Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 00:00
Static task
static1
Behavioral task
behavioral1
Sample
f597c071d23f6ae4765b6246ec7e10755a2105b34dc419cfdc21e840c052ab2a.exe
Resource
win10v2004-20241007-en
General
-
Target
f597c071d23f6ae4765b6246ec7e10755a2105b34dc419cfdc21e840c052ab2a.exe
-
Size
530KB
-
MD5
76d64030d857ff37bd946407e467bb47
-
SHA1
009e2029508831e1f0be23c9cd327155bc0661d8
-
SHA256
f597c071d23f6ae4765b6246ec7e10755a2105b34dc419cfdc21e840c052ab2a
-
SHA512
fa6b0cdfec027f96e97db5241649615f9152ace5ea10dc8128a598d4d3617c3959774e1a0d5f63087da68ce3eed329de0309290fdecec78264d689a79ed268bc
-
SSDEEP
12288:KMrWy902c1B+A5/yKdFw0QfqXK0bQkqBuTMla982PBau:gy8kurw0Qfq66Qf6MA9JPBL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr436027.exe healer behavioral1/memory/3048-15-0x0000000000F70000-0x0000000000F7A000-memory.dmp healer -
Healer family
-
Processes:
jr436027.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr436027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr436027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr436027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr436027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr436027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr436027.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3692-22-0x0000000004C90000-0x0000000004CD6000-memory.dmp family_redline behavioral1/memory/3692-24-0x00000000077B0000-0x00000000077F4000-memory.dmp family_redline behavioral1/memory/3692-36-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-40-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-88-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-86-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-82-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-80-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-78-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-76-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-74-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-72-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-70-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-66-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-64-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-62-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-60-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-58-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-56-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-54-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-50-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-48-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-46-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-44-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-42-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-38-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-34-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-32-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-30-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-84-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-68-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-52-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-28-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-26-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline behavioral1/memory/3692-25-0x00000000077B0000-0x00000000077EF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziqt8328.exejr436027.exeku433020.exepid process 3452 ziqt8328.exe 3048 jr436027.exe 3692 ku433020.exe -
Processes:
jr436027.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr436027.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f597c071d23f6ae4765b6246ec7e10755a2105b34dc419cfdc21e840c052ab2a.exeziqt8328.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f597c071d23f6ae4765b6246ec7e10755a2105b34dc419cfdc21e840c052ab2a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziqt8328.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku433020.exef597c071d23f6ae4765b6246ec7e10755a2105b34dc419cfdc21e840c052ab2a.exeziqt8328.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku433020.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f597c071d23f6ae4765b6246ec7e10755a2105b34dc419cfdc21e840c052ab2a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziqt8328.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr436027.exepid process 3048 jr436027.exe 3048 jr436027.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr436027.exeku433020.exedescription pid process Token: SeDebugPrivilege 3048 jr436027.exe Token: SeDebugPrivilege 3692 ku433020.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
f597c071d23f6ae4765b6246ec7e10755a2105b34dc419cfdc21e840c052ab2a.exeziqt8328.exedescription pid process target process PID 4448 wrote to memory of 3452 4448 f597c071d23f6ae4765b6246ec7e10755a2105b34dc419cfdc21e840c052ab2a.exe ziqt8328.exe PID 4448 wrote to memory of 3452 4448 f597c071d23f6ae4765b6246ec7e10755a2105b34dc419cfdc21e840c052ab2a.exe ziqt8328.exe PID 4448 wrote to memory of 3452 4448 f597c071d23f6ae4765b6246ec7e10755a2105b34dc419cfdc21e840c052ab2a.exe ziqt8328.exe PID 3452 wrote to memory of 3048 3452 ziqt8328.exe jr436027.exe PID 3452 wrote to memory of 3048 3452 ziqt8328.exe jr436027.exe PID 3452 wrote to memory of 3692 3452 ziqt8328.exe ku433020.exe PID 3452 wrote to memory of 3692 3452 ziqt8328.exe ku433020.exe PID 3452 wrote to memory of 3692 3452 ziqt8328.exe ku433020.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f597c071d23f6ae4765b6246ec7e10755a2105b34dc419cfdc21e840c052ab2a.exe"C:\Users\Admin\AppData\Local\Temp\f597c071d23f6ae4765b6246ec7e10755a2105b34dc419cfdc21e840c052ab2a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqt8328.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqt8328.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr436027.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr436027.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku433020.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku433020.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3692
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD55a9fad69aa4e6d41830c40e11df7dad1
SHA1d8f77369b98ce90e643f83ed5089e9dcc0140d9b
SHA25688810ead70b33847adaff35e09a7533f29ada136a1eced3008374421eebd65cf
SHA51212ecd0788566e37d6b08fc9d1cc215b89c6625456033568045b7f52338cf38781036653db82a4533360f913dc43db9acb81349489da3f2d4d4b141f92dc8fe26
-
Filesize
11KB
MD5329ce153c10642b207f9c422a99d150b
SHA1d36a52feca19dbff397b2c5dbd3ca2f5a3a55ea6
SHA25678959e959ccb966d4100917352bbc10d34d7fe70c00f285cb80e8ce8f518ec5f
SHA5128158009b0302934fbbe0b2e4ce2cb63235dc8b020bdb27f7b15914acdd1b8ca6f06fac5c4878ab3e12328952e1ef876e67b3e5fd16e5497ad2f8678b4d89254d
-
Filesize
354KB
MD5d9fbf8246d68957e54a1dfc5843322d9
SHA1e9255f1fb7924d34e80d163464b13b6d4ac7bb0c
SHA256d2f76d7aa4029ccdb0cc5ee88acf820bc1cd299269c9b81547c8301d36a65c0e
SHA512c0e7ebf9e381487fccc95c6dd33b1798dc53a3a1795a7257a75661dc45f58f9c2cdce0a71f2e05c4bce2f3bca1da57538f66fa19f30750ad65ae2fd23a878736