Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 21:09
Static task
static1
Behavioral task
behavioral1
Sample
36438b5580bfe969978077b2eae034e65d696b24aa305ed8a93ac1bef8278f88.exe
Resource
win10v2004-20241007-en
General
-
Target
36438b5580bfe969978077b2eae034e65d696b24aa305ed8a93ac1bef8278f88.exe
-
Size
534KB
-
MD5
d3d9dc5c7cd262bd09086a3ae1a39dc0
-
SHA1
bf6000658532610309d2e6d013b047695cd74e19
-
SHA256
36438b5580bfe969978077b2eae034e65d696b24aa305ed8a93ac1bef8278f88
-
SHA512
467b963290f40372a9a2da2e3c0ad1e967925f417ea924904445a5e610bcab0c7c645db7b4ab5c96db13b8904449f295bb53204e4e5fc0fb262c7331ec309cc9
-
SSDEEP
12288:7MrYy90SxdoJ1z573exe4zsbTdNI2FfEZz81ZKz2:Ly5deOE4zkTTIcfJ3
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr207223.exe healer behavioral1/memory/2024-15-0x0000000000F10000-0x0000000000F1A000-memory.dmp healer -
Healer family
-
Processes:
jr207223.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr207223.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr207223.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr207223.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr207223.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr207223.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr207223.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4772-22-0x0000000002590000-0x00000000025D6000-memory.dmp family_redline behavioral1/memory/4772-24-0x0000000002750000-0x0000000002794000-memory.dmp family_redline behavioral1/memory/4772-30-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-40-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-88-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-86-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-84-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-83-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-80-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-78-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-76-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-72-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-70-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-69-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-67-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-64-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-62-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-60-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-58-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-56-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-54-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-52-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-48-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-46-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-44-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-42-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-38-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-36-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-34-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-32-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-74-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-50-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-28-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-26-0x0000000002750000-0x000000000278F000-memory.dmp family_redline behavioral1/memory/4772-25-0x0000000002750000-0x000000000278F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziMk8143.exejr207223.exeku902886.exepid process 516 ziMk8143.exe 2024 jr207223.exe 4772 ku902886.exe -
Processes:
jr207223.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr207223.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
36438b5580bfe969978077b2eae034e65d696b24aa305ed8a93ac1bef8278f88.exeziMk8143.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 36438b5580bfe969978077b2eae034e65d696b24aa305ed8a93ac1bef8278f88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziMk8143.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziMk8143.exeku902886.exe36438b5580bfe969978077b2eae034e65d696b24aa305ed8a93ac1bef8278f88.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziMk8143.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku902886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36438b5580bfe969978077b2eae034e65d696b24aa305ed8a93ac1bef8278f88.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr207223.exepid process 2024 jr207223.exe 2024 jr207223.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr207223.exeku902886.exedescription pid process Token: SeDebugPrivilege 2024 jr207223.exe Token: SeDebugPrivilege 4772 ku902886.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
36438b5580bfe969978077b2eae034e65d696b24aa305ed8a93ac1bef8278f88.exeziMk8143.exedescription pid process target process PID 4048 wrote to memory of 516 4048 36438b5580bfe969978077b2eae034e65d696b24aa305ed8a93ac1bef8278f88.exe ziMk8143.exe PID 4048 wrote to memory of 516 4048 36438b5580bfe969978077b2eae034e65d696b24aa305ed8a93ac1bef8278f88.exe ziMk8143.exe PID 4048 wrote to memory of 516 4048 36438b5580bfe969978077b2eae034e65d696b24aa305ed8a93ac1bef8278f88.exe ziMk8143.exe PID 516 wrote to memory of 2024 516 ziMk8143.exe jr207223.exe PID 516 wrote to memory of 2024 516 ziMk8143.exe jr207223.exe PID 516 wrote to memory of 4772 516 ziMk8143.exe ku902886.exe PID 516 wrote to memory of 4772 516 ziMk8143.exe ku902886.exe PID 516 wrote to memory of 4772 516 ziMk8143.exe ku902886.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36438b5580bfe969978077b2eae034e65d696b24aa305ed8a93ac1bef8278f88.exe"C:\Users\Admin\AppData\Local\Temp\36438b5580bfe969978077b2eae034e65d696b24aa305ed8a93ac1bef8278f88.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMk8143.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMk8143.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr207223.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr207223.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku902886.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku902886.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4772
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD5b720ac60420d1cb12cf170a9b84d0372
SHA147151462b31f0b31c9667d6900b410d114114a77
SHA256da19bfd4f571cfb48489dc85e0573beb7575d18a7eed51491f706536f99f3b17
SHA512459eb361cc04bdde701475fa48c06f129b348c52fc6e6ed21a1443caba4db933503db282681cfaa5a9469295e1451e612f763365c8885927eb76075849d9b47e
-
Filesize
12KB
MD51dbec2a643194da5110e9f9f2affc653
SHA1e7932bd5ff25c1b85f012cbcc6bdd4f44f7b1e12
SHA2563322d0fa238a458ecbea96b32c9cc1023396d847b9cbf1e79389efd1b9bcc398
SHA5120997c22d914459fbdb156cad19653e59ed6ac5780026eef226839afc82af47b48038fe9c5fbdde5b4c054e094f5fec92f5c3529809507b4e4b3380f10e0a52a0
-
Filesize
319KB
MD5ac6244fa03ca3a775b3df0cf115ab200
SHA1e1754bd0deac4492f8fb450d5482385472c4fdc3
SHA256f243ca7d38120c350275519694759a72e2eb214f670ddc58c118c2b28aa9dfd5
SHA51293041c612f381f28bf61a6090c14328d57f3c791e4792b8c5a9171a6e07d5c8d9e6f2eff38622bbdf014cfcfe9790f9310b4f9c5cc15b4001ae84f5a68d994e6