Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:10
Static task
static1
Behavioral task
behavioral1
Sample
c08f51b9ca4b4bcf97ddab796514ea60fd6f6f812b079a8a8be42fdacc89e8cf.exe
Resource
win10v2004-20241007-en
General
-
Target
c08f51b9ca4b4bcf97ddab796514ea60fd6f6f812b079a8a8be42fdacc89e8cf.exe
-
Size
560KB
-
MD5
18f7a57313ce697d38c0507f7563d098
-
SHA1
bba9a10a576c72d37d75e44110af18be45441cd5
-
SHA256
c08f51b9ca4b4bcf97ddab796514ea60fd6f6f812b079a8a8be42fdacc89e8cf
-
SHA512
bd47b10a1ff11f87d005c27fcf541a604e78ba95baaadd38fb2f89bd95994ccd296f1f72a321477b6598e1de20252489c1e2bbb19f521b462bdba73554e2faba
-
SSDEEP
12288:UMrAy90ojdNrUx/QxSnU+YsfHEHVL9AI5kKA6lROv:sy/JNrDsvMAI5krzv
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr429713.exe healer behavioral1/memory/2728-15-0x0000000000AF0000-0x0000000000AFA000-memory.dmp healer -
Healer family
-
Processes:
jr429713.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr429713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr429713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr429713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr429713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr429713.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr429713.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4736-22-0x00000000028B0000-0x00000000028F6000-memory.dmp family_redline behavioral1/memory/4736-24-0x0000000004DF0000-0x0000000004E34000-memory.dmp family_redline behavioral1/memory/4736-34-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-38-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-36-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-88-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-76-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-64-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-32-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-30-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-28-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-26-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-25-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-86-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-84-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-82-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-80-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-78-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-74-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-72-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-70-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-68-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-66-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-62-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-60-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-58-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-56-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-54-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-53-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-50-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-49-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-46-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-44-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-42-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4736-40-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziBd4514.exejr429713.exeku342366.exepid process 1956 ziBd4514.exe 2728 jr429713.exe 4736 ku342366.exe -
Processes:
jr429713.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr429713.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c08f51b9ca4b4bcf97ddab796514ea60fd6f6f812b079a8a8be42fdacc89e8cf.exeziBd4514.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c08f51b9ca4b4bcf97ddab796514ea60fd6f6f812b079a8a8be42fdacc89e8cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziBd4514.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c08f51b9ca4b4bcf97ddab796514ea60fd6f6f812b079a8a8be42fdacc89e8cf.exeziBd4514.exeku342366.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c08f51b9ca4b4bcf97ddab796514ea60fd6f6f812b079a8a8be42fdacc89e8cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziBd4514.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku342366.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr429713.exepid process 2728 jr429713.exe 2728 jr429713.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr429713.exeku342366.exedescription pid process Token: SeDebugPrivilege 2728 jr429713.exe Token: SeDebugPrivilege 4736 ku342366.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c08f51b9ca4b4bcf97ddab796514ea60fd6f6f812b079a8a8be42fdacc89e8cf.exeziBd4514.exedescription pid process target process PID 2124 wrote to memory of 1956 2124 c08f51b9ca4b4bcf97ddab796514ea60fd6f6f812b079a8a8be42fdacc89e8cf.exe ziBd4514.exe PID 2124 wrote to memory of 1956 2124 c08f51b9ca4b4bcf97ddab796514ea60fd6f6f812b079a8a8be42fdacc89e8cf.exe ziBd4514.exe PID 2124 wrote to memory of 1956 2124 c08f51b9ca4b4bcf97ddab796514ea60fd6f6f812b079a8a8be42fdacc89e8cf.exe ziBd4514.exe PID 1956 wrote to memory of 2728 1956 ziBd4514.exe jr429713.exe PID 1956 wrote to memory of 2728 1956 ziBd4514.exe jr429713.exe PID 1956 wrote to memory of 4736 1956 ziBd4514.exe ku342366.exe PID 1956 wrote to memory of 4736 1956 ziBd4514.exe ku342366.exe PID 1956 wrote to memory of 4736 1956 ziBd4514.exe ku342366.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c08f51b9ca4b4bcf97ddab796514ea60fd6f6f812b079a8a8be42fdacc89e8cf.exe"C:\Users\Admin\AppData\Local\Temp\c08f51b9ca4b4bcf97ddab796514ea60fd6f6f812b079a8a8be42fdacc89e8cf.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBd4514.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBd4514.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr429713.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr429713.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku342366.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku342366.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4736
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD5a980b0e851c498e951d7c44ec5b5f441
SHA10ad77e8bd2b9c102d618798a889d28bf25d85f4c
SHA256959f3eddfd758c9224157a41cdbff40514e77a504dda0238bcf06d57b5df45a0
SHA51201a45a3aa2ab19560d731b015f9c9765a76154ed9978ff2a897c4da9b2123a4704431d00db1df1200b710d91521eaf849d469153e107da41c4ce9310237e34c8
-
Filesize
13KB
MD54e3dc94cd5ce065af5b9df86565be9f7
SHA1cbacfae0390941a8f0bb603acdcb66583a5672a5
SHA256a7d16596dc2ab52b51d73f17ff3a47d4909779ee279d8a02e96f25bfdace8958
SHA5123f83600a1d73b17b486634a3ea953ddc8d71b333739c26c011b7e5bb146ab2d261bcc66d6a66b302e9df834c4912ec1ec3f7b34e46ab3e5c5f49633278c422ac
-
Filesize
370KB
MD5a4fdaaa61c54a502fbc369cd655bd4fb
SHA1b4b149e4e94c0d7f30a5bb7a8bdac16456e155e4
SHA256e15f18fbfa6f94a774bf52d8d3cdc20da6b3a26f40cfd76245462d3466f22bf3
SHA512884d27160bc6003353b520e812eede2c9734245c30c96a93d93bed5af88daa6bb39466d78d2810690e859a6aea3e1c5fa44129f9d9cdc11ddd22c2ffb39e0165