Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 12:07
Static task
static1
Behavioral task
behavioral1
Sample
82730fe27078a48bc93c00a8483bd08253a31d677941c9d6ea159b202c6992a3.exe
Resource
win10v2004-20241007-en
General
-
Target
82730fe27078a48bc93c00a8483bd08253a31d677941c9d6ea159b202c6992a3.exe
-
Size
537KB
-
MD5
83e857cec9eec14d50ae780f6d487218
-
SHA1
e1466a9f01e3fb91ef1663eaf431efd828b4c25b
-
SHA256
82730fe27078a48bc93c00a8483bd08253a31d677941c9d6ea159b202c6992a3
-
SHA512
dffff4f593b06bcc3be547f0c4017442ddff4137e183ccdb7e83fe2ff08e6f3c94aa62056f702072d0349d3ba85f5b895cbe568e404e4582c6f47c38f8554741
-
SSDEEP
12288:9Mrsy90/vYIfwYP9HrFwpx1UUdHowQ4wXZgt3OYV:9yVYPXwz1VIwQ4WZO3OYV
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr043450.exe healer behavioral1/memory/756-15-0x00000000006B0000-0x00000000006BA000-memory.dmp healer -
Healer family
-
Processes:
jr043450.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr043450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr043450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr043450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr043450.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr043450.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr043450.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4824-22-0x00000000028E0000-0x0000000002926000-memory.dmp family_redline behavioral1/memory/4824-24-0x0000000005410000-0x0000000005454000-memory.dmp family_redline behavioral1/memory/4824-78-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-76-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-88-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-86-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-84-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-82-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-80-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-74-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-72-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-70-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-68-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-66-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-64-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-62-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-60-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-58-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-56-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-52-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-50-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-48-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-46-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-44-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-42-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-40-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-36-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-34-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-32-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-30-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-54-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-38-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-28-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-26-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4824-25-0x0000000005410000-0x000000000544F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziWT1202.exejr043450.exeku542989.exepid process 4784 ziWT1202.exe 756 jr043450.exe 4824 ku542989.exe -
Processes:
jr043450.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr043450.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
82730fe27078a48bc93c00a8483bd08253a31d677941c9d6ea159b202c6992a3.exeziWT1202.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 82730fe27078a48bc93c00a8483bd08253a31d677941c9d6ea159b202c6992a3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWT1202.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
82730fe27078a48bc93c00a8483bd08253a31d677941c9d6ea159b202c6992a3.exeziWT1202.exeku542989.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 82730fe27078a48bc93c00a8483bd08253a31d677941c9d6ea159b202c6992a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziWT1202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku542989.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr043450.exepid process 756 jr043450.exe 756 jr043450.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr043450.exeku542989.exedescription pid process Token: SeDebugPrivilege 756 jr043450.exe Token: SeDebugPrivilege 4824 ku542989.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
82730fe27078a48bc93c00a8483bd08253a31d677941c9d6ea159b202c6992a3.exeziWT1202.exedescription pid process target process PID 2892 wrote to memory of 4784 2892 82730fe27078a48bc93c00a8483bd08253a31d677941c9d6ea159b202c6992a3.exe ziWT1202.exe PID 2892 wrote to memory of 4784 2892 82730fe27078a48bc93c00a8483bd08253a31d677941c9d6ea159b202c6992a3.exe ziWT1202.exe PID 2892 wrote to memory of 4784 2892 82730fe27078a48bc93c00a8483bd08253a31d677941c9d6ea159b202c6992a3.exe ziWT1202.exe PID 4784 wrote to memory of 756 4784 ziWT1202.exe jr043450.exe PID 4784 wrote to memory of 756 4784 ziWT1202.exe jr043450.exe PID 4784 wrote to memory of 4824 4784 ziWT1202.exe ku542989.exe PID 4784 wrote to memory of 4824 4784 ziWT1202.exe ku542989.exe PID 4784 wrote to memory of 4824 4784 ziWT1202.exe ku542989.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82730fe27078a48bc93c00a8483bd08253a31d677941c9d6ea159b202c6992a3.exe"C:\Users\Admin\AppData\Local\Temp\82730fe27078a48bc93c00a8483bd08253a31d677941c9d6ea159b202c6992a3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWT1202.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWT1202.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr043450.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr043450.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku542989.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku542989.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4824
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5333765d974b1a740a4ff60dc5f9c0583
SHA1bf582958b5c6cbe2d1695a6835d07e87b01b4aaf
SHA25617013d0a87a7f91190afab5e5ef4c7eceacb733c76c69958d39ca81eb203b9e1
SHA5122c60e73421249038f6c42450b4d98274fa1e5cc715369eeb677b36bcb142571baf8a58457efacf12c05f703fb2a8d45b3bd8dab91ac13fec6eb392e24b5e0311
-
Filesize
14KB
MD53da18b80a1df7d7fdc334a943b071b2b
SHA10db7681749b0f2965a7097883400284c93e34d28
SHA2569b83021343c207b9e11990c12688c72f902db3da6ebd95e31bae445c8ba238f1
SHA512bf02fcf1a544277d179c3dd7f3affc482ab233b9cc47f4df3ec764760172750122aebd93b5dd4a5d8659bb837d505ba03be46b52c8c51c50b1da9537ae79a1ac
-
Filesize
352KB
MD582f73519e012fd4b69b7eb4c42441954
SHA1b468320602c1a8656a090f9507cd9711a7e1ae41
SHA256f41512c6ccf92ded4d827ba0cd8c752b8ff6fd8ca89908fe89440531bbed45b1
SHA51280c25d86a4472637313afb762f4b5898919aee3007ee0b63414b25f81907a91212d338876c947c30c1128427e334d605f4d120955ec133f90256e7227ca15d59