Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
8e98a0fc62fc6821e20f7d7c866715b50a4349c5f49331a532624b95133d2c60.exe
Resource
win10v2004-20241007-en
General
-
Target
8e98a0fc62fc6821e20f7d7c866715b50a4349c5f49331a532624b95133d2c60.exe
-
Size
561KB
-
MD5
07b8f5423491c066ee17e1bae4c15f07
-
SHA1
9022fbcf6875c0c7be7f5d91d0d44a2c0560383e
-
SHA256
8e98a0fc62fc6821e20f7d7c866715b50a4349c5f49331a532624b95133d2c60
-
SHA512
4cd96fcd9133815e045d5b8f88bb01d16145900568fe422330f78dc7618429256a7b89e9fa8393da34f144ed1af820cd03e01a1ab1778d113f87fbcda21607a0
-
SSDEEP
12288:4Mruy90QyOac36HdiuBaggdMVaTMVnD52egz:WyJy0ccygdMVaYVD5lgz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023bdc-13.dat healer behavioral1/memory/4856-15-0x0000000000050000-0x000000000005A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr602601.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr602601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr602601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr602601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr602601.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr602601.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1648-22-0x0000000004D60000-0x0000000004DA6000-memory.dmp family_redline behavioral1/memory/1648-24-0x00000000053D0000-0x0000000005414000-memory.dmp family_redline behavioral1/memory/1648-34-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-38-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-88-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-86-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-84-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-82-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-80-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-78-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-74-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-72-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-70-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-68-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-66-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-64-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-62-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-60-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-58-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-56-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-54-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-52-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-50-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-46-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-44-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-42-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-40-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-36-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-32-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-76-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-48-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-30-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-28-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-26-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/1648-25-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4608 zipc4464.exe 4856 jr602601.exe 1648 ku502293.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr602601.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8e98a0fc62fc6821e20f7d7c866715b50a4349c5f49331a532624b95133d2c60.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zipc4464.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e98a0fc62fc6821e20f7d7c866715b50a4349c5f49331a532624b95133d2c60.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zipc4464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku502293.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4856 jr602601.exe 4856 jr602601.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4856 jr602601.exe Token: SeDebugPrivilege 1648 ku502293.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2020 wrote to memory of 4608 2020 8e98a0fc62fc6821e20f7d7c866715b50a4349c5f49331a532624b95133d2c60.exe 84 PID 2020 wrote to memory of 4608 2020 8e98a0fc62fc6821e20f7d7c866715b50a4349c5f49331a532624b95133d2c60.exe 84 PID 2020 wrote to memory of 4608 2020 8e98a0fc62fc6821e20f7d7c866715b50a4349c5f49331a532624b95133d2c60.exe 84 PID 4608 wrote to memory of 4856 4608 zipc4464.exe 85 PID 4608 wrote to memory of 4856 4608 zipc4464.exe 85 PID 4608 wrote to memory of 1648 4608 zipc4464.exe 95 PID 4608 wrote to memory of 1648 4608 zipc4464.exe 95 PID 4608 wrote to memory of 1648 4608 zipc4464.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e98a0fc62fc6821e20f7d7c866715b50a4349c5f49331a532624b95133d2c60.exe"C:\Users\Admin\AppData\Local\Temp\8e98a0fc62fc6821e20f7d7c866715b50a4349c5f49331a532624b95133d2c60.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipc4464.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipc4464.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr602601.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr602601.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku502293.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku502293.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406KB
MD5125fa5c5789c49b1ce0e3e4e7645ee87
SHA1f6bd6dfeeb49ebbeae13799ecf1405d397220b44
SHA25621d28b430809d4c3a0b0d3be2c7f173b5a63ac77d85b7923a1f8080100d47930
SHA512dfb0fd787d31f6ffcd36ea1fa430bae95736bb6f37a2a2e3f874848faae31890e61c5425c34b547e18dd2026a5c811e7be4cd6a6e29ccc0cd64026fbee5bc75b
-
Filesize
12KB
MD5e94f9ea238ec135bc3e19096e2d99c8d
SHA1d717cb6ab24295736f9ce4f33f6d855ec34b8280
SHA2567101073c4713ecf82757b83e7d89b9762bff9c90937049873c9cdd6b402537c2
SHA512feb6075a1530969d8c78646100cc5f16bda1d86d1858db866b0aa202a0f0b0b95a9e4e145a5c2c6d7fddb1372049b108e9cd22498a97d041354d76b1841efeb7
-
Filesize
370KB
MD5a3afce4bbef63e71b31abf6a594ba3c6
SHA1554d5ebbbf3afa1650c4166c7da7b02e609c5ce9
SHA256aa70250db464e51a950aae220664ea346c8028f13e8b3d95e25ca035079d9c28
SHA512eabb19aa94955e23d84c36bc262da01544126eaed30c7af26c8563bb66736f6e078969b3acd4749e55b6515a3462480844833d47509857864a0256970b24bd39