Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 08:39
Static task
static1
Behavioral task
behavioral1
Sample
23814810246061053c19e58636764ba026389b4752465ce4978efd5d1dc5565c.exe
Resource
win10v2004-20241007-en
General
-
Target
23814810246061053c19e58636764ba026389b4752465ce4978efd5d1dc5565c.exe
-
Size
537KB
-
MD5
17ae3261192118c477c4df103fd677f3
-
SHA1
27405d0d3780e7426e0d2cdaf6732b240f00c8ce
-
SHA256
23814810246061053c19e58636764ba026389b4752465ce4978efd5d1dc5565c
-
SHA512
e473e6c7aa92b16926b7c53f00dc17fce2a51e1ceedfe978f9f97a1ee788fd33b08af692b61cb0c088f60691d88afda7fb42ce1d0a5adfd84f04274607d12319
-
SSDEEP
12288:NMrMy90weXlWzPwbuJEMUwcHIdHNUIurONnhO2EbJ26N:Byn1suJEmZN1uaNnVmJj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr561003.exe healer behavioral1/memory/2088-15-0x0000000000DE0000-0x0000000000DEA000-memory.dmp healer -
Healer family
-
Processes:
jr561003.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr561003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr561003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr561003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr561003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr561003.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr561003.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2560-22-0x0000000002950000-0x0000000002996000-memory.dmp family_redline behavioral1/memory/2560-24-0x0000000005440000-0x0000000005484000-memory.dmp family_redline behavioral1/memory/2560-30-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-38-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-88-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-86-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-84-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-80-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-78-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-76-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-74-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-72-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-70-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-68-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-66-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-64-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-60-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-58-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-56-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-54-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-52-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-48-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-44-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-42-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-40-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-36-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-34-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-32-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-82-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-62-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-50-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-46-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-28-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-26-0x0000000005440000-0x000000000547F000-memory.dmp family_redline behavioral1/memory/2560-25-0x0000000005440000-0x000000000547F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziPG0081.exejr561003.exeku861605.exepid process 2188 ziPG0081.exe 2088 jr561003.exe 2560 ku861605.exe -
Processes:
jr561003.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr561003.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
23814810246061053c19e58636764ba026389b4752465ce4978efd5d1dc5565c.exeziPG0081.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 23814810246061053c19e58636764ba026389b4752465ce4978efd5d1dc5565c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziPG0081.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2192 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
23814810246061053c19e58636764ba026389b4752465ce4978efd5d1dc5565c.exeziPG0081.exeku861605.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23814810246061053c19e58636764ba026389b4752465ce4978efd5d1dc5565c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziPG0081.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku861605.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr561003.exepid process 2088 jr561003.exe 2088 jr561003.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr561003.exeku861605.exedescription pid process Token: SeDebugPrivilege 2088 jr561003.exe Token: SeDebugPrivilege 2560 ku861605.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
23814810246061053c19e58636764ba026389b4752465ce4978efd5d1dc5565c.exeziPG0081.exedescription pid process target process PID 4464 wrote to memory of 2188 4464 23814810246061053c19e58636764ba026389b4752465ce4978efd5d1dc5565c.exe ziPG0081.exe PID 4464 wrote to memory of 2188 4464 23814810246061053c19e58636764ba026389b4752465ce4978efd5d1dc5565c.exe ziPG0081.exe PID 4464 wrote to memory of 2188 4464 23814810246061053c19e58636764ba026389b4752465ce4978efd5d1dc5565c.exe ziPG0081.exe PID 2188 wrote to memory of 2088 2188 ziPG0081.exe jr561003.exe PID 2188 wrote to memory of 2088 2188 ziPG0081.exe jr561003.exe PID 2188 wrote to memory of 2560 2188 ziPG0081.exe ku861605.exe PID 2188 wrote to memory of 2560 2188 ziPG0081.exe ku861605.exe PID 2188 wrote to memory of 2560 2188 ziPG0081.exe ku861605.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\23814810246061053c19e58636764ba026389b4752465ce4978efd5d1dc5565c.exe"C:\Users\Admin\AppData\Local\Temp\23814810246061053c19e58636764ba026389b4752465ce4978efd5d1dc5565c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPG0081.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPG0081.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr561003.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr561003.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku861605.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku861605.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2192
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5520a0c2b3786d83c220726e3bb46b943
SHA1587cbc1198bf8365288dda9cdab30ccf2c85da83
SHA2563b8edf61b2752dcdb67e24e771d3c174a58b4e62e7e8a88351785a654a020d6d
SHA5123d03ddbd96694e74bc5dac90f9bf25adfd44fc0006eaf1214ca15844cf84daa84afc08c4a0de3d3f3d0321592fb2752c0f688cfafb531a201afb581dc7a14e57
-
Filesize
13KB
MD596e0c2736d27a048d6862e8f2a33e2ca
SHA19e2f328b02b7aa507b819fc1613cc9ddcd63fca5
SHA256725d5588faafd6983647cc37f477760d0ad63173ffa1f081fb87c895f9cf30b6
SHA51254619fe72cc53c55e4fd7a0a92ba4f7d7e2cb47b5d0fdc61c704c7dcee2fb4eaab30ffd4070c8c192c3683379c2f3eeea0d5431b20be0f5eeb95cf3ab94f89c8
-
Filesize
353KB
MD57d91b61f0e4b7ba2ba5bfeef1920ea13
SHA172bda11ebc05f2295f1d22a0e68a79480ab55703
SHA256d5c53508edfe4bd9c3539f36c3d6eddce64c542829821ca68d15a1937bb46902
SHA512ebfe65cf23969b99b6a2938875cdf433cfcf69660c38c4c9ba79a32e12f06ba3aceb468e11b075b2f01981012213dc31d4ed895cdd82feb0c82dba06b5ac0ee3