Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 07:58
Static task
static1
Behavioral task
behavioral1
Sample
168ff04f620effb7984bf25b570db37df53541dfbe7facf0d631df87586b3e6c.exe
Resource
win10v2004-20241007-en
General
-
Target
168ff04f620effb7984bf25b570db37df53541dfbe7facf0d631df87586b3e6c.exe
-
Size
537KB
-
MD5
9f92d0ae5caa193ca4e24cf748e9ecbf
-
SHA1
fe4d512d41f247f841b2cce3349e74d956460dbb
-
SHA256
168ff04f620effb7984bf25b570db37df53541dfbe7facf0d631df87586b3e6c
-
SHA512
eed59b6a58eef907952e486cd97140e32a2c3d584e10a53eecc23f94f46d99b23fac89648d8d434760210d7c6b92ea696b68503d464ff94b32fa2fec05f6d29e
-
SSDEEP
12288:SMrOy90IOIVAfvO4+rSsRoDwvQiO1pfTpqtY:gypCfvOmsiDtp8i
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr200547.exe healer behavioral1/memory/2164-15-0x00000000007E0000-0x00000000007EA000-memory.dmp healer -
Healer family
-
Processes:
jr200547.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr200547.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr200547.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr200547.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr200547.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr200547.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr200547.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2708-21-0x0000000002480000-0x00000000024C6000-memory.dmp family_redline behavioral1/memory/2708-23-0x0000000002650000-0x0000000002694000-memory.dmp family_redline behavioral1/memory/2708-27-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-37-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-88-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-83-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-81-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-79-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-77-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-75-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-73-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-71-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-69-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-67-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-65-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-61-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-59-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-57-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-55-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-53-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-51-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-49-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-45-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-43-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-42-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-35-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-33-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-31-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-29-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-85-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-63-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-47-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-39-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-25-0x0000000002650000-0x000000000268F000-memory.dmp family_redline behavioral1/memory/2708-24-0x0000000002650000-0x000000000268F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziHs3015.exejr200547.exeku212119.exepid process 3448 ziHs3015.exe 2164 jr200547.exe 2708 ku212119.exe -
Processes:
jr200547.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr200547.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
168ff04f620effb7984bf25b570db37df53541dfbe7facf0d631df87586b3e6c.exeziHs3015.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 168ff04f620effb7984bf25b570db37df53541dfbe7facf0d631df87586b3e6c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziHs3015.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku212119.exe168ff04f620effb7984bf25b570db37df53541dfbe7facf0d631df87586b3e6c.exeziHs3015.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku212119.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 168ff04f620effb7984bf25b570db37df53541dfbe7facf0d631df87586b3e6c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziHs3015.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr200547.exepid process 2164 jr200547.exe 2164 jr200547.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr200547.exeku212119.exedescription pid process Token: SeDebugPrivilege 2164 jr200547.exe Token: SeDebugPrivilege 2708 ku212119.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
168ff04f620effb7984bf25b570db37df53541dfbe7facf0d631df87586b3e6c.exeziHs3015.exedescription pid process target process PID 1580 wrote to memory of 3448 1580 168ff04f620effb7984bf25b570db37df53541dfbe7facf0d631df87586b3e6c.exe ziHs3015.exe PID 1580 wrote to memory of 3448 1580 168ff04f620effb7984bf25b570db37df53541dfbe7facf0d631df87586b3e6c.exe ziHs3015.exe PID 1580 wrote to memory of 3448 1580 168ff04f620effb7984bf25b570db37df53541dfbe7facf0d631df87586b3e6c.exe ziHs3015.exe PID 3448 wrote to memory of 2164 3448 ziHs3015.exe jr200547.exe PID 3448 wrote to memory of 2164 3448 ziHs3015.exe jr200547.exe PID 3448 wrote to memory of 2708 3448 ziHs3015.exe ku212119.exe PID 3448 wrote to memory of 2708 3448 ziHs3015.exe ku212119.exe PID 3448 wrote to memory of 2708 3448 ziHs3015.exe ku212119.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\168ff04f620effb7984bf25b570db37df53541dfbe7facf0d631df87586b3e6c.exe"C:\Users\Admin\AppData\Local\Temp\168ff04f620effb7984bf25b570db37df53541dfbe7facf0d631df87586b3e6c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHs3015.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHs3015.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr200547.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr200547.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku212119.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku212119.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2708
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD58bfbe82d6ab8c9a33a3fc407661751ea
SHA1f55a2d5990aaff20f96aead55e69d244c5c04096
SHA2564e3181c14a4da0bfcc89bad45cda8f3d39b0c3d5101f85c87c6f449bd04a9452
SHA512523ee85190b3c5dbb11535399f98384a7b16a21ff21fc8d1bbfc2e287b219b0dfa0d0a345f4ecf833a9dac4cdf77c5889a21bcf6913846050ae94a7175cde3a3
-
Filesize
13KB
MD51245b75eafc1a9322fbf8e3e6dbf3af3
SHA14e86753b0dbe17497daa180830eee7a7553adb19
SHA256dab6915d72202f1628296d7b6c8314c1415a809187d0b5c2458fcecf5b8124c6
SHA5122383234fbb52f8a5a02826d43a3376ed052f7d53a61ee563334a33d51a1da2b97995ac97c32a003181c21916829296496d495f1c5a5263e4c4668f5d4aa6ce75
-
Filesize
311KB
MD5bd01d722712816e11dfd82fbe718bbeb
SHA1b3620b49f6601616e97048618839f1de141630a5
SHA256727dab7292bd18e35369f895b580019b35eea6a24dc23faf3603ce71f6593b41
SHA512555077e3ea89ecb853e53beec5116db256f54ce7645830471e930fb40fe62f6817b5ee4606de198c06183b055073f9f65f621c67540c4d8fac4b4b3c9cd6db78