Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:19
Static task
static1
Behavioral task
behavioral1
Sample
cb88d18029faf9528c34cd04a919c55946a5de15eaba876e67bff659e9a5d5aa.exe
Resource
win10v2004-20241007-en
General
-
Target
cb88d18029faf9528c34cd04a919c55946a5de15eaba876e67bff659e9a5d5aa.exe
-
Size
524KB
-
MD5
179f5d47602c602c4b30c1748bb9b877
-
SHA1
699ec97e72ff3a7280b4162e28f0fc46f0bfbaa0
-
SHA256
cb88d18029faf9528c34cd04a919c55946a5de15eaba876e67bff659e9a5d5aa
-
SHA512
a5e9d2ab5b2a8077ce161dd540a363fd07602e27c7ef707e3a5ca49b259c3991097fb8651e34b31c7ac3500b82400e0ac3335ae801a95787bbb211d160aec325
-
SSDEEP
12288:7Mrty9042o4IM6520K6qvnmWkQU3QKhi:iy92qM6520K6qvnnA3nhi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr713566.exe healer behavioral1/memory/2036-15-0x0000000000FA0000-0x0000000000FAA000-memory.dmp healer -
Healer family
-
Processes:
jr713566.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr713566.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr713566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr713566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr713566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr713566.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr713566.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4856-22-0x0000000004A60000-0x0000000004AA6000-memory.dmp family_redline behavioral1/memory/4856-24-0x0000000004AE0000-0x0000000004B24000-memory.dmp family_redline behavioral1/memory/4856-28-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-40-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-88-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-84-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-82-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-81-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-76-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-74-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-72-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-70-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-68-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-66-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-64-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-62-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-60-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-56-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-54-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-52-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-50-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-49-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-44-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-42-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-38-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-36-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-34-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-32-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-30-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-86-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-78-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-58-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-46-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-26-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/4856-25-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziQv9123.exejr713566.exeku192991.exepid process 1912 ziQv9123.exe 2036 jr713566.exe 4856 ku192991.exe -
Processes:
jr713566.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr713566.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cb88d18029faf9528c34cd04a919c55946a5de15eaba876e67bff659e9a5d5aa.exeziQv9123.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cb88d18029faf9528c34cd04a919c55946a5de15eaba876e67bff659e9a5d5aa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziQv9123.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cb88d18029faf9528c34cd04a919c55946a5de15eaba876e67bff659e9a5d5aa.exeziQv9123.exeku192991.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb88d18029faf9528c34cd04a919c55946a5de15eaba876e67bff659e9a5d5aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziQv9123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku192991.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr713566.exepid process 2036 jr713566.exe 2036 jr713566.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr713566.exeku192991.exedescription pid process Token: SeDebugPrivilege 2036 jr713566.exe Token: SeDebugPrivilege 4856 ku192991.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
cb88d18029faf9528c34cd04a919c55946a5de15eaba876e67bff659e9a5d5aa.exeziQv9123.exedescription pid process target process PID 3912 wrote to memory of 1912 3912 cb88d18029faf9528c34cd04a919c55946a5de15eaba876e67bff659e9a5d5aa.exe ziQv9123.exe PID 3912 wrote to memory of 1912 3912 cb88d18029faf9528c34cd04a919c55946a5de15eaba876e67bff659e9a5d5aa.exe ziQv9123.exe PID 3912 wrote to memory of 1912 3912 cb88d18029faf9528c34cd04a919c55946a5de15eaba876e67bff659e9a5d5aa.exe ziQv9123.exe PID 1912 wrote to memory of 2036 1912 ziQv9123.exe jr713566.exe PID 1912 wrote to memory of 2036 1912 ziQv9123.exe jr713566.exe PID 1912 wrote to memory of 4856 1912 ziQv9123.exe ku192991.exe PID 1912 wrote to memory of 4856 1912 ziQv9123.exe ku192991.exe PID 1912 wrote to memory of 4856 1912 ziQv9123.exe ku192991.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb88d18029faf9528c34cd04a919c55946a5de15eaba876e67bff659e9a5d5aa.exe"C:\Users\Admin\AppData\Local\Temp\cb88d18029faf9528c34cd04a919c55946a5de15eaba876e67bff659e9a5d5aa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQv9123.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQv9123.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr713566.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr713566.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku192991.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku192991.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4856
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD5b05079c0ad3ff9f13feba583c712fa2a
SHA10064c867c1773af28c99f091310291d247e7bdba
SHA256dff1e6aea74486635f99ea6d11f661d670e0bc97c76df848d51408c6aebefa4e
SHA51231b75eadcbf6606bb3532880c14f6a424a949c42af1411a99b94f89b5d0e067207fd8b28f4cbd4c31ae447158d52a85e5d4190b57f0246ad229a3e11334fa3d4
-
Filesize
14KB
MD564d6e7ae4f81fd1242a0fef1a4e1c787
SHA199249cc920d3551348b36e60ee03f214fc09d942
SHA256d6e209f7e57fbb8c5f0706ec9ca586aca567ae5ad138078e71812a15defa2215
SHA512782bb4e7744c3bd17c24865819a7adcfc320bbd9aea4f3d91efad4570baa67baab0f52795ef392adb284039a3bef99abeef6dbc441e1c7875fa1599aafe35b5a
-
Filesize
295KB
MD5929684074bd8164bffcd4e3c6cdaabb7
SHA1fc12368215f0aac7655762594141d693a0fd5fad
SHA2564da811c4b792e43bce935db86d1274d1f4ce866b420f8a58a53728ee4c5ed0d8
SHA5123c3c84422938e8e335240bb5c8436af9003ff080f68cf4cbd53d5ffa43bea3852dc3fbe5503d63bc82729c1bfcd59e9134fd08e2fc1ca5754d22302a7e8c5092