Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 16:07
Static task
static1
Behavioral task
behavioral1
Sample
1b25c2d121d368fc96ba600662abff3b7ac9f633103943c7f35b240824b3c09b.exe
Resource
win10v2004-20241007-en
General
-
Target
1b25c2d121d368fc96ba600662abff3b7ac9f633103943c7f35b240824b3c09b.exe
-
Size
548KB
-
MD5
ed9eca632ae0864001c31ee535d76724
-
SHA1
093ec5d38974b00fd955913c72b86dfe6f0ac492
-
SHA256
1b25c2d121d368fc96ba600662abff3b7ac9f633103943c7f35b240824b3c09b
-
SHA512
3c9e12bc0799053efe00c0b1afc754d26a8145888a4b923aeafa235299e428e079b3e4e50855f974cf85a7f2f083e52538b0f7d293b493e2a8c706702429d4a6
-
SSDEEP
12288:fMr4y90ZlS+zQ98D123+cEnjmasysrqUbK8MLJRCPyzN:XywlShA43ynjWbKjWPON
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr019710.exe healer behavioral1/memory/1160-15-0x0000000000B90000-0x0000000000B9A000-memory.dmp healer -
Healer family
-
Processes:
jr019710.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr019710.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr019710.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr019710.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr019710.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr019710.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr019710.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1368-22-0x0000000004D20000-0x0000000004D66000-memory.dmp family_redline behavioral1/memory/1368-24-0x0000000004DE0000-0x0000000004E24000-memory.dmp family_redline behavioral1/memory/1368-30-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-28-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-26-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-25-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-40-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-88-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-86-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-84-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-82-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-78-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-76-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-74-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-72-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-70-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-66-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-64-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-62-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-60-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-58-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-56-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-55-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-52-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-50-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-48-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-46-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-44-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-38-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-37-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-34-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-32-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-80-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-68-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/1368-42-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziYV3794.exejr019710.exeku473492.exepid process 4832 ziYV3794.exe 1160 jr019710.exe 1368 ku473492.exe -
Processes:
jr019710.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr019710.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
1b25c2d121d368fc96ba600662abff3b7ac9f633103943c7f35b240824b3c09b.exeziYV3794.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1b25c2d121d368fc96ba600662abff3b7ac9f633103943c7f35b240824b3c09b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziYV3794.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziYV3794.exeku473492.exe1b25c2d121d368fc96ba600662abff3b7ac9f633103943c7f35b240824b3c09b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziYV3794.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku473492.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b25c2d121d368fc96ba600662abff3b7ac9f633103943c7f35b240824b3c09b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr019710.exepid process 1160 jr019710.exe 1160 jr019710.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr019710.exeku473492.exedescription pid process Token: SeDebugPrivilege 1160 jr019710.exe Token: SeDebugPrivilege 1368 ku473492.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1b25c2d121d368fc96ba600662abff3b7ac9f633103943c7f35b240824b3c09b.exeziYV3794.exedescription pid process target process PID 2092 wrote to memory of 4832 2092 1b25c2d121d368fc96ba600662abff3b7ac9f633103943c7f35b240824b3c09b.exe ziYV3794.exe PID 2092 wrote to memory of 4832 2092 1b25c2d121d368fc96ba600662abff3b7ac9f633103943c7f35b240824b3c09b.exe ziYV3794.exe PID 2092 wrote to memory of 4832 2092 1b25c2d121d368fc96ba600662abff3b7ac9f633103943c7f35b240824b3c09b.exe ziYV3794.exe PID 4832 wrote to memory of 1160 4832 ziYV3794.exe jr019710.exe PID 4832 wrote to memory of 1160 4832 ziYV3794.exe jr019710.exe PID 4832 wrote to memory of 1368 4832 ziYV3794.exe ku473492.exe PID 4832 wrote to memory of 1368 4832 ziYV3794.exe ku473492.exe PID 4832 wrote to memory of 1368 4832 ziYV3794.exe ku473492.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b25c2d121d368fc96ba600662abff3b7ac9f633103943c7f35b240824b3c09b.exe"C:\Users\Admin\AppData\Local\Temp\1b25c2d121d368fc96ba600662abff3b7ac9f633103943c7f35b240824b3c09b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYV3794.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYV3794.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr019710.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr019710.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku473492.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku473492.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1368
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD512e840fedd97e3457a1f3bd30591872a
SHA1beeeda205027db69396347e1a05aeeaf6a0248d4
SHA256a0d02b1efc1e6465732146f8f6493f5f291ba33c5239b9954e0a567a7db58bd3
SHA512bffea1db94a010bb1aeb8cf0ad06572e353850e24589b159f76bb09a808a437afe8b54cf142b2bdda7c2e16c3738c814db060e836b40664a2a11f82f755d8084
-
Filesize
11KB
MD52ba35091955f256e0da61c7eefd22eb4
SHA156e0d7b74f7a333619f37c4c39893c008af6904b
SHA25619024e8c617245a5955fd61314583eb94d8affa9902dd8b16f1dea799afad2c4
SHA5129a1e33011f61170a79bed6e2acccc491aa3d66b63b262a386ded0d5543e4459bb805a1ace540c4338a3aa1e4d0796359b135e13d904a3e08e72e9b68b37e17fa
-
Filesize
348KB
MD541e0144df34082a941a701ebcab9ffce
SHA124ab1aa0d38772bd92cea058726a0aa1f9198b9b
SHA2566407238bcf8bb4f1c2ff2a40ab078dcd8defd8ea2ac9e35fd614b12604146181
SHA512af5d8988ed120860e52a7b3895e47807b7357f21e7969ca5f6ed9105a09c676b62e42eef366b224fec3cff0c404d7a899be7dc5652104c85f0c2cc92544e05f8