Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:57
Static task
static1
Behavioral task
behavioral1
Sample
4947c87a237af3ffd21664146b3710a8de50a38a1443d592dd11d109fe99da7a.exe
Resource
win10v2004-20241007-en
General
-
Target
4947c87a237af3ffd21664146b3710a8de50a38a1443d592dd11d109fe99da7a.exe
-
Size
521KB
-
MD5
b9004e3062540e3611fdaa76ee286e21
-
SHA1
ff68eec33be1488ef42b3ebb37845a947b4058f0
-
SHA256
4947c87a237af3ffd21664146b3710a8de50a38a1443d592dd11d109fe99da7a
-
SHA512
fbca06c30c5ba8d38168bb2f199b5ebfaa69a1853cffd081088a89554b289cd6e62ee1820f42eac06ad02af53fb64eb50a7b3f574aa101161fada94020467c6a
-
SSDEEP
12288:DMr4y90YdkaLfTKvfO3jHVEsmrLisULqAR:Typdn+HOzHqsm6lWk
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr873943.exe healer behavioral1/memory/2552-15-0x0000000000AE0000-0x0000000000AEA000-memory.dmp healer -
Healer family
-
Processes:
jr873943.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr873943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr873943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr873943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr873943.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr873943.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr873943.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4616-22-0x00000000024C0000-0x0000000002506000-memory.dmp family_redline behavioral1/memory/4616-24-0x0000000002580000-0x00000000025C4000-memory.dmp family_redline behavioral1/memory/4616-34-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-32-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-30-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-28-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-26-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-25-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-44-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-88-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-86-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-84-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-82-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-80-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-78-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-76-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-74-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-72-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-68-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-66-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-65-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-62-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-58-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-56-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-54-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-52-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-50-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-46-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-42-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-40-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-38-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-36-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-70-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-60-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline behavioral1/memory/4616-48-0x0000000002580000-0x00000000025BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziWJ7947.exejr873943.exeku668611.exepid process 3664 ziWJ7947.exe 2552 jr873943.exe 4616 ku668611.exe -
Processes:
jr873943.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr873943.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4947c87a237af3ffd21664146b3710a8de50a38a1443d592dd11d109fe99da7a.exeziWJ7947.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4947c87a237af3ffd21664146b3710a8de50a38a1443d592dd11d109fe99da7a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWJ7947.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4947c87a237af3ffd21664146b3710a8de50a38a1443d592dd11d109fe99da7a.exeziWJ7947.exeku668611.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4947c87a237af3ffd21664146b3710a8de50a38a1443d592dd11d109fe99da7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziWJ7947.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku668611.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr873943.exepid process 2552 jr873943.exe 2552 jr873943.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr873943.exeku668611.exedescription pid process Token: SeDebugPrivilege 2552 jr873943.exe Token: SeDebugPrivilege 4616 ku668611.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4947c87a237af3ffd21664146b3710a8de50a38a1443d592dd11d109fe99da7a.exeziWJ7947.exedescription pid process target process PID 4804 wrote to memory of 3664 4804 4947c87a237af3ffd21664146b3710a8de50a38a1443d592dd11d109fe99da7a.exe ziWJ7947.exe PID 4804 wrote to memory of 3664 4804 4947c87a237af3ffd21664146b3710a8de50a38a1443d592dd11d109fe99da7a.exe ziWJ7947.exe PID 4804 wrote to memory of 3664 4804 4947c87a237af3ffd21664146b3710a8de50a38a1443d592dd11d109fe99da7a.exe ziWJ7947.exe PID 3664 wrote to memory of 2552 3664 ziWJ7947.exe jr873943.exe PID 3664 wrote to memory of 2552 3664 ziWJ7947.exe jr873943.exe PID 3664 wrote to memory of 4616 3664 ziWJ7947.exe ku668611.exe PID 3664 wrote to memory of 4616 3664 ziWJ7947.exe ku668611.exe PID 3664 wrote to memory of 4616 3664 ziWJ7947.exe ku668611.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4947c87a237af3ffd21664146b3710a8de50a38a1443d592dd11d109fe99da7a.exe"C:\Users\Admin\AppData\Local\Temp\4947c87a237af3ffd21664146b3710a8de50a38a1443d592dd11d109fe99da7a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWJ7947.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWJ7947.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr873943.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr873943.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku668611.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku668611.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4616
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
379KB
MD5e8c43ecd8c438bc6764acd63b2d36847
SHA1c69839672ea0f6b73f97e85268a9c2d14b257609
SHA25658e860a6f79a5cdf49d2158a30677cdba18e70c123c35c0f4574a68561f3865e
SHA512e3351feab4d0ec6f4ee32c95c3c1c28d2c67b3af57ce3948ab94cd39ed8caa550783ef5dfe6e29dd061cbdc411179cbfae6c56fb2a2081b8c325339074cd27b2
-
Filesize
15KB
MD536cf41440d8ce602349f8b9d79c62110
SHA1ad37909438feac96f44accbdbf715f83fb263acf
SHA25666565657043ebbc961974fa402117e8cfb8e67b56d4efdd80085a05f3568c288
SHA5125ae75e9022027d710a4a0bab13ac77087e956fa73f1731340fdd9b75bc8afb19f24722127f8bc59bb7a0ab19dc7b4a4716788181071c1fb47c360b96a0d7f528
-
Filesize
295KB
MD53a87fc4b56493783ce909f046f78cf34
SHA1cf5cbf003d815aa89e1d4f363b2d13c11361b3e2
SHA2566a3c83ae8b694ff30049514933bff4abd75e2de49c0d7d97a64eace2c5ebbca3
SHA5125514b9c53f4450095516b0d397d371af57c5f5ecea0c9f0ec5349992cba2ffdba4bca167c0d2ed1492be86f58b545b8b30faa826277cce1becdc3701a6f5e283