Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:55
Static task
static1
Behavioral task
behavioral1
Sample
fdfd2ea8b4272499685b3dc9a2c44856eecc34ddd79dfccf48ed1243603755e0.exe
Resource
win10v2004-20241007-en
General
-
Target
fdfd2ea8b4272499685b3dc9a2c44856eecc34ddd79dfccf48ed1243603755e0.exe
-
Size
531KB
-
MD5
c31c248209a2523466fa0e841a6d52d0
-
SHA1
b47db6f63703ada7c7fd68e0e9560d8248df841e
-
SHA256
fdfd2ea8b4272499685b3dc9a2c44856eecc34ddd79dfccf48ed1243603755e0
-
SHA512
4a694980324289fe47244ca6396acce6e853b4acfead13fd86fda36255ba81c2abfbb39b6ab22735562ada9d7c1ae5ccb761bcdad3121a93123201c70f82fce4
-
SSDEEP
12288:/MrZy90rcxaVM8DYjRE/uXxj2Iv6ff0+wJAeIU:eyTE+8sj8+j2IvWUWU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb1-12.dat healer behavioral1/memory/2824-15-0x0000000000B90000-0x0000000000B9A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr473268.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr473268.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr473268.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr473268.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr473268.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr473268.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3460-21-0x00000000042A0000-0x00000000042E6000-memory.dmp family_redline behavioral1/memory/3460-23-0x0000000004480000-0x00000000044C4000-memory.dmp family_redline behavioral1/memory/3460-31-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-41-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-87-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-85-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-81-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-79-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-77-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-75-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-73-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-69-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-67-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-65-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-63-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-61-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-59-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-57-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-53-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-51-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-49-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-47-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-45-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-39-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-37-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-35-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-33-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-29-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-27-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-83-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-71-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-55-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-43-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-25-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline behavioral1/memory/3460-24-0x0000000004480000-0x00000000044BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2276 ziuP8574.exe 2824 jr473268.exe 3460 ku759341.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr473268.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fdfd2ea8b4272499685b3dc9a2c44856eecc34ddd79dfccf48ed1243603755e0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziuP8574.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdfd2ea8b4272499685b3dc9a2c44856eecc34ddd79dfccf48ed1243603755e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziuP8574.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku759341.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2824 jr473268.exe 2824 jr473268.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2824 jr473268.exe Token: SeDebugPrivilege 3460 ku759341.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3340 wrote to memory of 2276 3340 fdfd2ea8b4272499685b3dc9a2c44856eecc34ddd79dfccf48ed1243603755e0.exe 86 PID 3340 wrote to memory of 2276 3340 fdfd2ea8b4272499685b3dc9a2c44856eecc34ddd79dfccf48ed1243603755e0.exe 86 PID 3340 wrote to memory of 2276 3340 fdfd2ea8b4272499685b3dc9a2c44856eecc34ddd79dfccf48ed1243603755e0.exe 86 PID 2276 wrote to memory of 2824 2276 ziuP8574.exe 87 PID 2276 wrote to memory of 2824 2276 ziuP8574.exe 87 PID 2276 wrote to memory of 3460 2276 ziuP8574.exe 96 PID 2276 wrote to memory of 3460 2276 ziuP8574.exe 96 PID 2276 wrote to memory of 3460 2276 ziuP8574.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\fdfd2ea8b4272499685b3dc9a2c44856eecc34ddd79dfccf48ed1243603755e0.exe"C:\Users\Admin\AppData\Local\Temp\fdfd2ea8b4272499685b3dc9a2c44856eecc34ddd79dfccf48ed1243603755e0.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuP8574.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuP8574.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr473268.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr473268.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku759341.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku759341.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3460
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD5ba61b169084cf9e3eff6e7294a4ceae3
SHA15a9c5e56dd597811b42c1a5badd2121e4d79afeb
SHA25696d226dfc52b109f45ea9b2c95a4f8f8081ca3a855d6b5039648feb7b731decd
SHA512fc9cb7461cf1c8e789b45a5e6fb754546e5cdf3415f539ec5b8f0c36b110a3a9d911598508cc288e03f9c79da6281d8ea9ef342e9f288dae5660a2b107320bbc
-
Filesize
12KB
MD55092b44f4f627eced613c3bb696bceca
SHA16f847da6bfac1074fac8cd55520130477da8bc9e
SHA2567936ddf9158d156bcc0a5ce94f7c39b0314a03ef83c74871c56d3ec99db7e60d
SHA512d96630e57e100df7cf8af958ab337c83416e2722c8b22b07fffdebbd1e82a3ae955a1504539fe944bb12e0c616135d7dd9e86430e5cd87ad913f5b2480a29f3b
-
Filesize
435KB
MD5a5f56037e628ce339c37047af9c29320
SHA15109b706b6d2945d48194f3e57dc5ec4d279b3fc
SHA256a65aa3136a2cdeb1421bd53e405a94d9621dc90fada9a85182ea20de01218ee3
SHA512101f14316aa34fa36a9b80dac290fffd9087f38983e74b9e66a5f8c01c4755f7fd4116e6fa256bab772d3278a65efbe7359f37c37a300e7a736464ecff982f62