Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
b7003f5125f90b4910dbed46815675a5c75ca88d1ea71a7394fac8a23a4d4354.exe
Resource
win10v2004-20241007-en
General
-
Target
b7003f5125f90b4910dbed46815675a5c75ca88d1ea71a7394fac8a23a4d4354.exe
-
Size
560KB
-
MD5
4ad96a6c2a07001a6d14f7e8cab3dfc9
-
SHA1
8ea537000d7f53146fce75b72c2587a40301d6c3
-
SHA256
b7003f5125f90b4910dbed46815675a5c75ca88d1ea71a7394fac8a23a4d4354
-
SHA512
31e3d13a92bebe1a580c665e9ea935564cefa35a88375bcb0bd5b5845080365eabf90a3b9ea232625314fcd251584ca35bcf40703c5e9f42ee777919f13fe5bf
-
SSDEEP
12288:xMrzy90Nn7Y/ylodiyrll+Zy9Kh53nbqNB6WMx31:eyKn7Llo4YKD3bdx31
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b6c-12.dat healer behavioral1/memory/3696-15-0x0000000000E20000-0x0000000000E2A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr232659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr232659.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr232659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr232659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr232659.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr232659.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4792-22-0x0000000002700000-0x0000000002746000-memory.dmp family_redline behavioral1/memory/4792-24-0x0000000004DF0000-0x0000000004E34000-memory.dmp family_redline behavioral1/memory/4792-28-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-38-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-88-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-86-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-84-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-82-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-80-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-78-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-76-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-74-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-72-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-70-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-66-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-65-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-62-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-60-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-58-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-56-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-54-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-52-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-50-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-48-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-46-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-44-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-42-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-40-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-36-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-34-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-32-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-30-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-26-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-68-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline behavioral1/memory/4792-25-0x0000000004DF0000-0x0000000004E2F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 376 ziEc8032.exe 3696 jr232659.exe 4792 ku539986.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr232659.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b7003f5125f90b4910dbed46815675a5c75ca88d1ea71a7394fac8a23a4d4354.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziEc8032.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5684 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7003f5125f90b4910dbed46815675a5c75ca88d1ea71a7394fac8a23a4d4354.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziEc8032.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku539986.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3696 jr232659.exe 3696 jr232659.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3696 jr232659.exe Token: SeDebugPrivilege 4792 ku539986.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3976 wrote to memory of 376 3976 b7003f5125f90b4910dbed46815675a5c75ca88d1ea71a7394fac8a23a4d4354.exe 84 PID 3976 wrote to memory of 376 3976 b7003f5125f90b4910dbed46815675a5c75ca88d1ea71a7394fac8a23a4d4354.exe 84 PID 3976 wrote to memory of 376 3976 b7003f5125f90b4910dbed46815675a5c75ca88d1ea71a7394fac8a23a4d4354.exe 84 PID 376 wrote to memory of 3696 376 ziEc8032.exe 85 PID 376 wrote to memory of 3696 376 ziEc8032.exe 85 PID 376 wrote to memory of 4792 376 ziEc8032.exe 93 PID 376 wrote to memory of 4792 376 ziEc8032.exe 93 PID 376 wrote to memory of 4792 376 ziEc8032.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7003f5125f90b4910dbed46815675a5c75ca88d1ea71a7394fac8a23a4d4354.exe"C:\Users\Admin\AppData\Local\Temp\b7003f5125f90b4910dbed46815675a5c75ca88d1ea71a7394fac8a23a4d4354.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEc8032.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEc8032.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr232659.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr232659.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku539986.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku539986.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD59c8cdaa6acdd7f731a8f43d6cb95d0bd
SHA1c1f572bf85673fb20281100bc08b7d95c290657f
SHA2563a174b2aead88ef198de5878ee324f6c52d0b5a15fc22c144fef10f441c7012a
SHA5128eb770ce785232c8dc0a14681f80a6487bcb13e94849ae3933b5c7ffe6444a537db3f4fbf8e812c381547a5c2abc0c3b7f0e5d7d2a79971b744107366f4b0842
-
Filesize
11KB
MD54d1aa62dafdd6926d091dcbe02fbd5e6
SHA1d89265b2ad209686e8cab613b843c9f557a09fc3
SHA25664952a2f28bec56a56e19a86a412e6f8ad0a5e76713eb7b12e1aa7952a133da4
SHA5127a8461ef0c2c0d862da4b59820e6a1b5fa32606e21c5a3f779df9c1248d2696482f261b936a59bd07c0cf0c0f17e8f02297050d0a763066e9a97ab7f132cb6b9
-
Filesize
372KB
MD5ad35ae4af1929abb14c90bd61d6ad6d8
SHA199627c32bcc53247d46654d857eac78864ecdc85
SHA2567918f20deb2a2255b43702b0272172754ea37f19e4e42543760cbd8844b0fc16
SHA512ef7b4812d68ee0b3a25da20ba35bf00d079f994d80d0bfcfd8e39bce4af585f779911270ca7d29f2a0e6cc1a496d2ca2281b4a84b1c6692b0fae7791b6841cab