Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:31
Static task
static1
Behavioral task
behavioral1
Sample
9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exe
Resource
win10v2004-20241007-en
General
-
Target
9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exe
-
Size
538KB
-
MD5
ee86eacadeea921935873111a585631f
-
SHA1
aacee38d1c36789085a5767f180a1034c68c49ea
-
SHA256
9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60
-
SHA512
489e3f6fe2b9f6a608ca0004fb18c13a5870b1f3b8fd959139090d8fc282e6b4c8b57cf1b498777183114f0f601fbd247af55d7b0884ffec16b4f3dd5bf118cd
-
SSDEEP
12288:5Mray907CJzpw73SOwEm7+6HBfI3NFhTl8:DyGWK73SOHmHBADh2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr070685.exe healer behavioral1/memory/4936-15-0x00000000009E0000-0x00000000009EA000-memory.dmp healer -
Healer family
-
Processes:
jr070685.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr070685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr070685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr070685.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr070685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr070685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr070685.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4524-22-0x0000000002610000-0x0000000002656000-memory.dmp family_redline behavioral1/memory/4524-24-0x0000000002890000-0x00000000028D4000-memory.dmp family_redline behavioral1/memory/4524-30-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-38-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-89-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-86-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-84-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-82-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-80-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-78-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-76-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-74-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-70-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-68-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-66-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-64-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-62-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-60-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-58-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-56-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-54-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-52-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-48-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-46-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-44-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-42-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-40-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-36-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-34-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-32-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-72-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-50-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-28-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-26-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline behavioral1/memory/4524-25-0x0000000002890000-0x00000000028CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziOu7035.exejr070685.exeku136056.exepid process 2228 ziOu7035.exe 4936 jr070685.exe 4524 ku136056.exe -
Processes:
jr070685.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr070685.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziOu7035.exe9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziOu7035.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4972 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exeziOu7035.exeku136056.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziOu7035.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku136056.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr070685.exepid process 4936 jr070685.exe 4936 jr070685.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr070685.exeku136056.exedescription pid process Token: SeDebugPrivilege 4936 jr070685.exe Token: SeDebugPrivilege 4524 ku136056.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exeziOu7035.exedescription pid process target process PID 1724 wrote to memory of 2228 1724 9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exe ziOu7035.exe PID 1724 wrote to memory of 2228 1724 9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exe ziOu7035.exe PID 1724 wrote to memory of 2228 1724 9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exe ziOu7035.exe PID 2228 wrote to memory of 4936 2228 ziOu7035.exe jr070685.exe PID 2228 wrote to memory of 4936 2228 ziOu7035.exe jr070685.exe PID 2228 wrote to memory of 4524 2228 ziOu7035.exe ku136056.exe PID 2228 wrote to memory of 4524 2228 ziOu7035.exe ku136056.exe PID 2228 wrote to memory of 4524 2228 ziOu7035.exe ku136056.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exe"C:\Users\Admin\AppData\Local\Temp\9676e40afe38e5bac4e0193d14d8e7f45a7cd4077081c999751a020e1c375d60.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOu7035.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOu7035.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr070685.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr070685.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku136056.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku136056.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4524
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4972
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
396KB
MD57f99f016e98b760d785305fb5aa713f1
SHA10168f3a252d603ca3c0bf4315c763ff4584fbae4
SHA2561714d0935fe5bc7e83434669d196286bb851433c5c0b60db482b4498b1089d1d
SHA512fe09acd152d7254d94dc5b35c5db1ff87c8875cc1129188b1d4383168113d8ded35e0e39f61416c9a9ea59fe1e2218413c43bb12f358734f94d3eaf995612eaa
-
Filesize
13KB
MD57bed716a2755d79709c78ba8170fa440
SHA16f1a2bc923177833fceb3f4081182d86fa7b52b4
SHA2565df8b200d436b725f8d3846b1d8f16aa87e82b3a6ccd5df06fd48526bb27210e
SHA5122f4b216973a0a1b90a16ea15a15eb1e9c724f421a9e445241fed5ab1d529bd1e37dfb08cdba15924461e867fc57378d2f699ca8d071ac008edd834e73db4ebc9
-
Filesize
353KB
MD5d59b78e8b010fc2df2d8d4305ee5782e
SHA10c3f1dadefb6822710add3ad783ba285093a4b29
SHA2564e4798c6b67e6db1c93e7da8adbe44b7dd67e11ea00c1681add2fe75fd81dcdf
SHA512fc852084b32aaacb7db3ac389e6028af90d4f52c06a5ec46ec313395c125c840aa4d03ddfb922607f83adcbe304c031ced0da158c6ab5883d1784cd66f36116e