Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:53
Static task
static1
Behavioral task
behavioral1
Sample
897f9a5a31950a353388634d889bf30c290867424b91f776c8381e25ffc6b321.exe
Resource
win10v2004-20241007-en
General
-
Target
897f9a5a31950a353388634d889bf30c290867424b91f776c8381e25ffc6b321.exe
-
Size
534KB
-
MD5
7aa9d225c1ff74139aead0971802b692
-
SHA1
1682cfbd286f4cd4f97a3ec9fc7ebd96eb73716c
-
SHA256
897f9a5a31950a353388634d889bf30c290867424b91f776c8381e25ffc6b321
-
SHA512
0a8a6c4394a7cd532d4c3f97d8a6b0b68406004b762490a62793519b320b29a079c69516ab0b0f99dae41ff3e549899522a3e4c5d463175cab65c64635c74eab
-
SSDEEP
12288:BMrOy90i/2ElpDjOfY/4z7zvbiW3r6m9sypI:Dy/fDjUYC7zTiWr6m9s1
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b50-12.dat healer behavioral1/memory/456-15-0x00000000000E0000-0x00000000000EA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr818570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr818570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr818570.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr818570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr818570.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr818570.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2200-22-0x00000000023E0000-0x0000000002426000-memory.dmp family_redline behavioral1/memory/2200-24-0x0000000004AB0000-0x0000000004AF4000-memory.dmp family_redline behavioral1/memory/2200-28-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-32-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-88-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-86-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-84-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-82-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-80-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-76-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-74-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-72-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-70-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-68-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-64-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-62-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-60-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-58-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-56-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-54-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-52-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-48-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-46-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-44-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-42-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-40-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-38-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-36-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-31-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-78-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-66-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-50-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-34-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-26-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/2200-25-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1132 zifh1310.exe 456 jr818570.exe 2200 ku535982.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr818570.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zifh1310.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 897f9a5a31950a353388634d889bf30c290867424b91f776c8381e25ffc6b321.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 897f9a5a31950a353388634d889bf30c290867424b91f776c8381e25ffc6b321.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zifh1310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku535982.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 456 jr818570.exe 456 jr818570.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 456 jr818570.exe Token: SeDebugPrivilege 2200 ku535982.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1420 wrote to memory of 1132 1420 897f9a5a31950a353388634d889bf30c290867424b91f776c8381e25ffc6b321.exe 84 PID 1420 wrote to memory of 1132 1420 897f9a5a31950a353388634d889bf30c290867424b91f776c8381e25ffc6b321.exe 84 PID 1420 wrote to memory of 1132 1420 897f9a5a31950a353388634d889bf30c290867424b91f776c8381e25ffc6b321.exe 84 PID 1132 wrote to memory of 456 1132 zifh1310.exe 85 PID 1132 wrote to memory of 456 1132 zifh1310.exe 85 PID 1132 wrote to memory of 2200 1132 zifh1310.exe 97 PID 1132 wrote to memory of 2200 1132 zifh1310.exe 97 PID 1132 wrote to memory of 2200 1132 zifh1310.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\897f9a5a31950a353388634d889bf30c290867424b91f776c8381e25ffc6b321.exe"C:\Users\Admin\AppData\Local\Temp\897f9a5a31950a353388634d889bf30c290867424b91f776c8381e25ffc6b321.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifh1310.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zifh1310.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr818570.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr818570.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku535982.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku535982.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD53b7327651aee311a257229cdb723b238
SHA16d562a0db86c8855107e3787715416580f9147ff
SHA25640f22d4b6a6060b314a2a683bb9fdeef81add2e331c3ccd51e12ebdf223a573c
SHA51268a98dca9114dcb5d71da528966f860ec63a0251f7393cfc7b09d1033a4f75ef73385197a3d16e942e99b9da6963a6434bff153b548c0f73b3baf088065a6589
-
Filesize
12KB
MD5a2d7d4a9f5ea770d7c44ca1c4818fbb5
SHA1772cf679871c2ee4d19b31ad46f81adab1a87a02
SHA25665bb14f0621329dd05ab0623eb519c58d98971a8219f080a2002dae0b9daea54
SHA51225d1ddee87a6c0f563cd611a18fcc245b86014091a93c62caaa1b87ed1bdcc0a661797b8867b932db9e850ce928a4e60353b9f89b220c0a4bb234c419b29f7dd
-
Filesize
319KB
MD5c3560aa9495453f757b828c247e0482a
SHA127d31845783e4c2de9b043a5bc73eaa83e7e558e
SHA256eadd07e36ab31cc0557b921d4310cabdeca29d4bfef888917f4f0d3460cd373b
SHA512306cacc78e317d2f172c9297c1d6a6a97c726ee92da7c0eee14847dff49247831ea2bd91aca851709bcab11356ea7551cb381a2d8264b21a56a39223f793c5a2