Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 09:05
Static task
static1
Behavioral task
behavioral1
Sample
891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb.exe
Resource
win10v2004-20241007-en
General
-
Target
891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb.exe
-
Size
537KB
-
MD5
5c82ed88a36b4d1de4be733338b3240c
-
SHA1
c6f64f7775a25beec8ac9f3939a000f5c309022d
-
SHA256
891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb
-
SHA512
b0c482f3ae285fb9243a3638ca8ce088138f88fb794b936cc53021dbe96034481a41b189a7206cea77135f1b52ff1192926a583f0f3cb3b598ef60efd18612ac
-
SSDEEP
12288:KMrTy90f3nVUwKJrP3TF1YMn/HP/0cpYo:Vym3VURrkMvtYo
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr714286.exe healer behavioral1/memory/1680-15-0x00000000008F0000-0x00000000008FA000-memory.dmp healer -
Healer family
-
Processes:
jr714286.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr714286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr714286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr714286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr714286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr714286.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr714286.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4496-22-0x00000000027D0000-0x0000000002816000-memory.dmp family_redline behavioral1/memory/4496-24-0x0000000004E50000-0x0000000004E94000-memory.dmp family_redline behavioral1/memory/4496-30-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-54-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-88-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-86-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-84-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-82-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-80-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-76-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-74-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-72-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-70-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-68-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-66-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-64-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-62-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-58-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-57-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-52-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-50-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-48-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-44-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-40-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-38-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-37-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-34-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-32-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-78-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-60-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-46-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-42-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-28-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-26-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline behavioral1/memory/4496-25-0x0000000004E50000-0x0000000004E8F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zizA7378.exejr714286.exeku754559.exepid process 3300 zizA7378.exe 1680 jr714286.exe 4496 ku754559.exe -
Processes:
jr714286.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr714286.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb.exezizA7378.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zizA7378.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4544 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
zizA7378.exeku754559.exe891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zizA7378.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku754559.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr714286.exepid process 1680 jr714286.exe 1680 jr714286.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr714286.exeku754559.exedescription pid process Token: SeDebugPrivilege 1680 jr714286.exe Token: SeDebugPrivilege 4496 ku754559.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb.exezizA7378.exedescription pid process target process PID 660 wrote to memory of 3300 660 891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb.exe zizA7378.exe PID 660 wrote to memory of 3300 660 891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb.exe zizA7378.exe PID 660 wrote to memory of 3300 660 891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb.exe zizA7378.exe PID 3300 wrote to memory of 1680 3300 zizA7378.exe jr714286.exe PID 3300 wrote to memory of 1680 3300 zizA7378.exe jr714286.exe PID 3300 wrote to memory of 4496 3300 zizA7378.exe ku754559.exe PID 3300 wrote to memory of 4496 3300 zizA7378.exe ku754559.exe PID 3300 wrote to memory of 4496 3300 zizA7378.exe ku754559.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb.exe"C:\Users\Admin\AppData\Local\Temp\891391e5441e45f7b5cddb9210eeba9f6bdc8e58a58ccd7d6cfa20a89a6721fb.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizA7378.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizA7378.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr714286.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr714286.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku754559.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku754559.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4496
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4544
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD56b6ebb942acf3669cd8253ffe235afd1
SHA1ffab1b5d4df9736f741566fb39541071e03ecbc3
SHA2565c063fd3d3cf552f9ef11b7259d8828cc41aeec1acc513d8ee58f9ff869893ba
SHA512fece6f141625d55034a214986067755f12aeceee42a714b070984174aec693fc7e1d273e9a8c6740e218c70b0f6c92f9f258e129b0b5015fcc860421322dcd0f
-
Filesize
13KB
MD53e2cf96e1e1cded66ca1beae50208c14
SHA1aeb457de449a163fd1712742872b7c9c4db891b4
SHA25683a9cafe543213c8913bbadd0ac717086cb93a0204b3b97a63fcf5275f206860
SHA51261f1649ed25e0f80de2828a6d3d0cf79c7fd46013b336a407b301300e5cf1971540bcede126c2e2cd301b2ed2f446cc60e6f6455cabd948d8b4d70d24ef6d78d
-
Filesize
353KB
MD5493ef74ecfd1d0e968f1e6568ef830be
SHA1ead50c9d565a6cb2d2068b35eeced8408c88951a
SHA256f58920d042c62f29f607bee3b3f35b4d68c6777a291b68593e0f55028531cfb8
SHA512d8cd3a02494e8baa849845337fc7d0ec18262366380890f941ed5488c09b9e3b69f67e267c07d7e7ca4a2b990f1d8919a1cdf22716aa6bd418c8a5ce758dbf5b