Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 11:17
Static task
static1
Behavioral task
behavioral1
Sample
5dfb85736d44b0a68ae8a7c6fe606dd1d15a32fd081b83e36c239ebb232b4021.exe
Resource
win10v2004-20241007-en
General
-
Target
5dfb85736d44b0a68ae8a7c6fe606dd1d15a32fd081b83e36c239ebb232b4021.exe
-
Size
561KB
-
MD5
f2616447dddeb370711181ccc3f54840
-
SHA1
e7d506eef2122df7b0571107d73dace0284f72a5
-
SHA256
5dfb85736d44b0a68ae8a7c6fe606dd1d15a32fd081b83e36c239ebb232b4021
-
SHA512
ff5523b807deb0f5d3985932d0410a6ea1f8be9558a71715333c363a9585ab2a25e0f05fca620acf0f17a6017afb5e41a39895bf0d411a3787a002676636e196
-
SSDEEP
12288:SMrcy90xyAucgZBIeuZKeE6qBn17XPMX6pksKzIojWwie1:yysy5cQI19EPBn1LExsKHyHe1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr729727.exe healer behavioral1/memory/2612-15-0x00000000005E0000-0x00000000005EA000-memory.dmp healer -
Healer family
-
Processes:
jr729727.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr729727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr729727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr729727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr729727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr729727.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr729727.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2544-22-0x0000000002630000-0x0000000002676000-memory.dmp family_redline behavioral1/memory/2544-24-0x0000000004F80000-0x0000000004FC4000-memory.dmp family_redline behavioral1/memory/2544-30-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-42-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-88-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-87-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-82-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-80-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-78-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-76-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-74-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-72-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-70-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-66-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-64-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-62-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-60-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-58-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-56-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-54-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-52-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-50-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-48-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-44-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-40-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-38-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-36-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-34-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-32-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-84-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-68-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-46-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-28-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-26-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline behavioral1/memory/2544-25-0x0000000004F80000-0x0000000004FBF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziYw6547.exejr729727.exeku774153.exepid process 316 ziYw6547.exe 2612 jr729727.exe 2544 ku774153.exe -
Processes:
jr729727.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr729727.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
5dfb85736d44b0a68ae8a7c6fe606dd1d15a32fd081b83e36c239ebb232b4021.exeziYw6547.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5dfb85736d44b0a68ae8a7c6fe606dd1d15a32fd081b83e36c239ebb232b4021.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYw6547.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5440 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
5dfb85736d44b0a68ae8a7c6fe606dd1d15a32fd081b83e36c239ebb232b4021.exeziYw6547.exeku774153.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dfb85736d44b0a68ae8a7c6fe606dd1d15a32fd081b83e36c239ebb232b4021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziYw6547.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku774153.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr729727.exepid process 2612 jr729727.exe 2612 jr729727.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr729727.exeku774153.exedescription pid process Token: SeDebugPrivilege 2612 jr729727.exe Token: SeDebugPrivilege 2544 ku774153.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
5dfb85736d44b0a68ae8a7c6fe606dd1d15a32fd081b83e36c239ebb232b4021.exeziYw6547.exedescription pid process target process PID 3400 wrote to memory of 316 3400 5dfb85736d44b0a68ae8a7c6fe606dd1d15a32fd081b83e36c239ebb232b4021.exe ziYw6547.exe PID 3400 wrote to memory of 316 3400 5dfb85736d44b0a68ae8a7c6fe606dd1d15a32fd081b83e36c239ebb232b4021.exe ziYw6547.exe PID 3400 wrote to memory of 316 3400 5dfb85736d44b0a68ae8a7c6fe606dd1d15a32fd081b83e36c239ebb232b4021.exe ziYw6547.exe PID 316 wrote to memory of 2612 316 ziYw6547.exe jr729727.exe PID 316 wrote to memory of 2612 316 ziYw6547.exe jr729727.exe PID 316 wrote to memory of 2544 316 ziYw6547.exe ku774153.exe PID 316 wrote to memory of 2544 316 ziYw6547.exe ku774153.exe PID 316 wrote to memory of 2544 316 ziYw6547.exe ku774153.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dfb85736d44b0a68ae8a7c6fe606dd1d15a32fd081b83e36c239ebb232b4021.exe"C:\Users\Admin\AppData\Local\Temp\5dfb85736d44b0a68ae8a7c6fe606dd1d15a32fd081b83e36c239ebb232b4021.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYw6547.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYw6547.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr729727.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr729727.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku774153.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku774153.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2544
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5440
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD52da70008ec202b9b5bf838659b5695b8
SHA1a4280ea351414071bf95a4365964f4e65ada4ace
SHA2563a24ca1c8d625d952f7edbb8fce5ec03607e4e173a8931697f39ac64f2fed4f4
SHA5124455fd7f3414fd48dd80e9c39169368df9da0d797448342f3f318b6dcf96aa609934de9ab1e51b5bdd05dd3060a129f28da38e97331c26f415dd60c63b61e4c0
-
Filesize
12KB
MD596c926ea822aada756c9753b44de0cc5
SHA1c5f9fd36c6d308396d8f999d8460d9a189b9c2d6
SHA256463b29bffe2b3b23e925e34165f34fa05662542cbddb62d35f6626684d338af6
SHA51213d6c2835f99a5a20d208a4580173ceebf089d88c2f879242a8de526b5bdeba0e87a9abc4d3b6b6fc396a28db1e24cf5cd02f4694b7c1b88cf9294346ba99540
-
Filesize
372KB
MD545581c9a42e058c3dede0162b50ce497
SHA1fdf7d24da2aaea4acda1a71d9feb916cfa6d6717
SHA256caf9b6c0f693daf2ce03458b755f9a396656036eed8d5cb97c194d572238d9f5
SHA5120db75aa1b078682075d2b9e4e902f8c76a08345af029c26629b8b2f7be9845f2414c0705f17c019b568aad1e18d3fd83ef8d49cf962b2bb6315cd9740ab3ff4d