Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
632fc07f531aa33c332e2b1e84eb336afebc1e5064627d5c91d075afafe865e2.exe
Resource
win10v2004-20241007-en
General
-
Target
632fc07f531aa33c332e2b1e84eb336afebc1e5064627d5c91d075afafe865e2.exe
-
Size
534KB
-
MD5
5a34cc777dfc5ef77266cc295346faad
-
SHA1
a630928ba6bae14c4da2196ec9046a2fedbe9054
-
SHA256
632fc07f531aa33c332e2b1e84eb336afebc1e5064627d5c91d075afafe865e2
-
SHA512
2a497f4bb2bcb143da013598501084d569a2ae052bc43bbbff4d1ae641902695d5873f20cae1e96b75f9ad93a5ff02964fcee5034a4187d94d11df32702fb163
-
SSDEEP
12288:zMrmy90daDtgXZ63sbrPMN2xcgAzObnWtzwz0XtGp5Ax:pyKStgc3qPHAz2nQMzutGT2
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca4-12.dat healer behavioral1/memory/2968-15-0x0000000000C70000-0x0000000000C7A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr273445.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr273445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr273445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr273445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr273445.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr273445.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1164-22-0x0000000002480000-0x00000000024C6000-memory.dmp family_redline behavioral1/memory/1164-24-0x00000000050E0000-0x0000000005124000-memory.dmp family_redline behavioral1/memory/1164-38-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-40-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-46-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-88-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-86-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-84-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-82-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-80-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-78-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-76-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-74-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-72-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-70-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-68-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-66-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-64-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-62-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-60-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-58-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-56-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-54-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-52-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-50-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-48-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-44-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-42-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-36-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-32-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-30-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-29-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-34-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-26-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline behavioral1/memory/1164-25-0x00000000050E0000-0x000000000511F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2376 ziVM7802.exe 2968 jr273445.exe 1164 ku494353.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr273445.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 632fc07f531aa33c332e2b1e84eb336afebc1e5064627d5c91d075afafe865e2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVM7802.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku494353.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 632fc07f531aa33c332e2b1e84eb336afebc1e5064627d5c91d075afafe865e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziVM7802.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2968 jr273445.exe 2968 jr273445.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2968 jr273445.exe Token: SeDebugPrivilege 1164 ku494353.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4392 wrote to memory of 2376 4392 632fc07f531aa33c332e2b1e84eb336afebc1e5064627d5c91d075afafe865e2.exe 86 PID 4392 wrote to memory of 2376 4392 632fc07f531aa33c332e2b1e84eb336afebc1e5064627d5c91d075afafe865e2.exe 86 PID 4392 wrote to memory of 2376 4392 632fc07f531aa33c332e2b1e84eb336afebc1e5064627d5c91d075afafe865e2.exe 86 PID 2376 wrote to memory of 2968 2376 ziVM7802.exe 88 PID 2376 wrote to memory of 2968 2376 ziVM7802.exe 88 PID 2376 wrote to memory of 1164 2376 ziVM7802.exe 92 PID 2376 wrote to memory of 1164 2376 ziVM7802.exe 92 PID 2376 wrote to memory of 1164 2376 ziVM7802.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\632fc07f531aa33c332e2b1e84eb336afebc1e5064627d5c91d075afafe865e2.exe"C:\Users\Admin\AppData\Local\Temp\632fc07f531aa33c332e2b1e84eb336afebc1e5064627d5c91d075afafe865e2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVM7802.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVM7802.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr273445.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr273445.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku494353.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku494353.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD5f6852abd104b02331740e69bc0f895fb
SHA17685bb18d9f277ccab78b98f2c8560dc01a10760
SHA25649a51c71821f1430acf5e91314c0e9b00e49d3b4c53c3d4f21f98299c448c6b1
SHA5123e3c080620eed31b0d6197db42c7b7a72445f7b7f772d959e07570a3c98f2b7f8737f72aba83ebdeca42495ab25ccad5abf1b23eccd70d84e97c2b7e4d596344
-
Filesize
12KB
MD5c0c2d76f338c9b036db2ae2958ab038a
SHA1e3424b86b33e1d35cd3696f7ece383ac0b08abbe
SHA2562bba6b0e771b462b6ca1ec59be3e9e3a7f96552ae8ba345980610a54d11fa1fe
SHA512fd3fcce3d8956c51dface7cad043a161cb650a9a5ba4352e0b2593fb0637b1ab41970557e1527e493cdd8c0b68e85fa82415e7670e6a532763f839f9ce0cf7ee
-
Filesize
319KB
MD5516ea467736c36f025d034cad5e7f9d8
SHA1aae147d58d5ff916c5d163a430c97288ab224d36
SHA2566e1c77e1e84e61d09afb8597881f71a04532072e1ada34204156a3c8a6d846f3
SHA512112d954144c28f5a29c4f74c27abf4fde17bb0af8ee5739c2067ec4dc062a704a59e14a3cbbb22fa806f8641827f4a12cda5a1379f49450ffcad7d1022feff6d