Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 11:26
Static task
static1
Behavioral task
behavioral1
Sample
b1087dfb211841a764632385f1e75cc180817fae723f97d02ef7a8b2898a0eef.exe
Resource
win10v2004-20241007-en
General
-
Target
b1087dfb211841a764632385f1e75cc180817fae723f97d02ef7a8b2898a0eef.exe
-
Size
534KB
-
MD5
e82003c412429ba0c86b80b300220dfd
-
SHA1
5d24bfd184cb2603e33a8b1a7162cba781f98678
-
SHA256
b1087dfb211841a764632385f1e75cc180817fae723f97d02ef7a8b2898a0eef
-
SHA512
1bdc0047ecfbb77e116d59b242e17590d80d108446ee9110b4590950e9393e1d06a872530ca1a2b39f60c9344dfd53e1ebee8529770204e45876f925a23274fe
-
SSDEEP
12288:GMroy90ZE0A2VCZGxObkdNoWZXwP4atx/cLi9XEA:6yCAGCZbkToWBwPdA60A
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr135226.exe healer behavioral1/memory/4656-15-0x0000000000EE0000-0x0000000000EEA000-memory.dmp healer -
Healer family
-
Processes:
jr135226.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr135226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr135226.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr135226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr135226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr135226.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr135226.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1048-22-0x0000000004A70000-0x0000000004AB6000-memory.dmp family_redline behavioral1/memory/1048-24-0x0000000004AF0000-0x0000000004B34000-memory.dmp family_redline behavioral1/memory/1048-32-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-36-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-88-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-84-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-82-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-80-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-78-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-76-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-72-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-70-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-66-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-64-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-62-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-60-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-58-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-56-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-54-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-52-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-50-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-48-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-46-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-44-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-42-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-40-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-38-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-34-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-86-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-74-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-68-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-30-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-28-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-26-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline behavioral1/memory/1048-25-0x0000000004AF0000-0x0000000004B2F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziUf3941.exejr135226.exeku489265.exepid process 3624 ziUf3941.exe 4656 jr135226.exe 1048 ku489265.exe -
Processes:
jr135226.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr135226.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziUf3941.exeb1087dfb211841a764632385f1e75cc180817fae723f97d02ef7a8b2898a0eef.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziUf3941.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b1087dfb211841a764632385f1e75cc180817fae723f97d02ef7a8b2898a0eef.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3384 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku489265.exeb1087dfb211841a764632385f1e75cc180817fae723f97d02ef7a8b2898a0eef.exeziUf3941.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku489265.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b1087dfb211841a764632385f1e75cc180817fae723f97d02ef7a8b2898a0eef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziUf3941.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr135226.exepid process 4656 jr135226.exe 4656 jr135226.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr135226.exeku489265.exedescription pid process Token: SeDebugPrivilege 4656 jr135226.exe Token: SeDebugPrivilege 1048 ku489265.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
b1087dfb211841a764632385f1e75cc180817fae723f97d02ef7a8b2898a0eef.exeziUf3941.exedescription pid process target process PID 4604 wrote to memory of 3624 4604 b1087dfb211841a764632385f1e75cc180817fae723f97d02ef7a8b2898a0eef.exe ziUf3941.exe PID 4604 wrote to memory of 3624 4604 b1087dfb211841a764632385f1e75cc180817fae723f97d02ef7a8b2898a0eef.exe ziUf3941.exe PID 4604 wrote to memory of 3624 4604 b1087dfb211841a764632385f1e75cc180817fae723f97d02ef7a8b2898a0eef.exe ziUf3941.exe PID 3624 wrote to memory of 4656 3624 ziUf3941.exe jr135226.exe PID 3624 wrote to memory of 4656 3624 ziUf3941.exe jr135226.exe PID 3624 wrote to memory of 1048 3624 ziUf3941.exe ku489265.exe PID 3624 wrote to memory of 1048 3624 ziUf3941.exe ku489265.exe PID 3624 wrote to memory of 1048 3624 ziUf3941.exe ku489265.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1087dfb211841a764632385f1e75cc180817fae723f97d02ef7a8b2898a0eef.exe"C:\Users\Admin\AppData\Local\Temp\b1087dfb211841a764632385f1e75cc180817fae723f97d02ef7a8b2898a0eef.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUf3941.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUf3941.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr135226.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr135226.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku489265.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku489265.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3384
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD530243ddeaf8605a232353e54fa2acbaf
SHA147b6dbafc1da797fc6cb9cef6cce38f42790f96f
SHA2567cefcd5e206882638b557c2476d7bc9ee29a370e6b398438bed7995b792f2854
SHA5123cd5fc4bd5070fc73c26e010f903fbc3523271ad349ed9a9772496629d27c3513cd605fbb7fac829b8af1d29912eb6342f2eb870dde76aa127a2b514192df898
-
Filesize
11KB
MD5a2b84b3779bafc10a06428d1a4bb0aa1
SHA1410298e5fa01c504466e6e6fce23777761d87d94
SHA25623c05535e852cda911a781c2332b624d8c8b48a0f9e9179f7fd50bbd8f1e5be2
SHA51291d9d38e432ece74d2259d9104d565fc673efc385d5470a1fcd3341a2e89b66d4d1d5defd57667449ca11d6f7bb7ab1e261763da4e90c2c3a7b7b62d4a32d7fc
-
Filesize
319KB
MD50b02a00fdb947d315977d1b3c4e9b128
SHA12e4df364f4df92e8ec5ec714d025ff72dffc5f25
SHA2560b9df04d9c1fadba7ffa55e84a48974df8533ce27efe8c22108baf54e51a65a2
SHA5129b36309f5f8fcd3fde08c604c8af64e7ac857688c44e654994a73ae2720f234183c39dc2305907f97f3236e1831f09bbf8d0dbfb72b13509e96f9413b8ea7b97