Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:11
Static task
static1
Behavioral task
behavioral1
Sample
ac48274d0fe176a842128269a36f3f1990462e0ad786ce3a707aaab4d40859d6.exe
Resource
win10v2004-20241007-en
General
-
Target
ac48274d0fe176a842128269a36f3f1990462e0ad786ce3a707aaab4d40859d6.exe
-
Size
537KB
-
MD5
40cfbe83ad84210582104ed6d2fc17ab
-
SHA1
6849eeced1506f50c53e2e76d38dac29fa34e03f
-
SHA256
ac48274d0fe176a842128269a36f3f1990462e0ad786ce3a707aaab4d40859d6
-
SHA512
a0d48e574ce27638d6f126ae5911d95e7d7c30c65bf4825f7f67f9ffa74bf536e720456e1b0b29b43c4db9560e486dc67f73585b198fe900d2524bcfb094998c
-
SSDEEP
12288:GMrJy90TPOneBk5z08IeaY4nUnxHFwUYLO5GSajJ7:byWPOe91Y4nWlwDEXYp
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr979090.exe healer behavioral1/memory/5100-15-0x0000000000AD0000-0x0000000000ADA000-memory.dmp healer -
Healer family
-
Processes:
jr979090.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr979090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr979090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr979090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr979090.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr979090.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr979090.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1980-22-0x0000000002780000-0x00000000027C6000-memory.dmp family_redline behavioral1/memory/1980-24-0x0000000002970000-0x00000000029B4000-memory.dmp family_redline behavioral1/memory/1980-32-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-38-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-86-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-84-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-82-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-80-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-78-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-76-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-74-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-72-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-70-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-68-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-66-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-64-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-62-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-58-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-56-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-54-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-52-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-50-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-48-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-46-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-44-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-42-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-40-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-36-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-34-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-30-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-28-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-88-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-60-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-26-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline behavioral1/memory/1980-25-0x0000000002970000-0x00000000029AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziSI4189.exejr979090.exeku608352.exepid process 3372 ziSI4189.exe 5100 jr979090.exe 1980 ku608352.exe -
Processes:
jr979090.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr979090.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ac48274d0fe176a842128269a36f3f1990462e0ad786ce3a707aaab4d40859d6.exeziSI4189.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ac48274d0fe176a842128269a36f3f1990462e0ad786ce3a707aaab4d40859d6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziSI4189.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4452 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ac48274d0fe176a842128269a36f3f1990462e0ad786ce3a707aaab4d40859d6.exeziSI4189.exeku608352.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac48274d0fe176a842128269a36f3f1990462e0ad786ce3a707aaab4d40859d6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziSI4189.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku608352.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr979090.exepid process 5100 jr979090.exe 5100 jr979090.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr979090.exeku608352.exedescription pid process Token: SeDebugPrivilege 5100 jr979090.exe Token: SeDebugPrivilege 1980 ku608352.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ac48274d0fe176a842128269a36f3f1990462e0ad786ce3a707aaab4d40859d6.exeziSI4189.exedescription pid process target process PID 5004 wrote to memory of 3372 5004 ac48274d0fe176a842128269a36f3f1990462e0ad786ce3a707aaab4d40859d6.exe ziSI4189.exe PID 5004 wrote to memory of 3372 5004 ac48274d0fe176a842128269a36f3f1990462e0ad786ce3a707aaab4d40859d6.exe ziSI4189.exe PID 5004 wrote to memory of 3372 5004 ac48274d0fe176a842128269a36f3f1990462e0ad786ce3a707aaab4d40859d6.exe ziSI4189.exe PID 3372 wrote to memory of 5100 3372 ziSI4189.exe jr979090.exe PID 3372 wrote to memory of 5100 3372 ziSI4189.exe jr979090.exe PID 3372 wrote to memory of 1980 3372 ziSI4189.exe ku608352.exe PID 3372 wrote to memory of 1980 3372 ziSI4189.exe ku608352.exe PID 3372 wrote to memory of 1980 3372 ziSI4189.exe ku608352.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac48274d0fe176a842128269a36f3f1990462e0ad786ce3a707aaab4d40859d6.exe"C:\Users\Admin\AppData\Local\Temp\ac48274d0fe176a842128269a36f3f1990462e0ad786ce3a707aaab4d40859d6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSI4189.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSI4189.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr979090.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr979090.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku608352.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku608352.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1980
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4452
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD53cc84d776ac5215cb4b7d45aa7827de9
SHA1da40fe7df2f949bdc25e0089f0739a1a0bcd3607
SHA256f6b26770537fedb8d788a97aafbed45aa915ce11980266dcdda21298c95c744e
SHA5126f3f1225690e42e5a7dc73e4a897a9b63422300158c8661b83ac6c77351df2543b2d78b3a5a5a19ea103ab47f0c510aa999fb8b0aa67eeafad950b1ce23bac5f
-
Filesize
13KB
MD543f0e80473fae184f75fbfd79baef6e0
SHA11977618553551a017c9b2d904add64f9c1318f75
SHA2561bb4c73ac03d210c6a9741f7d9d54c7b4c72f919d1e309a6a7efdf65d78eb129
SHA5127555d89e5d6e064ea9d8a7f90093d4981642a0e7d05b15146ed25ad88e369f0c167a38101b25bd81f42ccac2d22b36057499c20470d328e179b56aba1e14f32a
-
Filesize
352KB
MD5fb55536cd54abc3e981663262756af4b
SHA18c3cea9339ea03df018ea99c0addffcdbcf1d4cc
SHA256d6f04b0897d6d468406534f9aaf2665045645e2beaf06514ca8644159b5e1286
SHA512ce42f7c5cbd6ff09790ea8fe108738fe15460d840ce962b24e5e859d0700850fbc590d21e4a0585584232a9aaf1f63857f2b99ce1b5ca26327f9473500ced239