Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:09
Static task
static1
Behavioral task
behavioral1
Sample
6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc.exe
Resource
win10v2004-20241007-en
General
-
Target
6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc.exe
-
Size
530KB
-
MD5
eb81a4e0a5310c3bfd7915462a018ebe
-
SHA1
044dd97a78e477086bd9dfb2f22dccb9cc4a3306
-
SHA256
6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc
-
SHA512
b0652df7fb3c73ac78c13a56d8b1d255cae88fbc49d378bd9654265e7b3ac4248910432bf18a5276b77b5ab338796c613f68ffc9817e8b57be6b6cfa1165ff5a
-
SSDEEP
12288:tMr+y90d7f/kpsmWkfOuXlH2qQebu96Z8Br+n:DyogHUmH2RQi6sr2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b74-13.dat healer behavioral1/memory/2632-15-0x00000000003A0000-0x00000000003AA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr506929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr506929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr506929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr506929.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr506929.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr506929.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1248-22-0x0000000004080000-0x00000000040C6000-memory.dmp family_redline behavioral1/memory/1248-24-0x0000000004450000-0x0000000004494000-memory.dmp family_redline behavioral1/memory/1248-25-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-80-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-66-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-26-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-88-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-86-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-84-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-82-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-78-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-76-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-74-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-72-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-70-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-68-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-64-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-62-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-60-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-58-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-56-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-54-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-53-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-50-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-48-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-46-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-44-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-42-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-40-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-38-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-36-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-34-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-32-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-30-0x0000000004450000-0x000000000448F000-memory.dmp family_redline behavioral1/memory/1248-28-0x0000000004450000-0x000000000448F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2052 zieD8834.exe 2632 jr506929.exe 1248 ku142553.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr506929.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zieD8834.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1160 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zieD8834.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku142553.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2632 jr506929.exe 2632 jr506929.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2632 jr506929.exe Token: SeDebugPrivilege 1248 ku142553.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2052 1684 6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc.exe 84 PID 1684 wrote to memory of 2052 1684 6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc.exe 84 PID 1684 wrote to memory of 2052 1684 6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc.exe 84 PID 2052 wrote to memory of 2632 2052 zieD8834.exe 85 PID 2052 wrote to memory of 2632 2052 zieD8834.exe 85 PID 2052 wrote to memory of 1248 2052 zieD8834.exe 93 PID 2052 wrote to memory of 1248 2052 zieD8834.exe 93 PID 2052 wrote to memory of 1248 2052 zieD8834.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc.exe"C:\Users\Admin\AppData\Local\Temp\6af17bb1248a0fc144096fdc6bd7aad774932192ad97e6a939b97373c7fbe7dc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieD8834.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieD8834.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr506929.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr506929.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142553.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142553.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:1160
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD516314b8ced298ef415996546835b8d75
SHA182532677c117934fee27315eaf66d4ddd78bf617
SHA25644a59a98bbc0d7e51bd8a9d1061eeebb1494b4001ac230159b976f8e58e549f2
SHA512fb9ededd372490dca2dde14e33c73f6ce05f368563860bd425dd0c63185ac8de4908b2f8993c429119539a2b47e8dac8189d76d93137c2acec01d2b09180a87c
-
Filesize
12KB
MD5a23ef152d38d4fd56ac8ac4455d65006
SHA15357f6a5ca4b1644cf7d9332ef7e4154bab36ac3
SHA2561e3ca3d9520aaaf904b9002fcbeef042628549a603427bddca56d5fc3a6ab041
SHA512b7197627532c062813bd29f12680a5dcc8941e3bfe61d5d6b141428fbea033cf02eea1fd4d13ea4717f6a75bba97ac2d8d0a299ef025669d7e4da09530d3c7eb
-
Filesize
435KB
MD51f9de49b232f87f06e7bd304cdfc3ab5
SHA1c5d7ad45b02aa463d0479824d957ea2e1f26e878
SHA2562793fdec36c40dec9b3e4dd397f9bb6fb40b39ccb6198cdec48d1a36ecc00b98
SHA51262a5f4dad1111c2aa1c8d9764a19bc8704961b350d468b02234bf58f7d5d8f877a9e3fc1da7524cf26456e13beff662f31598cb168ba5eb944d6618289981ac2