Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 11:27
Static task
static1
Behavioral task
behavioral1
Sample
eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab.exe
Resource
win10v2004-20241007-en
General
-
Target
eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab.exe
-
Size
534KB
-
MD5
c42c7615772c474d964071a4c46a64b0
-
SHA1
f6f36f99b5ea815c0c90557bf4488dfa482b7052
-
SHA256
eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab
-
SHA512
34b124cb634c20ef5b8d1134970196db8347825d7732158bae0e99263528ea958e717c7d2609b291bc3896c452a4e777c5b929792784c36ec512fc1279b899fe
-
SSDEEP
12288:cMrAy90X8ZUQKhXp2ifZDG/G0wzhO5sj+fxWQy:kyu8ZUQGF0wVFj+5WQy
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr873150.exe healer behavioral1/memory/4824-15-0x0000000000D20000-0x0000000000D2A000-memory.dmp healer -
Healer family
-
Processes:
jr873150.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr873150.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr873150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr873150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr873150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr873150.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr873150.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3236-22-0x00000000026E0000-0x0000000002726000-memory.dmp family_redline behavioral1/memory/3236-24-0x0000000002760000-0x00000000027A4000-memory.dmp family_redline behavioral1/memory/3236-40-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-38-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-88-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-84-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-82-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-80-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-78-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-76-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-74-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-72-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-70-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-68-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-66-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-62-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-60-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-58-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-56-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-54-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-52-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-50-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-48-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-46-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-44-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-42-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-36-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-34-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-32-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-30-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-86-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-64-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-28-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-26-0x0000000002760000-0x000000000279F000-memory.dmp family_redline behavioral1/memory/3236-25-0x0000000002760000-0x000000000279F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziya5166.exejr873150.exeku980068.exepid process 3872 ziya5166.exe 4824 jr873150.exe 3236 ku980068.exe -
Processes:
jr873150.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr873150.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab.exeziya5166.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziya5166.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 5608 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziya5166.exeku980068.exeeed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziya5166.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku980068.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr873150.exepid process 4824 jr873150.exe 4824 jr873150.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr873150.exeku980068.exedescription pid process Token: SeDebugPrivilege 4824 jr873150.exe Token: SeDebugPrivilege 3236 ku980068.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab.exeziya5166.exedescription pid process target process PID 4348 wrote to memory of 3872 4348 eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab.exe ziya5166.exe PID 4348 wrote to memory of 3872 4348 eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab.exe ziya5166.exe PID 4348 wrote to memory of 3872 4348 eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab.exe ziya5166.exe PID 3872 wrote to memory of 4824 3872 ziya5166.exe jr873150.exe PID 3872 wrote to memory of 4824 3872 ziya5166.exe jr873150.exe PID 3872 wrote to memory of 3236 3872 ziya5166.exe ku980068.exe PID 3872 wrote to memory of 3236 3872 ziya5166.exe ku980068.exe PID 3872 wrote to memory of 3236 3872 ziya5166.exe ku980068.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab.exe"C:\Users\Admin\AppData\Local\Temp\eed20d8540eb472e785252dc4939c45284c40124ec850c82f69159ac91277bab.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziya5166.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziya5166.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr873150.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr873150.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku980068.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku980068.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5608
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD59396c17e01c89aaa4f54e60536d16873
SHA1ba8785a2cbd3378357a1a81e55a62c6aa44f6a45
SHA256c1df7b43b3531929f662fd20fe49ef2d26598bc68efac9b5df91f79abf653b16
SHA5127feecd7c7723224e5c86f63c141764f916eef65645d4860697b578e580810a7e0ffb7ff1d64ae62509358d64d282a736140d3e3cd88760b3e3bc6ceebb90339e
-
Filesize
11KB
MD5b7d164a4031432253af1704813dbd012
SHA1016b8126ca1b26bf928e640a44b6d0233de703e6
SHA256a1b31a22da9cde3eefc0af7ea5298a29a84fb38f4e8b8b4ab2ab4f0a27a5e301
SHA5128b08e34c1c9d33d5587216a12c39991845613b2a949e3d06f30dbe9623f18f71f6c808d93d3b5d9bfd2b5efb3621a34b1e6a796f4933f96d48d199850f6863ec
-
Filesize
295KB
MD5cd3df869b53810804d6c69e89bc44c11
SHA1800d406d14825885623482934f75bc7ce55ad3ae
SHA25621edd2ea48dab49b1dad3db6c981f474b19dc1707c6b760268ec7b8a990f7aa5
SHA51235ecc33f6f47e29f561c8ee5ac68ac9f38a72c01e792d9769e6234ec59da4879c6f1644793236b0f6f4e13eadbbc95c488e0e35fdc381ca17a8714b6715440f6