Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:07
Static task
static1
Behavioral task
behavioral1
Sample
e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe
Resource
win10v2004-20241007-en
General
-
Target
e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe
-
Size
521KB
-
MD5
f8d8599f4771dd76d044b3903a447637
-
SHA1
dfd7e9655f05ab38d1ff423664fb596d4691cda4
-
SHA256
e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912
-
SHA512
e97e13ec25508e987efa050a697657c46405696d7ecbfcc4a4421399c6975380738991faf4afa2cd0afab34127cba9d7da633f4a3302af9921a3e0615105cf5f
-
SSDEEP
12288:QMruy90ISCJzqj5XFIq/nfTrJVP8K7449zW3R9Oe7mAV:uybadqq70Kk4A3R9OeH
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb3-12.dat healer behavioral1/memory/3148-15-0x00000000003C0000-0x00000000003CA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr785904.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr785904.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr785904.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr785904.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr785904.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr785904.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2088-22-0x0000000004A60000-0x0000000004AA6000-memory.dmp family_redline behavioral1/memory/2088-24-0x0000000005090000-0x00000000050D4000-memory.dmp family_redline behavioral1/memory/2088-25-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-42-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-89-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-86-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-84-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-82-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-80-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-76-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-75-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-72-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-70-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-69-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-66-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-64-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-62-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-60-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-58-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-56-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-54-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-52-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-50-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-48-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-46-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-44-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-40-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-38-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-36-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-34-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-32-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-30-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-28-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-26-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/2088-78-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 628 zixH8476.exe 3148 jr785904.exe 2088 ku476756.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr785904.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zixH8476.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zixH8476.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku476756.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3148 jr785904.exe 3148 jr785904.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3148 jr785904.exe Token: SeDebugPrivilege 2088 ku476756.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 720 wrote to memory of 628 720 e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe 84 PID 720 wrote to memory of 628 720 e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe 84 PID 720 wrote to memory of 628 720 e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe 84 PID 628 wrote to memory of 3148 628 zixH8476.exe 85 PID 628 wrote to memory of 3148 628 zixH8476.exe 85 PID 628 wrote to memory of 2088 628 zixH8476.exe 91 PID 628 wrote to memory of 2088 628 zixH8476.exe 91 PID 628 wrote to memory of 2088 628 zixH8476.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe"C:\Users\Admin\AppData\Local\Temp\e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH8476.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH8476.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr785904.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr785904.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476756.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476756.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2088
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
379KB
MD5f4029cf68018709a48529fcf0343987b
SHA19921a3d11c8379dedda9c81098aac45e2accce21
SHA256cf7a413c67e4e0640a62151ad563436a58ec8599515a537f39b5bc3f6f0e52af
SHA51214e1a441384d5457609bbdf8a47d31c40f2e455dbd484965e807d6c4a0cdba84d090c91bd4b39e0ea9bf7a87bf093453ae8df701eb2720b951244878aaf5d8de
-
Filesize
15KB
MD527e4a495b2168b2964127f58501fe3b9
SHA11f1c8861dfdc021455975c5d20b3c081548b5c7b
SHA256092acbb0e785cb3e61448150e2cd0986a165ddb6f40497b095134957513a491f
SHA5120e60a80b6d9b95b88dcefb3110836b12b81b5192ee626904e30453f4b3a5812d295b88ebdaed41564fe4eac01edd4fad33d89c54d20da8248e0209fcddb4ef53
-
Filesize
294KB
MD51321c634e7eeee5734bed3850cef99a9
SHA1e9a665a99a6816a928675a95339d8017ee78eb33
SHA2562dbd1a21be1100b2846df51948a229c9a7cd1dccabd8af20194e774d1df95bfd
SHA51241171b663b8a7f87f7bcb6a350e0da07f1db2de7f0a233d30d308eff7037fa47e5df26662aab066f6358e104abfbb26ae3c3ab2ff31b331cc2afa38b9ddca281