Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2024, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834.exe
Resource
win10v2004-20241007-en
General
-
Target
4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834.exe
-
Size
560KB
-
MD5
0e4a824c329ea3568cdfc4ba786c94d1
-
SHA1
ee6eeeb1db5551734d81acf5e4a50bafcb0942dc
-
SHA256
4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834
-
SHA512
ab0cba06c310eb0771c81725db9824332e1c82e587f34dd33502f8c7c05641325e2b2bb28d73f9c45894d4fb3447702e1cabf23dd5f98f7dcbcfe7b22aee7e97
-
SSDEEP
12288:rMrGy902DsqalMUHagg0MPzlQ4/wn354Jsl5+:RyJwMsg0MPzlQuwWsa
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb3-12.dat healer behavioral1/memory/180-15-0x0000000000760000-0x000000000076A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr945292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr945292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr945292.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr945292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr945292.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr945292.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4456-22-0x0000000002740000-0x0000000002786000-memory.dmp family_redline behavioral1/memory/4456-24-0x00000000053D0000-0x0000000005414000-memory.dmp family_redline behavioral1/memory/4456-28-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-32-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-30-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-88-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-86-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-85-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-78-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-76-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-74-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-72-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-70-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-68-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-66-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-64-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-62-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-60-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-58-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-54-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-52-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-51-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-48-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-46-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-45-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-42-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-40-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-38-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-36-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-34-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-83-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-80-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-56-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-26-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline behavioral1/memory/4456-25-0x00000000053D0000-0x000000000540F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3268 ziWr5608.exe 180 jr945292.exe 4456 ku930352.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr945292.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWr5608.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4508 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziWr5608.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku930352.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 180 jr945292.exe 180 jr945292.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 180 jr945292.exe Token: SeDebugPrivilege 4456 ku930352.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3276 wrote to memory of 3268 3276 4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834.exe 84 PID 3276 wrote to memory of 3268 3276 4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834.exe 84 PID 3276 wrote to memory of 3268 3276 4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834.exe 84 PID 3268 wrote to memory of 180 3268 ziWr5608.exe 85 PID 3268 wrote to memory of 180 3268 ziWr5608.exe 85 PID 3268 wrote to memory of 4456 3268 ziWr5608.exe 93 PID 3268 wrote to memory of 4456 3268 ziWr5608.exe 93 PID 3268 wrote to memory of 4456 3268 ziWr5608.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834.exe"C:\Users\Admin\AppData\Local\Temp\4fc2452867130c4cca1cbdd8558f11ea6cc157e3fadea2aa811c25218bb70834.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWr5608.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWr5608.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr945292.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr945292.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:180
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku930352.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku930352.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4508
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD54b28af8164fa87118792c4a68793bc40
SHA1200375f023dcaf58b43c520e8b7a5e6dee425364
SHA256b91051f0323a81fe00cf2ca37b205817f2f919faa149fb8f8b5cfaffde821556
SHA51270eb142768e2b65f8a84f9a2396c4edf6e52ee79ce2892cf2e00e6bf358601b7b2d3ef8f72977d88bae042b4c037d89e969d2d60ac0b3f8be3353b570bca4612
-
Filesize
12KB
MD554f85f7d6f119c4c6ce62bb6003e0d5d
SHA1e39a4faa69ce89c2f5ceca8c7579fbe9b46f12e0
SHA256d4c2342989b2b4efc2771685d7231e943881c987fb564ce155c32a7e16722d4b
SHA512cfebb160c38ea3ca3e20cec4ac52f69c67fd7ed7e7d2cbcd598c3e0e608a0e397e3b7ca835de1db2c8621da0bcc36643694b484090d1dbee433058439694e543
-
Filesize
370KB
MD5ab34a8d41aa2827c99b63c85a747c6e9
SHA15eead0dca1185620258d777d853d7951bab5a06d
SHA256ecbb01adc2812a849b25b32e905a346b473e447336cdc0b6840c78573bc4772d
SHA512822d3492eff02744b851b56ddca7db4c94b183468790bda3cff933a3786c0919e423f3c9d226e9149048e7cb83a46b6742007260bdc51435b2662be4ea030ee1