Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
3116e2c2d9b9c46c824a3eeafb6a8b6838202d26022836c8b82c03484dd7deff.exe
Resource
win10v2004-20241007-en
General
-
Target
3116e2c2d9b9c46c824a3eeafb6a8b6838202d26022836c8b82c03484dd7deff.exe
-
Size
533KB
-
MD5
903f2cac40f0a99a881598d021f04181
-
SHA1
93f180a370e84b8fd8802dc0eaec6de87f32b4a7
-
SHA256
3116e2c2d9b9c46c824a3eeafb6a8b6838202d26022836c8b82c03484dd7deff
-
SHA512
99beeef0abeb925c32b49d162263dbdb5c0219c7170da78148d665731df82a6aff1fc5a9ee4096e9a035c7c41f3a50d47a66d129ca998e68a20aed568df267f0
-
SSDEEP
12288:PMriy90WeLgl/uwiyCfR9p3LqjgAzSnWIP8s:ZyyaRbCZ9p3Gj1sJUs
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9d-12.dat healer behavioral1/memory/1596-15-0x0000000000840000-0x000000000084A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr492634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr492634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr492634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr492634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr492634.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr492634.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/776-22-0x0000000003B20000-0x0000000003B66000-memory.dmp family_redline behavioral1/memory/776-24-0x0000000006690000-0x00000000066D4000-memory.dmp family_redline behavioral1/memory/776-60-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-74-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-88-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-86-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-84-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-82-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-80-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-78-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-72-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-71-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-68-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-66-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-65-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-62-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-58-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-56-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-54-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-52-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-50-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-48-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-46-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-44-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-40-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-38-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-37-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-34-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-32-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-76-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-42-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-30-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-28-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-26-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline behavioral1/memory/776-25-0x0000000006690000-0x00000000066CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 556 ziGk5115.exe 1596 jr492634.exe 776 ku457488.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr492634.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3116e2c2d9b9c46c824a3eeafb6a8b6838202d26022836c8b82c03484dd7deff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziGk5115.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziGk5115.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku457488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3116e2c2d9b9c46c824a3eeafb6a8b6838202d26022836c8b82c03484dd7deff.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1596 jr492634.exe 1596 jr492634.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1596 jr492634.exe Token: SeDebugPrivilege 776 ku457488.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5056 wrote to memory of 556 5056 3116e2c2d9b9c46c824a3eeafb6a8b6838202d26022836c8b82c03484dd7deff.exe 84 PID 5056 wrote to memory of 556 5056 3116e2c2d9b9c46c824a3eeafb6a8b6838202d26022836c8b82c03484dd7deff.exe 84 PID 5056 wrote to memory of 556 5056 3116e2c2d9b9c46c824a3eeafb6a8b6838202d26022836c8b82c03484dd7deff.exe 84 PID 556 wrote to memory of 1596 556 ziGk5115.exe 85 PID 556 wrote to memory of 1596 556 ziGk5115.exe 85 PID 556 wrote to memory of 776 556 ziGk5115.exe 94 PID 556 wrote to memory of 776 556 ziGk5115.exe 94 PID 556 wrote to memory of 776 556 ziGk5115.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\3116e2c2d9b9c46c824a3eeafb6a8b6838202d26022836c8b82c03484dd7deff.exe"C:\Users\Admin\AppData\Local\Temp\3116e2c2d9b9c46c824a3eeafb6a8b6838202d26022836c8b82c03484dd7deff.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGk5115.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGk5115.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr492634.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr492634.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku457488.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku457488.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD5286d00fb8774d77afe60a360e7f4e638
SHA17a973b498926bd4ede517655cb99f300f5448613
SHA256583bc816d0fc868a5ff89191c8596f4320d5c0745ae36aa877e33a23355723b1
SHA51282b865e0276661fc757b441e1630d843bf973dcab65d0ea9aae6b90315f2a0e58d12b09cf6980afcb2e7f911550398025a528426be73115d66baf499bc8d7a27
-
Filesize
11KB
MD53caf74acb68fcc62c6dcc0dd5420869e
SHA1dbc6b3a729425c24d73516cd0274339b9f1bb25e
SHA256378104be760b6a5d2adbbd549c9490780cf44e88c6a668cddaee10b2407fedfb
SHA512dc852a47eeb26c4396061f3bb725955657cb4d7d1a911fb6b23aebf1902803090e05bcd32bd0ab45ee6401403a0b15572e56ec03e46d83148276a2ba5539c666
-
Filesize
359KB
MD59043eaa2b512bb2be5f17eb770a0f8a1
SHA14dd199f5dabda70b804d0ebb36752e15a2c3d0ba
SHA256c2e1703e3bc04b0354f429885401bedfdc56f9f65cb9727a804e5850397f0813
SHA5129270acb905231ba870631c427c00ef0ee0fe924e306753ce4caa4dcef5d8b97c7a02849586b312efbd326887edc5f6dd67d5d7d1159a729a7fa804b7a2aff8a0