Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
eaa40cfb88d082a0bb00c8cbbf46b6e60e3dd3f98ec9361555d9f47184ccc634.exe
Resource
win10v2004-20241007-en
General
-
Target
eaa40cfb88d082a0bb00c8cbbf46b6e60e3dd3f98ec9361555d9f47184ccc634.exe
-
Size
522KB
-
MD5
80e50d4698070a556c732a619e22d570
-
SHA1
888bb3c84fd15a825554673a2633693b627c85c6
-
SHA256
eaa40cfb88d082a0bb00c8cbbf46b6e60e3dd3f98ec9361555d9f47184ccc634
-
SHA512
7518c6fb9c993f6c36021ed5653a00159f90fd83c5ace2dacb36e4f51bde6cd68f6fbb33f61edc42c3bfd6b7c51daece0fb8370daf43ace7d608338df3ffcb81
-
SSDEEP
12288:2MrVy90h3PQlR+7FpLVeYSjfYovc4u32OknGcrhO:jyQPQ3clRSp04u32OknGIhO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000a000000023bca-12.dat healer behavioral1/memory/2076-15-0x00000000008F0000-0x00000000008FA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr932214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr932214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr932214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr932214.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr932214.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr932214.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4396-22-0x0000000004A30000-0x0000000004A76000-memory.dmp family_redline behavioral1/memory/4396-24-0x0000000004AB0000-0x0000000004AF4000-memory.dmp family_redline behavioral1/memory/4396-28-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-34-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-88-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-86-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-84-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-82-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-80-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-78-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-76-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-72-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-70-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-69-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-66-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-64-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-63-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-60-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-56-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-54-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-50-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-46-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-42-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-38-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-32-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-30-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-74-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-58-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-52-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-48-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-44-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-40-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-36-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-26-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline behavioral1/memory/4396-25-0x0000000004AB0000-0x0000000004AEF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1492 ziRT6886.exe 2076 jr932214.exe 4396 ku153250.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr932214.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eaa40cfb88d082a0bb00c8cbbf46b6e60e3dd3f98ec9361555d9f47184ccc634.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziRT6886.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaa40cfb88d082a0bb00c8cbbf46b6e60e3dd3f98ec9361555d9f47184ccc634.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziRT6886.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku153250.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2076 jr932214.exe 2076 jr932214.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2076 jr932214.exe Token: SeDebugPrivilege 4396 ku153250.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3496 wrote to memory of 1492 3496 eaa40cfb88d082a0bb00c8cbbf46b6e60e3dd3f98ec9361555d9f47184ccc634.exe 86 PID 3496 wrote to memory of 1492 3496 eaa40cfb88d082a0bb00c8cbbf46b6e60e3dd3f98ec9361555d9f47184ccc634.exe 86 PID 3496 wrote to memory of 1492 3496 eaa40cfb88d082a0bb00c8cbbf46b6e60e3dd3f98ec9361555d9f47184ccc634.exe 86 PID 1492 wrote to memory of 2076 1492 ziRT6886.exe 87 PID 1492 wrote to memory of 2076 1492 ziRT6886.exe 87 PID 1492 wrote to memory of 4396 1492 ziRT6886.exe 97 PID 1492 wrote to memory of 4396 1492 ziRT6886.exe 97 PID 1492 wrote to memory of 4396 1492 ziRT6886.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaa40cfb88d082a0bb00c8cbbf46b6e60e3dd3f98ec9361555d9f47184ccc634.exe"C:\Users\Admin\AppData\Local\Temp\eaa40cfb88d082a0bb00c8cbbf46b6e60e3dd3f98ec9361555d9f47184ccc634.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRT6886.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRT6886.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr932214.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr932214.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku153250.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku153250.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
379KB
MD5c749d1bed3a1bb9e4fdf2bdabe8010a3
SHA1189852b560d974fd13db4332e391a3b31bce04b6
SHA256f8602674a07403929bd56ee8122918a18fdf600474ddfa9f894b17cde5065b49
SHA512c8cf57f333de2b87ff5ee1e1bd911539682f951d1629a763b26a486d964676f52a94cd9626b126c389b69e6aa77838674e49f3c47fb0b649f958e30bec0676b9
-
Filesize
14KB
MD57154d9165f6d936000d657a36f918d50
SHA1e15ccf2049187186c89d7dde615519976da2ab74
SHA2567670a3ef3e474429c63d05f5e197a18f0612eb48a77be49e2e69d51b7520de3e
SHA5126edfcf5cd5d9ded2bbee9312d5e3851e55d105c4ed75def5869f51e48d303fa89fc22599be96e5935568f610a4e61269293c46ef660812558e17447afc3e3177
-
Filesize
295KB
MD58d090e1dad2117a7b9f84893ef803ae2
SHA130b8faff958ee6f528d08d7f8af69194735d9b18
SHA256c0abb6b947fef9816e9b6f74798255f5ba3d85e0038e2ac73d538520339a0174
SHA5121d9e4523c3345269dc9dffe67cb1a7897e80fe2894a959b4421bfd23ae07166eb0a0f96809cdcd3dfb7d257f1364058bb7c81973d60319eb3f2b6bc94ac472d4