Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe
Resource
win10v2004-20241007-en
General
-
Target
ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe
-
Size
537KB
-
MD5
eaba220c7b7d3dac46bcd8a48499e708
-
SHA1
1d3bc5ceddcd179983fbe32a37ffe865ef91aad5
-
SHA256
ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6
-
SHA512
ee360bfb49f6a737ab932eeae43b372d9143d9b9789b6d9528c296bdd6f5228f2bec9ada6d854a32971dc29d99747c8e818317d1991fb7f38e6877b5bb8c4a03
-
SSDEEP
12288:8MrEy90un9FwmEBu5prV5fWVrUdGHs8wooaP7bG6FjhFZFi:4yBwmnpkrXLw987Nxi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr453076.exe healer behavioral1/memory/2464-15-0x0000000000810000-0x000000000081A000-memory.dmp healer -
Healer family
-
Processes:
jr453076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr453076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr453076.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr453076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr453076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr453076.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr453076.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3188-22-0x00000000026D0000-0x0000000002716000-memory.dmp family_redline behavioral1/memory/3188-24-0x0000000002990000-0x00000000029D4000-memory.dmp family_redline behavioral1/memory/3188-38-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-28-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-26-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-25-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-46-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-88-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-86-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-82-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-80-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-78-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-76-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-74-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-72-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-70-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-66-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-64-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-62-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-60-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-58-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-56-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-54-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-50-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-48-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-44-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-42-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-41-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-36-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-34-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-32-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-30-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-84-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-68-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline behavioral1/memory/3188-52-0x0000000002990000-0x00000000029CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zinv4256.exejr453076.exeku119437.exepid process 1380 zinv4256.exe 2464 jr453076.exe 3188 ku119437.exe -
Processes:
jr453076.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr453076.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exezinv4256.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zinv4256.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 1172 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exezinv4256.exeku119437.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zinv4256.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku119437.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr453076.exepid process 2464 jr453076.exe 2464 jr453076.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr453076.exeku119437.exedescription pid process Token: SeDebugPrivilege 2464 jr453076.exe Token: SeDebugPrivilege 3188 ku119437.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exezinv4256.exedescription pid process target process PID 1176 wrote to memory of 1380 1176 ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe zinv4256.exe PID 1176 wrote to memory of 1380 1176 ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe zinv4256.exe PID 1176 wrote to memory of 1380 1176 ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe zinv4256.exe PID 1380 wrote to memory of 2464 1380 zinv4256.exe jr453076.exe PID 1380 wrote to memory of 2464 1380 zinv4256.exe jr453076.exe PID 1380 wrote to memory of 3188 1380 zinv4256.exe ku119437.exe PID 1380 wrote to memory of 3188 1380 zinv4256.exe ku119437.exe PID 1380 wrote to memory of 3188 1380 zinv4256.exe ku119437.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe"C:\Users\Admin\AppData\Local\Temp\ba8a69e867a7a78542ef7df5d02248850c265f5ada1d90a0f3ef8834a03799f6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinv4256.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zinv4256.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr453076.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr453076.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku119437.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku119437.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3188
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1172
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD51b545aad1f9485d8c86e1e061d65815c
SHA1dac244595ffe9f5dcdd12622b5df418089a8f6ca
SHA25609e2a40ef61073ee123a7d9153c6a0e1add26c3f65260c48f9bec1e7c19935f7
SHA5126a78212ca2a12e77c12793c33d79c0ec15a865961deae6c2cd15f8bc27e7139bbde853f192f22203d9a430aa891a48ed064b7b8836739bac52e6cdcc84cce255
-
Filesize
14KB
MD5477974078f61539d33857e4e347d1c12
SHA149e77dd5813765a7eef08ecead29e3351c2a60f9
SHA256ccb79ec034cf9415940e864838a34df0bc448d040e2c3f06aafa6a2841540f5d
SHA5124bad5129940fefb999a84a1e7f844e32d489a13d7c1cf60789912b1bcd0f85b6405e788eca2a2ed890f87392e359e286bbadff71fb30863b36767a8d5ddf7a4e
-
Filesize
352KB
MD5b6020f8f3334b099c6a6e035443e403d
SHA1a66eb46e9c558951cda232e24488f5e1817eb425
SHA256c44cbd79e6ebcaef0325400b059f92f45b4c420bdfe5c7e85603c1717371a87e
SHA512cfae1a5e6df5b28e02944e70982b19918b33b7f7374c177095118efb14a8a50e5714201c9a49422ddbd703813d522ec49bcd555de2842d266bf48aec313c082a