Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
87d90d6b96327176b64b79d8097e5a0c432bf65bf0b5722a4c3ebf028d64d266.exe
Resource
win10v2004-20241007-en
General
-
Target
87d90d6b96327176b64b79d8097e5a0c432bf65bf0b5722a4c3ebf028d64d266.exe
-
Size
537KB
-
MD5
3cb87574485101e207259c5bc00d129a
-
SHA1
39d94594a3c4e75e76618a2810974e339be0e93e
-
SHA256
87d90d6b96327176b64b79d8097e5a0c432bf65bf0b5722a4c3ebf028d64d266
-
SHA512
032ce3b03c78aeb19a68479c3713ff5dc43a34a38d1b357bfac0ddbc5fd5799f4b1fb24ca6949126dad5c1ea071b834761197b9bfa1234cecf8c266fbd2dbeb8
-
SSDEEP
12288:6Mroy90JoQSSLiqQepINFni+W4xKU1jHjwrppLoZpVAythg:+yANZF/qNFZW4xKcDwFYg
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr124545.exe healer behavioral1/memory/880-15-0x0000000000690000-0x000000000069A000-memory.dmp healer -
Healer family
-
Processes:
jr124545.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr124545.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr124545.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr124545.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr124545.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr124545.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr124545.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3856-22-0x0000000002900000-0x0000000002946000-memory.dmp family_redline behavioral1/memory/3856-24-0x00000000053F0000-0x0000000005434000-memory.dmp family_redline behavioral1/memory/3856-30-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-40-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-86-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-84-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-82-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-80-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-78-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-76-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-74-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-70-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-68-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-66-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-64-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-62-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-60-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-58-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-56-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-54-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-52-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-48-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-46-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-44-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-42-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-38-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-36-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-34-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-32-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-88-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-72-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-50-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-28-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-26-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline behavioral1/memory/3856-25-0x00000000053F0000-0x000000000542F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zins6656.exejr124545.exeku895208.exepid process 4400 zins6656.exe 880 jr124545.exe 3856 ku895208.exe -
Processes:
jr124545.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr124545.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
zins6656.exe87d90d6b96327176b64b79d8097e5a0c432bf65bf0b5722a4c3ebf028d64d266.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zins6656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 87d90d6b96327176b64b79d8097e5a0c432bf65bf0b5722a4c3ebf028d64d266.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2608 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
87d90d6b96327176b64b79d8097e5a0c432bf65bf0b5722a4c3ebf028d64d266.exezins6656.exeku895208.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87d90d6b96327176b64b79d8097e5a0c432bf65bf0b5722a4c3ebf028d64d266.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zins6656.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku895208.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr124545.exepid process 880 jr124545.exe 880 jr124545.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr124545.exeku895208.exedescription pid process Token: SeDebugPrivilege 880 jr124545.exe Token: SeDebugPrivilege 3856 ku895208.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
87d90d6b96327176b64b79d8097e5a0c432bf65bf0b5722a4c3ebf028d64d266.exezins6656.exedescription pid process target process PID 2580 wrote to memory of 4400 2580 87d90d6b96327176b64b79d8097e5a0c432bf65bf0b5722a4c3ebf028d64d266.exe zins6656.exe PID 2580 wrote to memory of 4400 2580 87d90d6b96327176b64b79d8097e5a0c432bf65bf0b5722a4c3ebf028d64d266.exe zins6656.exe PID 2580 wrote to memory of 4400 2580 87d90d6b96327176b64b79d8097e5a0c432bf65bf0b5722a4c3ebf028d64d266.exe zins6656.exe PID 4400 wrote to memory of 880 4400 zins6656.exe jr124545.exe PID 4400 wrote to memory of 880 4400 zins6656.exe jr124545.exe PID 4400 wrote to memory of 3856 4400 zins6656.exe ku895208.exe PID 4400 wrote to memory of 3856 4400 zins6656.exe ku895208.exe PID 4400 wrote to memory of 3856 4400 zins6656.exe ku895208.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87d90d6b96327176b64b79d8097e5a0c432bf65bf0b5722a4c3ebf028d64d266.exe"C:\Users\Admin\AppData\Local\Temp\87d90d6b96327176b64b79d8097e5a0c432bf65bf0b5722a4c3ebf028d64d266.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zins6656.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zins6656.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr124545.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr124545.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:880 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku895208.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku895208.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2608
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5fb098832e049cbb023633bad022ce51f
SHA1d2037f56d5e8b00a2fd4cd691ac5cada1ef0a6ea
SHA2564d598f5092e7dc0967f9b731351c4662f585fbdca04775af9424475b94218b54
SHA5120dbf350e88b387f8a863322bd68103199f94c7d81a27b3a1b2465554ac02786a476f9b781a84d9ca800aaf0ba71d009ef8f841dcf094990d276d4cc464550238
-
Filesize
14KB
MD55cbbaa19f5eedac65f4d25a861537b27
SHA187b7da49af7d6e409307e048226da1304c00a4d6
SHA256e71d3b50ebe930aa6dba731fdfa61acddfd2bf2e9473eb16bce865a0cd836a0c
SHA512c7eb6f3f5c2683e0fe819036c512b579c1bfdd119790e328966dbbf967002edfe172649e23eb4962a14b638fa24395d55d7040e70bcd14f11cb3a472374c159b
-
Filesize
352KB
MD5f10d85d16a786c565921a9f756749683
SHA1601c1828b69982e10a0849e38b1d61239ad8626a
SHA256ebfc273f55f7e77a21fbd209cc42080a9ae97133a3a6ea19d2d3e76478ad86f9
SHA512da0e5e4a45e796a855cfb258887297604338de9263008a42e67164384e8d74e2573675f02bec36805e709ec6d2a76e7b081c1cf03b7b72c7164e679f05b9bcd1