Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add.exe
Resource
win10v2004-20241007-en
General
-
Target
560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add.exe
-
Size
530KB
-
MD5
780eb5654894c821bc20a1a27691c2c6
-
SHA1
58cb12fcc4e6e313c30cf7471cecf7d73c72d73c
-
SHA256
560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add
-
SHA512
897eddc130dd79d5fbbf0b9b719b73cc4624dc4b317b99b535cd10198beb93be51d8e65003aa5398f602d7269d1f05af911870ee2ff71d20506f78fdaa59d43d
-
SSDEEP
6144:Kpy+bnr+rp0yN90QEV6bVZ1QaGcP8MKghPLveRDBC3e9RZzxxEDwoxEJYvHxIr7C:HMrTy90m3+C8zGve/1ZzvE8oxBRuvMl
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr369251.exe healer behavioral1/memory/3112-15-0x0000000000A50000-0x0000000000A5A000-memory.dmp healer -
Healer family
-
Processes:
jr369251.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr369251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr369251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr369251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr369251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr369251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr369251.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/228-22-0x0000000004B50000-0x0000000004B96000-memory.dmp family_redline behavioral1/memory/228-24-0x0000000007190000-0x00000000071D4000-memory.dmp family_redline behavioral1/memory/228-84-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-66-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-50-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-28-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-25-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-88-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-86-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-82-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-80-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-78-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-76-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-74-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-72-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-70-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-68-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-64-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-62-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-60-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-58-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-56-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-54-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-52-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-48-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-46-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-44-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-42-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-40-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-38-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-36-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-34-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-32-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-30-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline behavioral1/memory/228-26-0x0000000007190000-0x00000000071CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziEw5064.exejr369251.exeku040245.exepid process 3064 ziEw5064.exe 3112 jr369251.exe 228 ku040245.exe -
Processes:
jr369251.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr369251.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add.exeziEw5064.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEw5064.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add.exeziEw5064.exeku040245.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziEw5064.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku040245.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr369251.exepid process 3112 jr369251.exe 3112 jr369251.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr369251.exeku040245.exedescription pid process Token: SeDebugPrivilege 3112 jr369251.exe Token: SeDebugPrivilege 228 ku040245.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add.exeziEw5064.exedescription pid process target process PID 1496 wrote to memory of 3064 1496 560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add.exe ziEw5064.exe PID 1496 wrote to memory of 3064 1496 560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add.exe ziEw5064.exe PID 1496 wrote to memory of 3064 1496 560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add.exe ziEw5064.exe PID 3064 wrote to memory of 3112 3064 ziEw5064.exe jr369251.exe PID 3064 wrote to memory of 3112 3064 ziEw5064.exe jr369251.exe PID 3064 wrote to memory of 228 3064 ziEw5064.exe ku040245.exe PID 3064 wrote to memory of 228 3064 ziEw5064.exe ku040245.exe PID 3064 wrote to memory of 228 3064 ziEw5064.exe ku040245.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add.exe"C:\Users\Admin\AppData\Local\Temp\560c4fb87f585547c78f90eec8465af94e7ea81dc27730f14bfaba68cc331add.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEw5064.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEw5064.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr369251.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr369251.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku040245.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku040245.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD53fb5804a5ccc525e9d908964ee04f856
SHA1bbcb0916905b1fff1128094d1281bd433ad13ca4
SHA256354018c7b1b70623c4e031d257e60d81686b03afc46a169764819ded9efe731f
SHA5123799a092a6b734ff776d11495f2fd5ef722eee3ce38636148511c7d14c91585671d988b3c964704bf3ba888dbe771e9cd43f4cbf0aaf8e0c7e91a963eba781f3
-
Filesize
11KB
MD5a4051cea1b9a4b9a175aa5316e4f248b
SHA1fa488793db62e5ff4bc64ea795e8b2801a1e58f5
SHA2565e63a27875ab5b1913146f0299afe4c78c104d02e85d5ec9e40726cbafe79ab9
SHA5121af75c592870cb6515aa99e8e0b594d0416e41b9b48f4904dc9e780c9ec242d924666d4eee2eb8b1a7300a1fd04d2af75ee71520ca3278fbbc16cb9c3ed5a8ee
-
Filesize
354KB
MD50084d55beabbb299ed987101d2209809
SHA1365d6326cc949d0511427cfa131cfb981f0a6383
SHA2563faff1d27c7500670eb18788dc4f8440c11b441d1afc9afc99fd9bc9a3104a67
SHA5128886a889c8a70ad3f95c16ca5997618b6b72196163ea6eb2f58fdb1508fd2b5c20a2d083798a38b120d866cba035e547c3a18fd693fc5a167f87d89420ab8761