Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 15:16
Static task
static1
Behavioral task
behavioral1
Sample
cea9b534ebf5165ad84227df5265abde9927bc9ab9fa83ca08eab5436bfc6575.exe
Resource
win10v2004-20241007-en
General
-
Target
cea9b534ebf5165ad84227df5265abde9927bc9ab9fa83ca08eab5436bfc6575.exe
-
Size
534KB
-
MD5
f546226bfc9cb393349f861323436eb6
-
SHA1
31b48c91c4d82007162f1a00de0a2bbc6593f3f3
-
SHA256
cea9b534ebf5165ad84227df5265abde9927bc9ab9fa83ca08eab5436bfc6575
-
SHA512
82c14a418630a0e8b255b82df5928afd8f93167730647e0fa6a784ac45111c10fd6536b3786a782b842d74af5209df2da9fa0469ea9aa7b33de0101ddc3c4d18
-
SSDEEP
12288:sMr2y90yY/cHWGjFjD2ZgkzSbCWUe8m6xK:ay3pHWqhPkz6CFefh
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr363524.exe healer behavioral1/memory/1416-15-0x0000000000AD0000-0x0000000000ADA000-memory.dmp healer -
Healer family
-
Processes:
jr363524.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr363524.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr363524.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr363524.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr363524.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr363524.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr363524.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2264-22-0x00000000025E0000-0x0000000002626000-memory.dmp family_redline behavioral1/memory/2264-24-0x0000000004AD0000-0x0000000004B14000-memory.dmp family_redline behavioral1/memory/2264-34-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-38-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-36-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-56-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-42-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-32-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-30-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-28-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-26-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-25-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-88-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-86-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-84-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-83-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-80-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-78-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-77-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-74-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-73-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-70-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-68-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-66-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-64-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-62-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-60-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-58-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-54-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-52-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-50-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-48-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-46-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-44-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline behavioral1/memory/2264-40-0x0000000004AD0000-0x0000000004B0F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziZI1811.exejr363524.exeku857798.exepid process 4272 ziZI1811.exe 1416 jr363524.exe 2264 ku857798.exe -
Processes:
jr363524.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr363524.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cea9b534ebf5165ad84227df5265abde9927bc9ab9fa83ca08eab5436bfc6575.exeziZI1811.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cea9b534ebf5165ad84227df5265abde9927bc9ab9fa83ca08eab5436bfc6575.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziZI1811.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cea9b534ebf5165ad84227df5265abde9927bc9ab9fa83ca08eab5436bfc6575.exeziZI1811.exeku857798.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cea9b534ebf5165ad84227df5265abde9927bc9ab9fa83ca08eab5436bfc6575.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziZI1811.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku857798.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr363524.exepid process 1416 jr363524.exe 1416 jr363524.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr363524.exeku857798.exedescription pid process Token: SeDebugPrivilege 1416 jr363524.exe Token: SeDebugPrivilege 2264 ku857798.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
cea9b534ebf5165ad84227df5265abde9927bc9ab9fa83ca08eab5436bfc6575.exeziZI1811.exedescription pid process target process PID 588 wrote to memory of 4272 588 cea9b534ebf5165ad84227df5265abde9927bc9ab9fa83ca08eab5436bfc6575.exe ziZI1811.exe PID 588 wrote to memory of 4272 588 cea9b534ebf5165ad84227df5265abde9927bc9ab9fa83ca08eab5436bfc6575.exe ziZI1811.exe PID 588 wrote to memory of 4272 588 cea9b534ebf5165ad84227df5265abde9927bc9ab9fa83ca08eab5436bfc6575.exe ziZI1811.exe PID 4272 wrote to memory of 1416 4272 ziZI1811.exe jr363524.exe PID 4272 wrote to memory of 1416 4272 ziZI1811.exe jr363524.exe PID 4272 wrote to memory of 2264 4272 ziZI1811.exe ku857798.exe PID 4272 wrote to memory of 2264 4272 ziZI1811.exe ku857798.exe PID 4272 wrote to memory of 2264 4272 ziZI1811.exe ku857798.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cea9b534ebf5165ad84227df5265abde9927bc9ab9fa83ca08eab5436bfc6575.exe"C:\Users\Admin\AppData\Local\Temp\cea9b534ebf5165ad84227df5265abde9927bc9ab9fa83ca08eab5436bfc6575.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZI1811.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZI1811.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr363524.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr363524.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku857798.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku857798.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2264
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD557e7d5b258a86dc423f20fc8fe7378e5
SHA1f249165679156c76bd3e42e2c7a29af1697f53ca
SHA2560652430f4de9a499a44aa39335329e05c0c238f8b712af4882cbd61362032028
SHA512db6147310a9659e599a5834999bd2417899057136356fb054dd55d234a29a7fe3ce278c774ecaf148a824d2cef46de533143f48799cde751d232e7e202c7bc70
-
Filesize
12KB
MD5c35830f469263dba3b8cec8575589f54
SHA131eff0df981c595630eac2eaa827b170abe8733d
SHA25697c01ac6c3f2875b222e71bfa0fe1ad210f0e70946ba45993c4ae34666c0e2fb
SHA5123ff3c545f6278184e7795286e6752714f03633871718038ae627afe0730a95f1b922aaf987f42b4586b6fd9a63591422f14844009e5c4ecfa651fe9f1cfd8a79
-
Filesize
319KB
MD540d305e2db30285cef87d83fc342bd99
SHA19acea789f1486791b138c928b198df1b4076e3ae
SHA25676e56f9efc38415ab8af65135e5b32e6e596c8117999797133caa24aed6aa7e2
SHA512975f4b53aef4eef93c8e304b1891bd6e8f7f7a8a96be6163f0cd0efe97097d33fda19640d8546ebf7d89f7725f9407cd5d4bd981bad92b6143a6d7e46eb3f405