Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:24
Static task
static1
Behavioral task
behavioral1
Sample
e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea.exe
Resource
win10v2004-20241007-en
General
-
Target
e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea.exe
-
Size
537KB
-
MD5
fa115b77f6c81a801bef8a6a8c099d3d
-
SHA1
cd4b36ecee907e5f71ff2cbedfbdc56e6bb31054
-
SHA256
e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea
-
SHA512
229cab5bf9ae0a12e054ec7ecbd96c84446a4bb37e6a15632d9256114a0a9408ac62953cb03c40394a9c4662e66babb4d730a71c51f9f26862cdcfc5f09c0f3d
-
SSDEEP
12288:UMrny90BcPGgxzTrivCyD0v8I9HoIILjvSK1y8jkVa:ryxPGcGvCD8so5LjaKZB
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr747522.exe healer behavioral1/memory/5112-15-0x0000000000810000-0x000000000081A000-memory.dmp healer -
Healer family
-
Processes:
jr747522.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr747522.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr747522.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr747522.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr747522.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr747522.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr747522.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2148-22-0x0000000004D20000-0x0000000004D66000-memory.dmp family_redline behavioral1/memory/2148-24-0x00000000053A0000-0x00000000053E4000-memory.dmp family_redline behavioral1/memory/2148-80-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-88-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-86-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-84-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-82-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-78-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-76-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-74-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-72-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-70-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-68-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-66-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-64-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-62-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-58-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-56-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-54-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-52-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-50-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-48-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-46-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-42-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-40-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-38-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-36-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-34-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-32-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-30-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-60-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-44-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-28-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-26-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline behavioral1/memory/2148-25-0x00000000053A0000-0x00000000053DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziUs6668.exejr747522.exeku134921.exepid process 1616 ziUs6668.exe 5112 jr747522.exe 2148 ku134921.exe -
Processes:
jr747522.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr747522.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziUs6668.exee3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziUs6668.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 4716 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziUs6668.exeku134921.exee3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziUs6668.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku134921.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr747522.exepid process 5112 jr747522.exe 5112 jr747522.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr747522.exeku134921.exedescription pid process Token: SeDebugPrivilege 5112 jr747522.exe Token: SeDebugPrivilege 2148 ku134921.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea.exeziUs6668.exedescription pid process target process PID 2408 wrote to memory of 1616 2408 e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea.exe ziUs6668.exe PID 2408 wrote to memory of 1616 2408 e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea.exe ziUs6668.exe PID 2408 wrote to memory of 1616 2408 e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea.exe ziUs6668.exe PID 1616 wrote to memory of 5112 1616 ziUs6668.exe jr747522.exe PID 1616 wrote to memory of 5112 1616 ziUs6668.exe jr747522.exe PID 1616 wrote to memory of 2148 1616 ziUs6668.exe ku134921.exe PID 1616 wrote to memory of 2148 1616 ziUs6668.exe ku134921.exe PID 1616 wrote to memory of 2148 1616 ziUs6668.exe ku134921.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea.exe"C:\Users\Admin\AppData\Local\Temp\e3b34e756bbf9aa72a6e9cf3478620ba8790e1f77d4a74fdd19afbcc240dc1ea.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUs6668.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziUs6668.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr747522.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr747522.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku134921.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku134921.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2148
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD57110812808e5af5a4ea32e4e8b27e7f8
SHA1ff64c82fb3dadc6314c4fc31d22444b1bf33ddbc
SHA256202d950e6e2ccbd14e8739ea59db5201dd242ddbd1d5fd7d6738f2695d027dc9
SHA51251b176961b32706bde1883a23737af4769a0502690a89e8d58e208e19a4820975a4f984aadcd10a7c87f7b8b5c3db2460cf5a385c6f19e7a5c1e8a9c89b28656
-
Filesize
13KB
MD540da56e549cc2d2aa429f9c117e94eac
SHA101ff06c187bf7b25ca6f050d64e298a74e2a2ee7
SHA25693a4d4e470a92ad2feec5b15f2f0f5b74290c00689de4b98e1d717fab5d469fc
SHA512e539783f7cbefd912f917651884b03c864eb948c8baa7f639cdff3c8f377b4a2c287a11e3d431777e2d1602d173af7656040fbb97a2695ea27150e0c8d68c8c3
-
Filesize
353KB
MD5a4ca2036e38332bbe1be8f01151fc3e6
SHA1d465ffe2eb4ae866d0c367d17f4e93e2135a738a
SHA2569406bcc73caf7499e359a920acede48372fdb9511cb0f0af7f2cce661efcef60
SHA5121bc17d8be042d1f34de5987e6abac4be00088c653f9a8d46e75fb6e0918110c1ac77c0ee306e0630b53eacdf818ace5cc26666c1ba6b336d8b90ef0576bf21c8