Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
55602d5442bc4f1945e90cdc26ed63eb89545b2cdb0dc95588dc5269a6003bda.exe
Resource
win10v2004-20241007-en
General
-
Target
55602d5442bc4f1945e90cdc26ed63eb89545b2cdb0dc95588dc5269a6003bda.exe
-
Size
530KB
-
MD5
daf64593724fc76576a85e6655804a2d
-
SHA1
1fa44d22751d2b1e4e59f77d2eeb53bc42415abb
-
SHA256
55602d5442bc4f1945e90cdc26ed63eb89545b2cdb0dc95588dc5269a6003bda
-
SHA512
2ebcf92b81bfe19ec28b6107e67e55693080aae0b43b121d79c1c85699f47fb7d0e9aa97e4c31713cc87901af3fca339cf48489a3d67ef9d00c6ae6f8dd3b63b
-
SSDEEP
12288:GMriy90QDSL5POH3NSN+oNRtxY1Dl20YL:gyAG3NSEKYt1k
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c96-12.dat healer behavioral1/memory/1092-15-0x0000000000490000-0x000000000049A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr957216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr957216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr957216.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr957216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr957216.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr957216.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3612-22-0x0000000004A60000-0x0000000004AA6000-memory.dmp family_redline behavioral1/memory/3612-24-0x0000000004D10000-0x0000000004D54000-memory.dmp family_redline behavioral1/memory/3612-26-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-32-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-88-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-86-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-84-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-82-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-80-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-78-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-76-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-74-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-72-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-70-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-66-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-64-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-62-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-60-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-58-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-54-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-52-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-50-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-48-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-46-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-44-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-42-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-40-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-36-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-34-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-30-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-28-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-68-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-56-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-38-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline behavioral1/memory/3612-25-0x0000000004D10000-0x0000000004D4F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2004 ziZI2435.exe 1092 jr957216.exe 3612 ku218216.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr957216.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 55602d5442bc4f1945e90cdc26ed63eb89545b2cdb0dc95588dc5269a6003bda.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziZI2435.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55602d5442bc4f1945e90cdc26ed63eb89545b2cdb0dc95588dc5269a6003bda.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziZI2435.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku218216.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1092 jr957216.exe 1092 jr957216.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1092 jr957216.exe Token: SeDebugPrivilege 3612 ku218216.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2004 2212 55602d5442bc4f1945e90cdc26ed63eb89545b2cdb0dc95588dc5269a6003bda.exe 84 PID 2212 wrote to memory of 2004 2212 55602d5442bc4f1945e90cdc26ed63eb89545b2cdb0dc95588dc5269a6003bda.exe 84 PID 2212 wrote to memory of 2004 2212 55602d5442bc4f1945e90cdc26ed63eb89545b2cdb0dc95588dc5269a6003bda.exe 84 PID 2004 wrote to memory of 1092 2004 ziZI2435.exe 85 PID 2004 wrote to memory of 1092 2004 ziZI2435.exe 85 PID 2004 wrote to memory of 3612 2004 ziZI2435.exe 95 PID 2004 wrote to memory of 3612 2004 ziZI2435.exe 95 PID 2004 wrote to memory of 3612 2004 ziZI2435.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\55602d5442bc4f1945e90cdc26ed63eb89545b2cdb0dc95588dc5269a6003bda.exe"C:\Users\Admin\AppData\Local\Temp\55602d5442bc4f1945e90cdc26ed63eb89545b2cdb0dc95588dc5269a6003bda.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZI2435.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZI2435.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr957216.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr957216.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku218216.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku218216.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3612
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD54b3960498a346c91143292869dd914aa
SHA100795c686161148eb0494f51e90c377e7d5b0eeb
SHA2562400c5868e50be3c3a465bc289f86eaf4f2884f5b83e66cdff3de47dd4a0a9e7
SHA512544f4c86400d89062cf313c3ce3ac4af1af02c2b50bf6df70d673a8f39ae04f958652db8463e052090350a184add9a681d41b507a811ab261f5006ebd3d5ac26
-
Filesize
12KB
MD5f3b5c4aaad175eb3bc23b85b834d45d6
SHA137d8863dcaa3e6b5cb318fa913579fa1fffc50bf
SHA25689085a9fec220f01f3f5343abab709833737c99158abb6d33061c22bb55063d4
SHA5124dbda3d782ff1ca3c57fb348e09502c948f5a07e27f535ad2ed7e1636cefbc8d56e862b1530f1ef4eaaa2a6770d054e1a7c8934498c940a8d0d32b2dbf3f382f
-
Filesize
355KB
MD55af69135737a912782703e0e6d222a4d
SHA1d43929c8b6c983e7f843af64047658020da40511
SHA25657028edb0dc5a5253dbfd53efa1a2fc7d43874bef9ffd25d942b863713e18e4a
SHA5124352e1c3cc897d94cb69d0776feb78206d7fd27f14cb234d21d708f15142e430c8c26e1d0fa49cb7375f9cba7f2191be68f3ba0b8d23f11ce3be775d31ea789e