Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 15:08
Static task
static1
Behavioral task
behavioral1
Sample
33485abe7037f0b96591614bcc77408e01ebfd52dd9234da76ca30fdfef05cb9.exe
Resource
win10v2004-20241007-en
General
-
Target
33485abe7037f0b96591614bcc77408e01ebfd52dd9234da76ca30fdfef05cb9.exe
-
Size
522KB
-
MD5
c9cee46b6ed21a6b91381f8d9bb89eb4
-
SHA1
b12307a3ee470d119d131343ad52cb520c7051f8
-
SHA256
33485abe7037f0b96591614bcc77408e01ebfd52dd9234da76ca30fdfef05cb9
-
SHA512
bf2b7a3c7af25bb9aefa304cab30c82264e7eb15dd0ddf7a0ec1f05770dd6b5f0b956b863e544fb6ed002a5836622ec435d0b65089743715ad79e99b704bd972
-
SSDEEP
12288:rMrdy90w09A7ZKTCilssFHiUsUizH32tyKhfiUNwW:Ky89gsZOsFH10zH32tyKhfjNR
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr011186.exe healer behavioral1/memory/3520-15-0x0000000000F20000-0x0000000000F2A000-memory.dmp healer -
Healer family
-
Processes:
jr011186.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr011186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr011186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr011186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr011186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr011186.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr011186.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2600-21-0x00000000023C0000-0x0000000002406000-memory.dmp family_redline behavioral1/memory/2600-23-0x0000000002480000-0x00000000024C4000-memory.dmp family_redline behavioral1/memory/2600-31-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-49-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-87-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-85-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-83-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-81-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-77-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-75-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-73-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-71-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-69-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-67-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-63-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-61-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-59-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-57-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-55-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-53-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-47-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-45-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-43-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-41-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-39-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-37-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-35-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-33-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-29-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-79-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-65-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-51-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-27-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-25-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline behavioral1/memory/2600-24-0x0000000002480000-0x00000000024BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziNm4533.exejr011186.exeku607010.exepid process 4300 ziNm4533.exe 3520 jr011186.exe 2600 ku607010.exe -
Processes:
jr011186.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr011186.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
33485abe7037f0b96591614bcc77408e01ebfd52dd9234da76ca30fdfef05cb9.exeziNm4533.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 33485abe7037f0b96591614bcc77408e01ebfd52dd9234da76ca30fdfef05cb9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziNm4533.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3204 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziNm4533.exeku607010.exe33485abe7037f0b96591614bcc77408e01ebfd52dd9234da76ca30fdfef05cb9.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziNm4533.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku607010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33485abe7037f0b96591614bcc77408e01ebfd52dd9234da76ca30fdfef05cb9.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr011186.exepid process 3520 jr011186.exe 3520 jr011186.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr011186.exeku607010.exedescription pid process Token: SeDebugPrivilege 3520 jr011186.exe Token: SeDebugPrivilege 2600 ku607010.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
33485abe7037f0b96591614bcc77408e01ebfd52dd9234da76ca30fdfef05cb9.exeziNm4533.exedescription pid process target process PID 4588 wrote to memory of 4300 4588 33485abe7037f0b96591614bcc77408e01ebfd52dd9234da76ca30fdfef05cb9.exe ziNm4533.exe PID 4588 wrote to memory of 4300 4588 33485abe7037f0b96591614bcc77408e01ebfd52dd9234da76ca30fdfef05cb9.exe ziNm4533.exe PID 4588 wrote to memory of 4300 4588 33485abe7037f0b96591614bcc77408e01ebfd52dd9234da76ca30fdfef05cb9.exe ziNm4533.exe PID 4300 wrote to memory of 3520 4300 ziNm4533.exe jr011186.exe PID 4300 wrote to memory of 3520 4300 ziNm4533.exe jr011186.exe PID 4300 wrote to memory of 2600 4300 ziNm4533.exe ku607010.exe PID 4300 wrote to memory of 2600 4300 ziNm4533.exe ku607010.exe PID 4300 wrote to memory of 2600 4300 ziNm4533.exe ku607010.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\33485abe7037f0b96591614bcc77408e01ebfd52dd9234da76ca30fdfef05cb9.exe"C:\Users\Admin\AppData\Local\Temp\33485abe7037f0b96591614bcc77408e01ebfd52dd9234da76ca30fdfef05cb9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNm4533.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNm4533.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr011186.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr011186.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607010.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607010.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3204
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD50e3e0b47a621db28b70e8414296d6158
SHA18e0e05af00d67b6568b994b44c2913538edc2364
SHA2560754b66d71a60d5da46380245757c229a986408a2f22f0cadbea5ea81d779c00
SHA512789f016c884e452b8c0e7f9ce571e358a974453ff4b0ffc0fd7d10289079aeb2baeb08eb0d7dc8da0299244887e99cd7999e2d29b2f72c50ae34d767c78550c5
-
Filesize
14KB
MD59d4a65613d1a961e9ae83e4582dd995e
SHA1064cd6d5696fa5976b3c7f6fd343c62e63fc36cd
SHA2566980f6d5456ae1baaea90b71f321b8978e7de5b0fa287cc861e7f2ad0ac29cae
SHA512121b6bee1b5c9eebdd4a90ff8f0fc87f490fb8cf8c15cac697bfc1732fd9e206df2c10628514a79446d8dfbe4b521358783619f4bdd3ac6973928f271fa75f48
-
Filesize
295KB
MD53e34cb167b5305ea27f4bccfead9bc02
SHA1a7c6d11b130ddee3d89cb6a06674a9f2a0e3d239
SHA25606678993fdd04a6290c9aa43143741627494e50925770477adeb6d2bda5f95bb
SHA512b258df6bdb64566717a8ceba5fb9ef3602f2b109dc2b7a22614b8f41f5b246670771775e905b4278a5b8e1189ef35fcfd3c94226f8e4bc803662fd2a8b119ec9