Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:58
Static task
static1
Behavioral task
behavioral1
Sample
4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c.exe
Resource
win10v2004-20241007-en
General
-
Target
4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c.exe
-
Size
538KB
-
MD5
8fa7547b35260ca0c377cba55c334a20
-
SHA1
7dca0c0d42eb0b4f2541801ccb0db4cd1bb5bf4c
-
SHA256
4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c
-
SHA512
9a1a226a3855d5903377a9e910a05b4117993b04802b33ed32e947cfde6f66c6162759a22217ef97d2227b704bce8db4241b71047c24c3084f4f03b1873da7ed
-
SSDEEP
12288:eMrLy901MlCrPLlWIaTfivvKjeJ/QNBkFZXht:Ry2uCUIa7AJINmXb
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr865946.exe healer behavioral1/memory/3972-15-0x0000000000F80000-0x0000000000F8A000-memory.dmp healer -
Healer family
-
Processes:
jr865946.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr865946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr865946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr865946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr865946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr865946.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr865946.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2748-22-0x0000000004D20000-0x0000000004D66000-memory.dmp family_redline behavioral1/memory/2748-24-0x00000000053A0000-0x00000000053E4000-memory.dmp family_redline behavioral1/memory/2748-30-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-48-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-88-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-86-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-84-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-80-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-78-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-76-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-74-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-72-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-70-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-68-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-64-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-62-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-60-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-58-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-56-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-54-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-52-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-46-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-44-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-40-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-38-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-34-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-82-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-66-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-50-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-42-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-36-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-32-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-28-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-26-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2748-25-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziof7503.exejr865946.exeku026340.exepid process 4376 ziof7503.exe 3972 jr865946.exe 2748 ku026340.exe -
Processes:
jr865946.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr865946.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c.exeziof7503.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziof7503.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c.exeziof7503.exeku026340.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziof7503.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku026340.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr865946.exepid process 3972 jr865946.exe 3972 jr865946.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr865946.exeku026340.exedescription pid process Token: SeDebugPrivilege 3972 jr865946.exe Token: SeDebugPrivilege 2748 ku026340.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c.exeziof7503.exedescription pid process target process PID 4068 wrote to memory of 4376 4068 4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c.exe ziof7503.exe PID 4068 wrote to memory of 4376 4068 4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c.exe ziof7503.exe PID 4068 wrote to memory of 4376 4068 4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c.exe ziof7503.exe PID 4376 wrote to memory of 3972 4376 ziof7503.exe jr865946.exe PID 4376 wrote to memory of 3972 4376 ziof7503.exe jr865946.exe PID 4376 wrote to memory of 2748 4376 ziof7503.exe ku026340.exe PID 4376 wrote to memory of 2748 4376 ziof7503.exe ku026340.exe PID 4376 wrote to memory of 2748 4376 ziof7503.exe ku026340.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c.exe"C:\Users\Admin\AppData\Local\Temp\4a31ca90761a30042eda8e734afa62471ae2822342a3fb287bab241b6264b83c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziof7503.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziof7503.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr865946.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr865946.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku026340.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku026340.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2748
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5da167e813bb7dee2b389eb78285ada76
SHA1638539e65083365d8939f782356af898f31e8103
SHA2569fb14c6991b58416dfed214ad49cbd093f560f1b436b37fbbc8cff3f61c2aa58
SHA512dfde408939a6078d0c74b5bb8ca2190d53d46c80d2b8df4d73c5d49d7e38462d09032c8617126be40049e50f0384b57d8101f9e17b76ac332952a4bc142653b9
-
Filesize
13KB
MD5dc159fb79c3d3dc53699a33e00641c4f
SHA119727096e63b8219f29cc8057c0398e581ec5f29
SHA2564a662ac61de46d8ba17ea917ecaa3676f649b9de66836931a5368f31f9895baf
SHA5120dad2886b358f38e53ad89b89d5aa51942a8860c41b4666a6afe44a9bd3aeef218b2eb1c2fe27276a564a4b9472d8f1427e48b7ba37a9aa9d1e4c767e8b5492b
-
Filesize
353KB
MD58073b8bf2248a604cf143f27b124ae58
SHA1a8c7dc77a240fb2b27c64e6992103aa8b325f52c
SHA2566d20ef64e346e39dc7cef3dd46ad1ed469891283b193233382053859d2ebe1a1
SHA512686a1dc020302ad786f595bad8d674ee1b4462ffcc57353c3cc7e44b8744e49118cc1be40de6d70f662c14566bb7930d579c5c1454ffe76e78b6b4cd03cfc29a