Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b.exe
Resource
win10v2004-20241007-en
General
-
Target
f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b.exe
-
Size
529KB
-
MD5
d3038d00d2ae93a3863c91571b6a38a3
-
SHA1
5f929a67add32888a7672f6eacd7d911818cec31
-
SHA256
f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b
-
SHA512
0ebafd1e9cd0c39136e36bcb3567c386bce779d399b2059319289755d7c14d44f97a8e045cce8d2f3e5cde1386cc067c692a88100e6dcfb5f6f29a4b00a1e7ed
-
SSDEEP
12288:AMrBy90j6nKSoi6Gwga83rGj54IfWakcaLDDx:Ry1foi6dY3rGemW1ZDDx
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000c000000023bae-12.dat healer behavioral1/memory/2424-15-0x00000000005B0000-0x00000000005BA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr904567.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr904567.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr904567.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr904567.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr904567.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr904567.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4116-22-0x0000000004B50000-0x0000000004B96000-memory.dmp family_redline behavioral1/memory/4116-24-0x0000000007160000-0x00000000071A4000-memory.dmp family_redline behavioral1/memory/4116-82-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-89-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-86-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-84-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-80-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-76-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-74-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-73-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-70-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-68-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-66-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-64-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-62-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-58-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-56-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-54-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-53-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-50-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-48-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-46-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-44-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-42-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-40-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-38-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-34-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-32-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-30-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-28-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-78-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-60-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-36-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-26-0x0000000007160000-0x000000000719F000-memory.dmp family_redline behavioral1/memory/4116-25-0x0000000007160000-0x000000000719F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3488 zihp3340.exe 2424 jr904567.exe 4116 ku460007.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr904567.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zihp3340.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4924 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zihp3340.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku460007.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2424 jr904567.exe 2424 jr904567.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2424 jr904567.exe Token: SeDebugPrivilege 4116 ku460007.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1124 wrote to memory of 3488 1124 f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b.exe 84 PID 1124 wrote to memory of 3488 1124 f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b.exe 84 PID 1124 wrote to memory of 3488 1124 f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b.exe 84 PID 3488 wrote to memory of 2424 3488 zihp3340.exe 85 PID 3488 wrote to memory of 2424 3488 zihp3340.exe 85 PID 3488 wrote to memory of 4116 3488 zihp3340.exe 93 PID 3488 wrote to memory of 4116 3488 zihp3340.exe 93 PID 3488 wrote to memory of 4116 3488 zihp3340.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b.exe"C:\Users\Admin\AppData\Local\Temp\f392783ec6816bf40bb92a0ba3c22cb641b1f58c4806691d90a524ee9570727b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihp3340.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihp3340.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr904567.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr904567.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku460007.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku460007.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4116
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4924
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD558e338d1fb0822dbe05f6c007f8d916c
SHA15449f5a606ddaafbdca1e71c9bdb3fb0ce7e63dd
SHA25606562e0fa964b1959b39e0e03982d9c712064a5a2605f849b8ac7d750db824f1
SHA51277bc5035510281ad128b9ffd12c66bd09ebca3d9f9d74aec66977d963d2c4328543b6c381a052b91f7d149c166fbebf62914a000856832862490ec24d8da6f1e
-
Filesize
12KB
MD507c21572f680f929e2f01151bfde4847
SHA1c95f0cdabfbb3731c85cfb0693dac58b959e81a4
SHA256f0ab8453021717af55e599b6a8d6064630ca56ef7d15c717d092fbe61d1454cd
SHA512a40bb0718eb7024ef1b3a8bd1b9d2a128dce468cefb9daf9fea9253444b9ad28e399f82f76f1d3d27eee4bd38899b544eadbe671d0baf41b96bc14f27e4bc505
-
Filesize
342KB
MD5dc8fd62a38ca8c961970b5b22436b63e
SHA116ead4c24f135073eb67f94d4ba28a8e9539adbc
SHA2566023c8a69c8169cdea03f89f31a127d25339b473eae955e1930dbb6a592f1a05
SHA5121c23fcd74aec1a9543f2cd72bb7e213032759dac9d5575a4cd881b6210343c857febcfc27a0ab569d614566a252bd6b8850bb5a07d71777cfae49f8d84ea84cf