Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:39
Static task
static1
Behavioral task
behavioral1
Sample
92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764.exe
Resource
win10v2004-20241007-en
General
-
Target
92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764.exe
-
Size
521KB
-
MD5
37b513dd6ae7c4d06f3ec87cc41670d4
-
SHA1
56ac7987bd27d1edcbcc4e1bcc09634544ffdbc4
-
SHA256
92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764
-
SHA512
9b881362825d65c48483232b160258ae0a320f91cf68705a0e0f656341ac2b6d5b431f78103bdc2ed3162f200cb47efb0be62f9bb8eed0ed3a6ba5a8c9c8b77c
-
SSDEEP
6144:KLy+bnr+ap0yN90QE+JIF8hw91bbJTkggLGqI+4KxmU7lhkg32FR3Be4ppBqqZae:hMrOy90EJCISbb+6qEmmKkgmb3TLnkE
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023bd9-12.dat healer behavioral1/memory/4568-15-0x0000000000FE0000-0x0000000000FEA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr616359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr616359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr616359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr616359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr616359.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr616359.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4696-22-0x0000000002680000-0x00000000026C6000-memory.dmp family_redline behavioral1/memory/4696-24-0x0000000004AA0000-0x0000000004AE4000-memory.dmp family_redline behavioral1/memory/4696-52-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-66-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-86-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-85-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-82-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-80-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-78-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-74-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-72-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-71-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-69-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-64-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-63-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-60-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-58-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-57-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-54-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-50-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-46-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-45-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-42-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-40-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-38-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-88-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-76-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-48-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-36-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-34-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-32-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-30-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-28-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-26-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/4696-25-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3284 ziDr7809.exe 4568 jr616359.exe 4696 ku411962.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr616359.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziDr7809.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziDr7809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku411962.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4568 jr616359.exe 4568 jr616359.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4568 jr616359.exe Token: SeDebugPrivilege 4696 ku411962.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4832 wrote to memory of 3284 4832 92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764.exe 84 PID 4832 wrote to memory of 3284 4832 92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764.exe 84 PID 4832 wrote to memory of 3284 4832 92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764.exe 84 PID 3284 wrote to memory of 4568 3284 ziDr7809.exe 85 PID 3284 wrote to memory of 4568 3284 ziDr7809.exe 85 PID 3284 wrote to memory of 4696 3284 ziDr7809.exe 90 PID 3284 wrote to memory of 4696 3284 ziDr7809.exe 90 PID 3284 wrote to memory of 4696 3284 ziDr7809.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764.exe"C:\Users\Admin\AppData\Local\Temp\92a49a86e99c02674943b5653a1e435d7fcc64c92b9563f83690019b47f53764.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr7809.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr7809.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr616359.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr616359.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku411962.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku411962.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
379KB
MD5a9692e6bc6cd2058a2388259eb4773c7
SHA16a70cbe55675d6a5c54f52084abba0860de2401a
SHA256129a0d786f1e47d2964917ffa20c651ade22decc3422d14c56633b8d3f3ec37e
SHA512c5546daf9d6fbc0642049fa7782da92adfd91866663e4ac8a513ba9c1c949eb211ba378f6b195ede4f1d6ee16b713e604819fa0794f1dfe52032203ccb2f8dfd
-
Filesize
14KB
MD5223c89a3a6a88f4135c5f7df69b73d12
SHA119b67779153d38859758079fadfbdaa54cc2c785
SHA25675ea7b1a58b87ca5e1749e4e99fbfa7a940b11a9d6d9761bc69a2bd8e08c5203
SHA5127f5446a5295c41c5ebeed7d186c8e530b090196f3e4d1be40985d36c85b16d68dcb2e06c986fe5fd71175aa3f454b622752563f4cb46f2e8719d338d4626a5a2
-
Filesize
295KB
MD5e679b79129843bb0094c28b554e64714
SHA134674ea53aa396c859cb6afba7cb3054ccfaf100
SHA2561d8ded3811a8c0c58c99c3ebf374dbd6bbb84550c9ee9f9cced829a3bb8f63a5
SHA512d56757ebb6d2daad7bbdcd7cf0774c42c37d5f8294d8f498458f21792c3913cd11036abe81895358a62b41127a8a9bda1a9a37aeb2903778fa620150fe439ac9