592584.exe 4676 jr592584.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr592584.exeku712792.exedescription pid process Token: SeDebugPrivilege 4676 jr592584.exe Token: SeDebugPrivilege 1964 ku712792.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exeziud4425.exedescription pid process target process PID 1828 wrote to memory of 972 1828 f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exe ziud4425.exe PID 1828 wrote to memory of 972 1828 f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exe ziud4425.exe PID 1828 wrote to memory of 972 1828 f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exe ziud4425.exe PID 972 wrote to memory of 4676 972 ziud4425.exe jr592584.exe PID 972 wrote to memory of 4676 972 ziud4425.exe jr592584.exe PID 972 wrote to memory of 1964 972 ziud4425.exe ku712792.exe PID 972 wrote to memory of 1964 972 ziud4425.exe ku712792.exe PID 972 wrote to memory of 1964 972 ziud4425.exe ku712792.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exe"C:\Users\Admin\AppData\Local\Temp\f9d21b0116725014e712874025484367da97201efe49c42bc8051bdea45ec04f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziud4425.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziud4425.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr592584.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr592584.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku712792.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku712792.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD595644879eb29dfe7543477e865861537
SHA136c744b9fecdca3aae779bf0e467e639e6e74f9d
SHA256b746c3793a385791ffae2d323282eb494f91ba11eb3110e541cc059c0dfea5fc
SHA51242c543b29d7c881f060ebb93d857d8b4ec26916abf829f13622abf32e79729284bb18d035619523f03c5102c060cd15116d13e4a98a1b71ec2fb4648369ba74a
-
Filesize
13KB
MD579aeb0412df4ec71f10e29ea134cd199
SHA14393082b68d9f0ac448e376626d05ee7eccb3dba
SHA256dfee1aa1c97a87922484aae14706c806270044a0c305322b47981360e185ffc5
SHA512d95aa50831115cc1a85d94da26979a78a552c704a6f41b90125b37f8eee6d4b4b2e8430419e5a0400195e90f31809173e736be30b241989be82a7d97d3c80b8f
-
Filesize
352KB
MD587cad7441447b4c5ee519e74648c0490
SHA1607223d38ad066ca8ff8f4a3778619df89eaa600
SHA256e7fbcb08db62ca6067f9a493df7ba39a835e0e4a0e7dbf791b979200be2e7ea5
SHA512829425f97cad74278f5c78139f1d2aa7ff03729bb384d31db6f320c21949ebbb35eb555e908aa6f4101155bbd534be5af428aa0a608f9022f5e2890ebc284c48