Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 00:12
Static task
static1
Behavioral task
behavioral1
Sample
0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exe
Resource
win10v2004-20241007-en
General
-
Target
0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exe
-
Size
530KB
-
MD5
56582ebf18a40433c4bc3c2d8ba1d2cd
-
SHA1
834c5609ed4b092481c430bc100940d21321608f
-
SHA256
0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023
-
SHA512
f94bd29ace9db214afa84ae922d654a81c0353dc926795e611ee292ffcf5e6510e8444dae62030ac431cf3885637d45ce331b85f2468d5eafc8a0569af7451de
-
SSDEEP
12288:3MrIy90LSnWO52M8S5JyaX+Gg097+n49d5jXGyO:7yhWOGS5JyaXFB9BPDfO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr378401.exe healer behavioral1/memory/528-15-0x00000000008C0000-0x00000000008CA000-memory.dmp healer -
Healer family
-
Processes:
jr378401.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr378401.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr378401.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr378401.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr378401.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr378401.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr378401.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2084-22-0x00000000027D0000-0x0000000002816000-memory.dmp family_redline behavioral1/memory/2084-24-0x0000000004E40000-0x0000000004E84000-memory.dmp family_redline behavioral1/memory/2084-42-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-40-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-38-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-36-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-34-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-86-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-32-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-82-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-78-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-72-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-30-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-28-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-26-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-25-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-44-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-88-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-84-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-80-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-76-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-74-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-70-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-68-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-66-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-64-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-62-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-60-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-58-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-56-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-54-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-52-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-50-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-48-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline behavioral1/memory/2084-46-0x0000000004E40000-0x0000000004E7F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziob5806.exejr378401.exeku585353.exepid process 4676 ziob5806.exe 528 jr378401.exe 2084 ku585353.exe -
Processes:
jr378401.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr378401.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziob5806.exe0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziob5806.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exeziob5806.exeku585353.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziob5806.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku585353.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr378401.exepid process 528 jr378401.exe 528 jr378401.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr378401.exeku585353.exedescription pid process Token: SeDebugPrivilege 528 jr378401.exe Token: SeDebugPrivilege 2084 ku585353.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exeziob5806.exedescription pid process target process PID 4540 wrote to memory of 4676 4540 0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exe ziob5806.exe PID 4540 wrote to memory of 4676 4540 0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exe ziob5806.exe PID 4540 wrote to memory of 4676 4540 0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exe ziob5806.exe PID 4676 wrote to memory of 528 4676 ziob5806.exe jr378401.exe PID 4676 wrote to memory of 528 4676 ziob5806.exe jr378401.exe PID 4676 wrote to memory of 2084 4676 ziob5806.exe ku585353.exe PID 4676 wrote to memory of 2084 4676 ziob5806.exe ku585353.exe PID 4676 wrote to memory of 2084 4676 ziob5806.exe ku585353.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exe"C:\Users\Admin\AppData\Local\Temp\0df13f23f0ddd098f71672393bb00636ca03d12796eaee8ced208c12be094023.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziob5806.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziob5806.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr378401.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr378401.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku585353.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku585353.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2084
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5d61715b7ec75f5e727c2d8eccc5e5e99
SHA13204e0b37b3197db8c45e00b9ce271e646ce6fe7
SHA25656f538048616d654a5c147057a1f5718d6064deba3755fcfb2bce37f61c57b54
SHA512604b79d53f3db1ab80f3d898719935f08b97d48cc14262e4abce0a544dc72459745362889f9e2b33a0842477f917b96be279a346437495a5f1ef7591723675bf
-
Filesize
12KB
MD56b0744ef99079d1ee8fc422a9771c92e
SHA1399b7b7ae971da00810e07313e173df45e2504fa
SHA25640d2ab50ed7c28561d64aab4e256cea9d192b6653a28e18d4b08843892f3feb6
SHA512708ab4175a2e7ad07b5a042aae940cac29d0e6a082f1e0923a7cf1f467c583b74cdf19d80c103962f97aaaaa221baddcc39b27c9bd6d177ef2333a2348e70188
-
Filesize
434KB
MD5f93629208571875f4a70a092ceed10d2
SHA174969ce27ec6b4a08434d6ae3b0935736784a3b1
SHA2566da2bc086a206726300231048ffef45021ea1c0d31624da89df78cdd5a6c301c
SHA512c49337671b27078e3d6d99ac71e81c3de4f4c5d4c546ce8dd61421b25ca373c2530ce0bb4a7e039f8fad52306d370191de5822bb13eb210f39fd83876216cbe2