Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:07
Static task
static1
Behavioral task
behavioral1
Sample
3cd5a298c78ec05b27d2cd60cd610600c79fa963e36f5f9146bc7fa047d72290.exe
Resource
win10v2004-20241007-en
General
-
Target
3cd5a298c78ec05b27d2cd60cd610600c79fa963e36f5f9146bc7fa047d72290.exe
-
Size
529KB
-
MD5
b11c7220698b21408cb82aed8c4958c5
-
SHA1
c9ef0322cae05b4f1dcc19de55df70ba12c20954
-
SHA256
3cd5a298c78ec05b27d2cd60cd610600c79fa963e36f5f9146bc7fa047d72290
-
SHA512
6a907048917dab20e4bdeb20da566b6d435df709045e227b933b0caf94e33a062c375ed96b98449729d21f28d16b70c4ffe52105d808a9036433b98429e683cf
-
SSDEEP
12288:GMrby90aba/BEjYftYedG1fpFpqkE8MxUjWDu8Q40:pyk+xPqkE8Say0
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b77-12.dat healer behavioral1/memory/4816-15-0x0000000000D00000-0x0000000000D0A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr052201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr052201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr052201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr052201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr052201.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr052201.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2600-22-0x0000000004A70000-0x0000000004AB6000-memory.dmp family_redline behavioral1/memory/2600-24-0x0000000007170000-0x00000000071B4000-memory.dmp family_redline behavioral1/memory/2600-45-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-50-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-88-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-86-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-84-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-82-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-80-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-78-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-76-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-74-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-72-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-70-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-68-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-66-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-64-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-60-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-58-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-56-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-55-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-52-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-48-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-46-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-42-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-40-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-38-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-36-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-34-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-62-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-32-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-30-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-28-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-26-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline behavioral1/memory/2600-25-0x0000000007170000-0x00000000071AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4000 zixH8368.exe 4816 jr052201.exe 2600 ku455327.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr052201.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3cd5a298c78ec05b27d2cd60cd610600c79fa963e36f5f9146bc7fa047d72290.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zixH8368.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cd5a298c78ec05b27d2cd60cd610600c79fa963e36f5f9146bc7fa047d72290.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zixH8368.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku455327.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4816 jr052201.exe 4816 jr052201.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4816 jr052201.exe Token: SeDebugPrivilege 2600 ku455327.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4116 wrote to memory of 4000 4116 3cd5a298c78ec05b27d2cd60cd610600c79fa963e36f5f9146bc7fa047d72290.exe 84 PID 4116 wrote to memory of 4000 4116 3cd5a298c78ec05b27d2cd60cd610600c79fa963e36f5f9146bc7fa047d72290.exe 84 PID 4116 wrote to memory of 4000 4116 3cd5a298c78ec05b27d2cd60cd610600c79fa963e36f5f9146bc7fa047d72290.exe 84 PID 4000 wrote to memory of 4816 4000 zixH8368.exe 85 PID 4000 wrote to memory of 4816 4000 zixH8368.exe 85 PID 4000 wrote to memory of 2600 4000 zixH8368.exe 95 PID 4000 wrote to memory of 2600 4000 zixH8368.exe 95 PID 4000 wrote to memory of 2600 4000 zixH8368.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\3cd5a298c78ec05b27d2cd60cd610600c79fa963e36f5f9146bc7fa047d72290.exe"C:\Users\Admin\AppData\Local\Temp\3cd5a298c78ec05b27d2cd60cd610600c79fa963e36f5f9146bc7fa047d72290.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH8368.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH8368.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr052201.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr052201.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4816
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku455327.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku455327.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD560c5a5b012f9eee31bee5314126cf040
SHA1b468ad71db5d9e49e906b7bfab12586b6c954743
SHA2561028b0dac1325dcc48f09752022df9983cbaf7b2e99988e00f6d906603f711f4
SHA512fcacbfcd85777e716d17dbfd656b149939db35c90d491fe5c7ddc037e99fa6fb8e2dedf6ef24e6aca90956ebc0b401a592a609cdb6cb9c05025c96b24ccfbe76
-
Filesize
11KB
MD59bc401bffaa835ac2ee7645725668e6d
SHA142426be79f8a9420519ffede852b3e1ca06e3b5d
SHA2560d7553123d4660895256976dbe6c9193ea0c73866d475ce3b6425676a22673de
SHA5126e470744db28c9bac8347c07c8cde3549fb76abaa451018c60a42c63d315bc012ea720c0476fe5ad0c8045f721e7049c4aa535cfba6aeecfa165fb36093164bb
-
Filesize
354KB
MD52542909269c9793af8128e5495937f76
SHA1698b60b79bad054a44828cdd18969a25ad9866e8
SHA256da04b1a8460361a6575a921978592de30315b09bc67c193a15c1346bdc1fc193
SHA512e94a9faa639db134de3796d1aa0fb5927163de05895ae89c88014c9df312d4321775f1fb2aa7553cefb1a26f618619163a0d71e88b22a8900156b6954dee3fbc