Analysis
-
max time kernel
149s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
d5c1ac07eff2a40622f56181ba8361cd2536ecf22c39a5c55108d81402bb58fd.exe
Resource
win10v2004-20241007-en
General
-
Target
d5c1ac07eff2a40622f56181ba8361cd2536ecf22c39a5c55108d81402bb58fd.exe
-
Size
558KB
-
MD5
2ea4b5b2c4cabf38382b7fe9216b7e30
-
SHA1
933d59a29c0d95234c633098b34f330c29cc2e56
-
SHA256
d5c1ac07eff2a40622f56181ba8361cd2536ecf22c39a5c55108d81402bb58fd
-
SHA512
343cf27a5288bd97e0034b90b663759320382ef66c5fef8aaf57617f42a0d28c6954f527c482e2728957512fa7e3223465e2706fa3884d5072e7e153973f8a0c
-
SSDEEP
12288:PMrmy90FjgkHQN0qdiF/tYbcR+WiP/YLzcVkU8pH:dyrtN0IiF1YbLVXw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr166012.exe healer behavioral1/memory/2188-15-0x0000000000630000-0x000000000063A000-memory.dmp healer -
Healer family
-
Processes:
jr166012.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr166012.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr166012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr166012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr166012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr166012.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr166012.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1272-22-0x0000000002840000-0x0000000002886000-memory.dmp family_redline behavioral1/memory/1272-24-0x0000000004DF0000-0x0000000004E34000-memory.dmp family_redline behavioral1/memory/1272-26-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-34-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-74-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-84-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-88-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-86-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-82-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-80-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-78-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-76-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-72-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-71-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-68-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-66-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-64-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-63-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-60-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-58-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-56-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-52-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-50-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-46-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-44-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-42-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-40-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-38-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-36-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-32-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-30-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-54-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-48-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-28-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/1272-25-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziAT8339.exejr166012.exeku152900.exepid process 456 ziAT8339.exe 2188 jr166012.exe 1272 ku152900.exe -
Processes:
jr166012.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr166012.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
d5c1ac07eff2a40622f56181ba8361cd2536ecf22c39a5c55108d81402bb58fd.exeziAT8339.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d5c1ac07eff2a40622f56181ba8361cd2536ecf22c39a5c55108d81402bb58fd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAT8339.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exepid process 3932 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d5c1ac07eff2a40622f56181ba8361cd2536ecf22c39a5c55108d81402bb58fd.exeziAT8339.exeku152900.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d5c1ac07eff2a40622f56181ba8361cd2536ecf22c39a5c55108d81402bb58fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziAT8339.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku152900.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr166012.exepid process 2188 jr166012.exe 2188 jr166012.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr166012.exeku152900.exedescription pid process Token: SeDebugPrivilege 2188 jr166012.exe Token: SeDebugPrivilege 1272 ku152900.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d5c1ac07eff2a40622f56181ba8361cd2536ecf22c39a5c55108d81402bb58fd.exeziAT8339.exedescription pid process target process PID 3636 wrote to memory of 456 3636 d5c1ac07eff2a40622f56181ba8361cd2536ecf22c39a5c55108d81402bb58fd.exe ziAT8339.exe PID 3636 wrote to memory of 456 3636 d5c1ac07eff2a40622f56181ba8361cd2536ecf22c39a5c55108d81402bb58fd.exe ziAT8339.exe PID 3636 wrote to memory of 456 3636 d5c1ac07eff2a40622f56181ba8361cd2536ecf22c39a5c55108d81402bb58fd.exe ziAT8339.exe PID 456 wrote to memory of 2188 456 ziAT8339.exe jr166012.exe PID 456 wrote to memory of 2188 456 ziAT8339.exe jr166012.exe PID 456 wrote to memory of 1272 456 ziAT8339.exe ku152900.exe PID 456 wrote to memory of 1272 456 ziAT8339.exe ku152900.exe PID 456 wrote to memory of 1272 456 ziAT8339.exe ku152900.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5c1ac07eff2a40622f56181ba8361cd2536ecf22c39a5c55108d81402bb58fd.exe"C:\Users\Admin\AppData\Local\Temp\d5c1ac07eff2a40622f56181ba8361cd2536ecf22c39a5c55108d81402bb58fd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAT8339.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAT8339.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr166012.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr166012.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku152900.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku152900.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1272
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3932
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD52fd2aa53c61662916287cc3901fe4e12
SHA1046374e738ba73ecdf267979dc9697eec37a17cb
SHA256ae5130cee07777bdc415cb09715e96ad70895eb351d31053990bea234ab69686
SHA51297db4c70725e31ae6e3366cf5327b92bc8e22111487da270ba6b9f7f7b5dfff04ebccacf5802d0787ca7be25fba44cb86d53adca5c76f40a2fda1bfb037d2906
-
Filesize
12KB
MD5bdf1f41c6b82dcdc38d122f71274c4b6
SHA10526c2867c62611014fd40447e11d963fc1d57b8
SHA2560144664784af45b63937f1dfd1d4c98020eb96919a897c91c2cc25200470f987
SHA512b83fb2df0ff803f1ecb12a8fd5afa297a6956b700d4ce8b5e63c652aca720babcf3bd3dd100f43e6efd06b74c3309f49cf7122fae9f402b157c3a955087b6c60
-
Filesize
370KB
MD52a528db2f8ddbccdbae7509b0079c4c7
SHA1348091bffdc320a2a1a23896ac88460098b9e54f
SHA256ae6f213b5927babc52c2f86ffef1c8c6d19c68ca192e5fd0b3f5670e1faa7839
SHA512ae66d9161e3793f4a5127b79167ca91f230652416fc0d3c9071fbdd6e96737681a6224b0bfb28bcb5206d539ebd7766255abeb3a4fe148c51014a7b24de0f938