Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:37
Static task
static1
Behavioral task
behavioral1
Sample
8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6.exe
Resource
win10v2004-20241007-en
General
-
Target
8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6.exe
-
Size
561KB
-
MD5
8bcc5a3531f885b7c4cd21afd5f12448
-
SHA1
99196e16b9abf1143280cc95af57f1682abb6a6c
-
SHA256
8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6
-
SHA512
ac2421459334da14d5b4865f339f6dbfc3bbe075566d14c268f6274a8a63d350451df89e90eb8e3da289ed8989bf96b0f6912284d1d63f87bb035d178ba26216
-
SSDEEP
12288:VMrEy90/BwWii2lVlYIjoAE/n2yZk9cAycMeAzxPBhBgrFC:xy2BdN2Lm/n3kStHoFC
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b5d-12.dat healer behavioral1/memory/1920-15-0x0000000000DD0000-0x0000000000DDA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr173686.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr173686.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr173686.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr173686.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr173686.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr173686.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2428-21-0x0000000002900000-0x0000000002946000-memory.dmp family_redline behavioral1/memory/2428-23-0x0000000005530000-0x0000000005574000-memory.dmp family_redline behavioral1/memory/2428-87-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-85-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-83-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-82-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-79-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-77-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-76-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-73-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-71-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-70-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-67-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-65-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-63-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-61-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-59-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-57-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-53-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-52-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-49-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-47-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-46-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-43-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-41-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-40-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-37-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-35-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-33-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-31-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-29-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-27-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-55-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-25-0x0000000005530000-0x000000000556F000-memory.dmp family_redline behavioral1/memory/2428-24-0x0000000005530000-0x000000000556F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3656 ziKq0091.exe 1920 jr173686.exe 2428 ku787103.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr173686.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziKq0091.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3148 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku787103.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziKq0091.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1920 jr173686.exe 1920 jr173686.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1920 jr173686.exe Token: SeDebugPrivilege 2428 ku787103.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4160 wrote to memory of 3656 4160 8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6.exe 84 PID 4160 wrote to memory of 3656 4160 8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6.exe 84 PID 4160 wrote to memory of 3656 4160 8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6.exe 84 PID 3656 wrote to memory of 1920 3656 ziKq0091.exe 85 PID 3656 wrote to memory of 1920 3656 ziKq0091.exe 85 PID 3656 wrote to memory of 2428 3656 ziKq0091.exe 93 PID 3656 wrote to memory of 2428 3656 ziKq0091.exe 93 PID 3656 wrote to memory of 2428 3656 ziKq0091.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6.exe"C:\Users\Admin\AppData\Local\Temp\8cdc2ffcd09389754d12e6748c8f23fc9c97306d56bbe425deab7ddb016c2fb6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKq0091.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKq0091.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr173686.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr173686.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku787103.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku787103.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3148
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD56878ece1577c106e2af5e9b78f15e7d5
SHA1836eb5ece3a5043e04d476d458af312e6b02803b
SHA256fb94d8c4e7607436c70c3990d318bffdc24057609242b4dbf719562729f4d95c
SHA512e42236f1bd6acc83ca66420ebc96fe3cb4b4afb2487eef8880bdc9d9d387ce1d453c65a08e1654f0dde54495140f79457dd44eab79a427ac47c76a1dfd95b854
-
Filesize
11KB
MD593f83692d9e45cdb17f9d4e2cfdbb7f7
SHA1871c06655f740a3fb32e8b7989015d8a4c839c52
SHA256c28451b2ae08e9f6c007a17e6642e7d9529407c5422ab26e24b2aec6f6f7c751
SHA512f638b53201628fed2b821eebd7f5785f41ec2e3fd6f4339a8eaf577f52bedb95b02504b732a594f1790d488abb892d48f139c27d845cd35e5e67de92f3ebdbd8
-
Filesize
372KB
MD522801e4abbc04aef40ea04e61f7802da
SHA182a5c8ec57503eee962e0ce156ed4c4ebb12da8c
SHA2568df6a1f9b855cb76cd57c1ec57c5e76092138ed6a8773a49c3d285332813aefb
SHA512e71e12239e1b8a694e460350f7ac6216b7c079edfff867b41a0781be9c16471259a891ef2b7dc7b1cf206e0d627b88d1df55d8312072d89516654d5e094deca3