Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02.exe
Resource
win10v2004-20241007-en
General
-
Target
a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02.exe
-
Size
537KB
-
MD5
9db2701211a9182af85bb3008541c488
-
SHA1
d2157c97b37f3d02f1356277c96fcac1fa76353b
-
SHA256
a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02
-
SHA512
eb5e9a2292a4db12aa8d284851d30bccc986b5084d894a2fa8a70062142d6f58cf2a8bf4217ba726057915c5f421306550f92e02fd8d489d206dd06475c1e53b
-
SSDEEP
12288:XMrky90pHABwB9GHxsDkIE5dHiPrU92HPwPcIT67UAYV0:7yyoT3CPrDvwEOAUAK0
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr440964.exe healer behavioral1/memory/3296-15-0x0000000000F90000-0x0000000000F9A000-memory.dmp healer -
Healer family
-
Processes:
jr440964.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr440964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr440964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr440964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr440964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr440964.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr440964.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1240-22-0x00000000027F0000-0x0000000002836000-memory.dmp family_redline behavioral1/memory/1240-24-0x0000000002AC0000-0x0000000002B04000-memory.dmp family_redline behavioral1/memory/1240-30-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-38-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-88-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-86-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-84-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-82-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-80-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-76-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-74-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-72-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-70-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-68-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-66-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-64-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-62-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-60-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-56-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-54-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-52-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-51-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-48-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-46-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-44-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-42-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-40-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-36-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-34-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-32-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-28-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-78-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-58-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-26-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline behavioral1/memory/1240-25-0x0000000002AC0000-0x0000000002AFF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziup4268.exejr440964.exeku671262.exepid process 2208 ziup4268.exe 3296 jr440964.exe 1240 ku671262.exe -
Processes:
jr440964.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr440964.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziup4268.exea5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziup4268.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02.exeziup4268.exeku671262.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziup4268.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku671262.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr440964.exepid process 3296 jr440964.exe 3296 jr440964.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr440964.exeku671262.exedescription pid process Token: SeDebugPrivilege 3296 jr440964.exe Token: SeDebugPrivilege 1240 ku671262.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02.exeziup4268.exedescription pid process target process PID 4580 wrote to memory of 2208 4580 a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02.exe ziup4268.exe PID 4580 wrote to memory of 2208 4580 a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02.exe ziup4268.exe PID 4580 wrote to memory of 2208 4580 a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02.exe ziup4268.exe PID 2208 wrote to memory of 3296 2208 ziup4268.exe jr440964.exe PID 2208 wrote to memory of 3296 2208 ziup4268.exe jr440964.exe PID 2208 wrote to memory of 1240 2208 ziup4268.exe ku671262.exe PID 2208 wrote to memory of 1240 2208 ziup4268.exe ku671262.exe PID 2208 wrote to memory of 1240 2208 ziup4268.exe ku671262.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02.exe"C:\Users\Admin\AppData\Local\Temp\a5e7ac0e97f3c00dbdac84bff297997d4dc41c57710c1e932c7eebfee7fefd02.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziup4268.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziup4268.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr440964.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr440964.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku671262.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku671262.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1240
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5c5718b5542027232ea39b2c9753d0652
SHA141b408a485bcf069dba085ab8cad7a1e6c38474f
SHA2562d40ffd5e0aee8c1173beb3e8850b7722c53c0bc30e7d434db025a367de6bd37
SHA5129fea1faa451adef2b87631fed08198ec69b40f8c60682bc7e10ae7fa5a2c68b7b6785a942e3e3270d180f01d7aa935d3b8c51979c5afcf633fd105eda0e9f93f
-
Filesize
14KB
MD5f67c67dac1e8437abc78b55343a593a6
SHA1c06ad86b64abb3608bb3d65cf3b58b82dbe62b9f
SHA256644f81148a25c02469849735d32f1a75dc72e6671e9c44ce028f953857949bef
SHA5124a9ce1d78010e4941fee0810734a0131b81a2e6639baa447aa0a45849eef0e9025db99e6edfca09f6f6b753b650461af91593d7b9137da7c121fb780acdea970
-
Filesize
352KB
MD5ece2dc448e0c8cfeda88b1d80d3bdc9a
SHA11e82af807152e69360fa2c60bf29063ba3c8453e
SHA2566ebe0a62fe49423bfb208340d2a01faec8c47b6ed9759c3d349639f6650e6901
SHA512ea4461e2349295f29c451f73e822c279c6b3702ca697029ae2fa135aab1fbc767f5f4a151c02d37b256725d1c393d2d8f5e829205093e6fa7c4abb2f3104a1a2