Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 17:45
Static task
static1
Behavioral task
behavioral1
Sample
aa2b9dc803a3d45322ebadd399f2ae6267aa87b138b13699c23e8b65613c10c8.exe
Resource
win10v2004-20241007-en
General
-
Target
aa2b9dc803a3d45322ebadd399f2ae6267aa87b138b13699c23e8b65613c10c8.exe
-
Size
788KB
-
MD5
36e4418538b8c8c6c4346230c0d3063f
-
SHA1
44cfb229fea5f25fa4b9d91483c1c6543ad72355
-
SHA256
aa2b9dc803a3d45322ebadd399f2ae6267aa87b138b13699c23e8b65613c10c8
-
SHA512
207062bb56c9308537909b7232491535a81ee81b3d783979048927564a055287a5bbab5f7b8f2e257b21eb9dfd32cb4cde36211f3466027227ee2c691baf7d19
-
SSDEEP
24576:hyOUMnWZgIg3As2n/vXg1KF/29XURSB/H:UO3TGI1u/AEw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it243785.exe healer behavioral1/memory/224-22-0x0000000000380000-0x000000000038A000-memory.dmp healer -
Healer family
-
Processes:
it243785.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" it243785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" it243785.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection it243785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" it243785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" it243785.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" it243785.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3512-29-0x00000000023F0000-0x0000000002436000-memory.dmp family_redline behavioral1/memory/3512-31-0x0000000004AB0000-0x0000000004AF4000-memory.dmp family_redline behavioral1/memory/3512-35-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-51-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-95-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-93-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-89-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-87-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-85-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-83-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-81-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-79-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-77-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-75-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-73-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-69-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-67-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-65-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-63-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-61-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-59-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-57-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-55-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-49-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-47-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-45-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-44-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-41-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-39-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-37-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-91-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-71-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-53-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-33-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/3512-32-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 4 IoCs
Processes:
zits8386.exeziQO5297.exeit243785.exejr300030.exepid process 3012 zits8386.exe 3164 ziQO5297.exe 224 it243785.exe 3512 jr300030.exe -
Processes:
it243785.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" it243785.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
aa2b9dc803a3d45322ebadd399f2ae6267aa87b138b13699c23e8b65613c10c8.exezits8386.exeziQO5297.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aa2b9dc803a3d45322ebadd399f2ae6267aa87b138b13699c23e8b65613c10c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zits8386.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" ziQO5297.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
aa2b9dc803a3d45322ebadd399f2ae6267aa87b138b13699c23e8b65613c10c8.exezits8386.exeziQO5297.exejr300030.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa2b9dc803a3d45322ebadd399f2ae6267aa87b138b13699c23e8b65613c10c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zits8386.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziQO5297.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jr300030.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
it243785.exepid process 224 it243785.exe 224 it243785.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
it243785.exejr300030.exedescription pid process Token: SeDebugPrivilege 224 it243785.exe Token: SeDebugPrivilege 3512 jr300030.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
aa2b9dc803a3d45322ebadd399f2ae6267aa87b138b13699c23e8b65613c10c8.exezits8386.exeziQO5297.exedescription pid process target process PID 2240 wrote to memory of 3012 2240 aa2b9dc803a3d45322ebadd399f2ae6267aa87b138b13699c23e8b65613c10c8.exe zits8386.exe PID 2240 wrote to memory of 3012 2240 aa2b9dc803a3d45322ebadd399f2ae6267aa87b138b13699c23e8b65613c10c8.exe zits8386.exe PID 2240 wrote to memory of 3012 2240 aa2b9dc803a3d45322ebadd399f2ae6267aa87b138b13699c23e8b65613c10c8.exe zits8386.exe PID 3012 wrote to memory of 3164 3012 zits8386.exe ziQO5297.exe PID 3012 wrote to memory of 3164 3012 zits8386.exe ziQO5297.exe PID 3012 wrote to memory of 3164 3012 zits8386.exe ziQO5297.exe PID 3164 wrote to memory of 224 3164 ziQO5297.exe it243785.exe PID 3164 wrote to memory of 224 3164 ziQO5297.exe it243785.exe PID 3164 wrote to memory of 3512 3164 ziQO5297.exe jr300030.exe PID 3164 wrote to memory of 3512 3164 ziQO5297.exe jr300030.exe PID 3164 wrote to memory of 3512 3164 ziQO5297.exe jr300030.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa2b9dc803a3d45322ebadd399f2ae6267aa87b138b13699c23e8b65613c10c8.exe"C:\Users\Admin\AppData\Local\Temp\aa2b9dc803a3d45322ebadd399f2ae6267aa87b138b13699c23e8b65613c10c8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zits8386.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zits8386.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQO5297.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ziQO5297.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it243785.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\it243785.exe4⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:224 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr300030.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\jr300030.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3512
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
524KB
MD5dfa14dce52be7c666388f36095241bfd
SHA105ee34e315b7c56221a4337ea1f5c93d403cc5e5
SHA256072a124afdb1df4831f31c3f8d1fec8627b9838803c6cd30ab2e120f0fe6de4c
SHA512ed8bfad35169f6192d01bfe38b7a2e61e46b6c404950fb7457e65fa3f25607943318ed6dec0bbf2464f17329427fac36aa79be7ea94bcec2a6c63ff65ff2a4b1
-
Filesize
382KB
MD58a6de964137df2f14894dfd16f92a0f6
SHA1d994fcfe30168c6d79f686d6833604050aa07e6a
SHA256a28ae19582ba9f1dc7b85b4231c9794110abfc1fea9026a528e3211e6a1a3e00
SHA512ff921ca55a9d872853add11f565cc9fce40c78d3923b9b63f1e6f22b201f8a6ca70af7ead92a22b2febe372887e1064bdccdcc74f1132692af058289cc25985c
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
297KB
MD56887482cdb8473b42e896b423e657ce9
SHA14cfc2f4e88bec19d0c13b9a11c860e10b8357c04
SHA256a324c848b4869293bec517c7b886a7642971c24308ee9b37704d7e21f4569efa
SHA512be643008685dbec6facc6f3a41b12ef5eb7fb76dd8ba4de592d650eb271784d0329aa132690efbb5993da27be68719f5012c8b6edd85a6af3214ea8e1fd06394