Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:02
Static task
static1
Behavioral task
behavioral1
Sample
87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exe
Resource
win10v2004-20241007-en
General
-
Target
87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exe
-
Size
530KB
-
MD5
d055d902b295445945764f210298d115
-
SHA1
f7d542275036bff431ed93c97ed114b5df5508c1
-
SHA256
87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3
-
SHA512
378311eacafe4ca5f7560d3994281f5024e0086a7410f5c8f9bc316ae011202afec9deb5f16dc37b676f8b32aa686682ff0d6f5edc353c202fee7be8b7442085
-
SSDEEP
12288:pMrGy90U0TzBL6XDqbLCaC9M7hgC00v+7Wwon:7yR0TzIzqbLCVM7ub09won
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr959448.exe healer behavioral1/memory/3644-15-0x0000000000490000-0x000000000049A000-memory.dmp healer -
Healer family
-
Processes:
jr959448.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr959448.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr959448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr959448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr959448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr959448.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr959448.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4020-22-0x0000000002730000-0x0000000002776000-memory.dmp family_redline behavioral1/memory/4020-24-0x0000000002920000-0x0000000002964000-memory.dmp family_redline behavioral1/memory/4020-50-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-88-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-86-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-84-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-82-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-78-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-76-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-75-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-72-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-70-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-68-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-66-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-64-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-62-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-60-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-58-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-56-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-54-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-52-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-48-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-46-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-44-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-42-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-40-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-38-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-36-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-34-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-32-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-30-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-28-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-80-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-26-0x0000000002920000-0x000000000295F000-memory.dmp family_redline behavioral1/memory/4020-25-0x0000000002920000-0x000000000295F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zitf9146.exejr959448.exeku528441.exepid process 5060 zitf9146.exe 3644 jr959448.exe 4020 ku528441.exe -
Processes:
jr959448.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr959448.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exezitf9146.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zitf9146.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 2916 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exezitf9146.exeku528441.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zitf9146.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku528441.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr959448.exepid process 3644 jr959448.exe 3644 jr959448.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr959448.exeku528441.exedescription pid process Token: SeDebugPrivilege 3644 jr959448.exe Token: SeDebugPrivilege 4020 ku528441.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exezitf9146.exedescription pid process target process PID 2504 wrote to memory of 5060 2504 87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exe zitf9146.exe PID 2504 wrote to memory of 5060 2504 87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exe zitf9146.exe PID 2504 wrote to memory of 5060 2504 87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exe zitf9146.exe PID 5060 wrote to memory of 3644 5060 zitf9146.exe jr959448.exe PID 5060 wrote to memory of 3644 5060 zitf9146.exe jr959448.exe PID 5060 wrote to memory of 4020 5060 zitf9146.exe ku528441.exe PID 5060 wrote to memory of 4020 5060 zitf9146.exe ku528441.exe PID 5060 wrote to memory of 4020 5060 zitf9146.exe ku528441.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exe"C:\Users\Admin\AppData\Local\Temp\87fb74c5bd44fc86701273a2353145aa1061d25afb75b2bb154efc323d813cc3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitf9146.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitf9146.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr959448.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr959448.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku528441.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku528441.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2916
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD55d093d1e53312881fb970224e8d95f73
SHA17f86d9971def19b42abf3ed4f0db8a51e17d37cf
SHA256b1db910d39af0fc4fa1a3b054185e52a1140a5f9d69aefb8073e8f7e6a2b4e5c
SHA51234b4474d705927abaa59e8e364c5137e54af575193c5f21296da04ea6b9fda12912f7388f4c61733deb6eaee68614fa99fea6689f765e93eed5864ee335798d0
-
Filesize
12KB
MD54f7376e03334470e8c673bea75943b86
SHA1ea9b365b712950f7ab3f2630e58ad94c33501a42
SHA256fa27aa2befa7665dacc716764769d0c67a767f751887e798b37ff5c4638bb9d8
SHA5123b526daa169343f9b1fd21b16ac118c7733b0f4e95fea5a41349d0820bcde949e1ee4ccf58ba82b5b269f476b9c646af54f62fbf7e15ae5ddd72fdb3f5324fd3
-
Filesize
434KB
MD5936e9b314a04809684f82b33e8a7d716
SHA1452c72ada0bb1b2d683e27f0c40d35a9fe810b18
SHA256d3e3bbcb093eea3ef0c42eecc7d3b8461acbc41c188eb9f81e735f6bb012f483
SHA5128c4c8a2e9efd92629edd6fd0df5fc8182593df68526351eba834cc704d0a1130640bebab616b9dba8ca5a5a8e13f822f684b2fd91be09d58edf8db497ff76cc6