Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:03
Static task
static1
Behavioral task
behavioral1
Sample
eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe.exe
Resource
win10v2004-20241007-en
General
-
Target
eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe.exe
-
Size
537KB
-
MD5
129f580e2f1271882076e26877cb4a28
-
SHA1
f3f4499df38c0b8590ff45d65c9466182c1ed12b
-
SHA256
eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe
-
SHA512
4740571038e0535d0ff525786a76c7cc9d621a8d34b7c624e9cbf2c4ee2d98c5c22f01aa1bb053041de753df8c291d22a86f7c69c2832712173df49ef35e2dcc
-
SSDEEP
12288:HMrMy90zmntMTU42nBMD4EuBwC+59OJUFaeo78C:TyttMBx4Eu30jm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr733386.exe healer behavioral1/memory/1436-15-0x00000000002B0000-0x00000000002BA000-memory.dmp healer -
Healer family
-
Processes:
jr733386.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr733386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr733386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr733386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr733386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr733386.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr733386.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1548-22-0x0000000004D20000-0x0000000004D66000-memory.dmp family_redline behavioral1/memory/1548-24-0x0000000004DE0000-0x0000000004E24000-memory.dmp family_redline behavioral1/memory/1548-32-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-40-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-38-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-36-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-34-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-82-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-72-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-60-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-30-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-28-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-26-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-25-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-44-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-88-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-86-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-84-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-80-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-78-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-76-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-74-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-70-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-68-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-66-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-64-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-62-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-58-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-56-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-54-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-52-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-51-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-48-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-46-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1548-42-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zixS4010.exejr733386.exeku599773.exepid process 2980 zixS4010.exe 1436 jr733386.exe 1548 ku599773.exe -
Processes:
jr733386.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr733386.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe.exezixS4010.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zixS4010.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe.exezixS4010.exeku599773.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zixS4010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku599773.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr733386.exepid process 1436 jr733386.exe 1436 jr733386.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr733386.exeku599773.exedescription pid process Token: SeDebugPrivilege 1436 jr733386.exe Token: SeDebugPrivilege 1548 ku599773.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe.exezixS4010.exedescription pid process target process PID 3468 wrote to memory of 2980 3468 eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe.exe zixS4010.exe PID 3468 wrote to memory of 2980 3468 eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe.exe zixS4010.exe PID 3468 wrote to memory of 2980 3468 eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe.exe zixS4010.exe PID 2980 wrote to memory of 1436 2980 zixS4010.exe jr733386.exe PID 2980 wrote to memory of 1436 2980 zixS4010.exe jr733386.exe PID 2980 wrote to memory of 1548 2980 zixS4010.exe ku599773.exe PID 2980 wrote to memory of 1548 2980 zixS4010.exe ku599773.exe PID 2980 wrote to memory of 1548 2980 zixS4010.exe ku599773.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe.exe"C:\Users\Admin\AppData\Local\Temp\eba215487a4b2ef68b50bacdeee91540c780e73809c29fb9c11174077fe7ddfe.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixS4010.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixS4010.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr733386.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr733386.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku599773.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku599773.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1548
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5ee55cc1926414bd4aa7fd7d423931f2b
SHA1f175d88ef4e85c75962b027dd7933aab1f87beda
SHA256b6a59869bf5f597a44786343c6e32acf2aa15210cf5f012218c7527cc17ad44a
SHA51224a07b9d929f1f197d80ae093a859e5561c2e96cb46f8863173a425c5754b3b599cadaca092eb578db644de52025f1f3e9c3a852a75de3f2f191fbb4a379063c
-
Filesize
12KB
MD5f42c5e225d737b9c3fee86c53fcde9e1
SHA1194f0b1858498d790ffc30a750e689f8677a76e2
SHA256d3362dd3c549e8bf353de30125a3730b33efac4e127bd0eb24eb66a197ec09e0
SHA5126b0560f2b4e11bf154311db52d8cb4e04b8d2ee21fd26d1cefece829d13541fa0c3194115175a8d65c1c3f9fe86eb68b5eb74ec6bf374ca3aa5b87b4b8c90a92
-
Filesize
353KB
MD571ff104e7e8e48bc450eebae8fcab13d
SHA15d03825e2734ac8e792b0231b8c605dd1c1c623b
SHA256a3f71a2a828cedd5a47d8b21e81934794024fd12ec522acd27cb3f548c4f44b7
SHA512559d81ce05b47465d50c17b977c0bae1a718876f72cb730d7ede93855fad3c0d885f950ff9476443f49cd014d230b1536e54538b1fb3f26bb5b5d3fe31884735