Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:03
Static task
static1
Behavioral task
behavioral1
Sample
a756148d9f5cb7f40fc9eee64d604ac6eba6d8eae5e88a53575d82e6f7c1c40a.exe
Resource
win10v2004-20241007-en
General
-
Target
a756148d9f5cb7f40fc9eee64d604ac6eba6d8eae5e88a53575d82e6f7c1c40a.exe
-
Size
530KB
-
MD5
48666a3f32fc4f571f2e0b40102a513b
-
SHA1
958b5855bc50f95708632f90c6f1df06809719ad
-
SHA256
a756148d9f5cb7f40fc9eee64d604ac6eba6d8eae5e88a53575d82e6f7c1c40a
-
SHA512
87b18d948ea033a2b2fcf34021d4c2819a5a63ee7bc90c74e31bbad2df6efc3630ff3c5e420695978f224e351ae89400826a705df89ee64f787a3151b9adedb3
-
SSDEEP
12288:UMrdy90q0/Erz/Mj+0q/+mgp/5rf5KXa/smkBkuxwAKZLJzYrP9e:ByeEMjg2mgpNADmkBNxKTck
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr079973.exe healer behavioral1/memory/1732-15-0x0000000000AF0000-0x0000000000AFA000-memory.dmp healer -
Healer family
-
Processes:
jr079973.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr079973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr079973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr079973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr079973.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr079973.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr079973.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/60-22-0x0000000002430000-0x0000000002476000-memory.dmp family_redline behavioral1/memory/60-24-0x0000000004D00000-0x0000000004D44000-memory.dmp family_redline behavioral1/memory/60-50-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-88-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-86-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-84-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-83-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-80-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-78-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-74-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-72-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-70-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-68-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-66-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-62-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-60-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-58-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-56-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-54-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-52-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-48-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-46-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-44-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-42-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-40-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-38-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-36-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-34-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-32-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-30-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-76-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-65-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-28-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-26-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline behavioral1/memory/60-25-0x0000000004D00000-0x0000000004D3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziUi0996.exejr079973.exeku450115.exepid process 2368 ziUi0996.exe 1732 jr079973.exe 60 ku450115.exe -
Processes:
jr079973.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr079973.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
a756148d9f5cb7f40fc9eee64d604ac6eba6d8eae5e88a53575d82e6f7c1c40a.exeziUi0996.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a756148d9f5cb7f40fc9eee64d604ac6eba6d8eae5e88a53575d82e6f7c1c40a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziUi0996.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziUi0996.exeku450115.exea756148d9f5cb7f40fc9eee64d604ac6eba6d8eae5e88a53575d82e6f7c1c40a.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziUi0996.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku450115.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a756148d9f5cb7f40fc9eee64d604ac6eba6d8eae5e88a53575d82e6f7c1c40a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr079973.exepid process 1732 jr079973.exe 1732 jr079973.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr079973.exeku450115.exedescription pid process Token: SeDebugPrivilege 1732 jr079973.exe Token: SeDebugPrivilege 60 ku450115.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
a756148d9f5cb7f40fc9eee64d604ac6eba6d8eae5e88a53575d82e6f7c1c40a.exeziUi0996.exedescription pid process target process PID 4164 wrote to memory of 2368 4164 a756148d9f5cb7f40fc9eee64d604ac6eba6d8eae5e88a53575d82e6f7c1c40a.exe ziUi0996.exe PID 4164 wrote to memory of 2368 4164 a756148d9f5cb7f40fc9eee64d604ac6eba6d8eae5e88a53575d82e6f7c1c40a.exe ziUi0996.exe PID 4164 wrote to memory of 2368 4164 a756148d9f5cb7f40fc9eee64d604ac6eba6d8eae5e88a53575d82e6f7c1c40a.exe ziUi0996.exe PID 2368 wrote to memory of 1732 2368 ziUi0996.exe jr079973.exe PID 2368 wrote to memory of 1732 2368 ziUi0996.exe jr079973.exe PID 2368 wrote to memory of 60 2368 ziUi0996.exe ku450115.exe PID 2368 wrote to memory of 60 2368 ziUi0996.exe ku450115.exe PID 2368 wrote to memory of 60 2368 ziUi0996.exe ku450115.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a756148d9f5cb7f40fc9eee64d604ac6eba6d8eae5e88a53575d82e6f7c1c40a.exe"C:\Users\Admin\AppData\Local\Temp\a756148d9f5cb7f40fc9eee64d604ac6eba6d8eae5e88a53575d82e6f7c1c40a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUi0996.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUi0996.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr079973.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr079973.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku450115.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku450115.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:60
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5b6f1e8414a5db2c2c31b530f17a70b72
SHA11621b211ec14b94b7f52bf1f8aae2e07c6f7362b
SHA256188cd7da7ee347ade37872a6ec47b03f73b06d8bfbdbb28d0b1885d76a1fa201
SHA51265f65201cf3efa97cbf6d5b25b327b9ccd6445e4361dc24d6b7aa134e9531c71418f7530dc9e7fe3d5fbfd25cdba859d82a2cc6b721c8ac8a90122f2407cf671
-
Filesize
11KB
MD53b13abc3a4ea1ebc54c5d519b61f6cfc
SHA17914024ffcf0337609973a7e00d4c3f6750b11f8
SHA256db128aa1b144a15460d96ee541f9f33f0bbf3c85792e9f81117e1985dec8c35e
SHA512efbf7300313877e098dc432c3304ba354c6f3fc4749a55c9c412c6c32add185f661a3feca4b15aef943bf6c58ff0df11497285a04c5d8343f00e374e0f1224ff
-
Filesize
434KB
MD5f10b0a97d6151a60e011be5c0d99d312
SHA1b1022d4ead22906c33a560600a002d18e688de15
SHA2567ba49bd5cf9f1c4818f4d8c8d8465ec70121d4b29d1cfd47fac88be71b58db86
SHA5120eead7e21de797a776b09169cb2331a67160580ce52cd184a93cddbb7a2301bdf82d577019017879205a44edab4f7806adbcba023a7e5f588e99dcb4bd98efe9