Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 23:15
Static task
static1
Behavioral task
behavioral1
Sample
53745af4bfbbe003529357e034277eca9ca663cd1530ed1627e8f190a8cb09a5.exe
Resource
win10v2004-20241007-en
General
-
Target
53745af4bfbbe003529357e034277eca9ca663cd1530ed1627e8f190a8cb09a5.exe
-
Size
534KB
-
MD5
c3b7997daf2724d9e80d069fc0d44be1
-
SHA1
1306ceae974e8c2428723b5a7dd0551108c015c6
-
SHA256
53745af4bfbbe003529357e034277eca9ca663cd1530ed1627e8f190a8cb09a5
-
SHA512
39a318d3a9c79558143e2ada278c64d3f7bb8707a1e13339360490cbdd8d3c2b51664131166a75d297e48917a0e7dccfab3267ea86cac08c4611606611a3fc14
-
SSDEEP
12288:UMroy90c0lPuvLB1BcN0jzubO4NUFOxE7oZ:cyklt0jzWOo5xEcZ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cae-12.dat healer behavioral1/memory/4684-15-0x0000000000700000-0x000000000070A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr624523.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr624523.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr624523.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr624523.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr624523.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr624523.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4396-22-0x00000000024A0000-0x00000000024E6000-memory.dmp family_redline behavioral1/memory/4396-24-0x0000000002690000-0x00000000026D4000-memory.dmp family_redline behavioral1/memory/4396-34-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-38-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-88-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-86-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-84-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-82-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-80-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-76-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-74-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-72-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-70-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-68-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-66-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-64-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-62-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-60-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-58-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-54-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-52-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-50-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-48-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-46-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-44-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-42-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-40-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-36-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-32-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-30-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-78-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-56-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-28-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-26-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline behavioral1/memory/4396-25-0x0000000002690000-0x00000000026CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3512 ziDz5587.exe 4684 jr624523.exe 4396 ku581275.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr624523.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziDz5587.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 53745af4bfbbe003529357e034277eca9ca663cd1530ed1627e8f190a8cb09a5.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4692 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku581275.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53745af4bfbbe003529357e034277eca9ca663cd1530ed1627e8f190a8cb09a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziDz5587.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4684 jr624523.exe 4684 jr624523.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4684 jr624523.exe Token: SeDebugPrivilege 4396 ku581275.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4060 wrote to memory of 3512 4060 53745af4bfbbe003529357e034277eca9ca663cd1530ed1627e8f190a8cb09a5.exe 86 PID 4060 wrote to memory of 3512 4060 53745af4bfbbe003529357e034277eca9ca663cd1530ed1627e8f190a8cb09a5.exe 86 PID 4060 wrote to memory of 3512 4060 53745af4bfbbe003529357e034277eca9ca663cd1530ed1627e8f190a8cb09a5.exe 86 PID 3512 wrote to memory of 4684 3512 ziDz5587.exe 87 PID 3512 wrote to memory of 4684 3512 ziDz5587.exe 87 PID 3512 wrote to memory of 4396 3512 ziDz5587.exe 96 PID 3512 wrote to memory of 4396 3512 ziDz5587.exe 96 PID 3512 wrote to memory of 4396 3512 ziDz5587.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\53745af4bfbbe003529357e034277eca9ca663cd1530ed1627e8f190a8cb09a5.exe"C:\Users\Admin\AppData\Local\Temp\53745af4bfbbe003529357e034277eca9ca663cd1530ed1627e8f190a8cb09a5.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDz5587.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDz5587.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr624523.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr624523.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku581275.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku581275.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:4692
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD53a5fbcca9017d4226f51d25e44382f87
SHA13468584ef1fec6e84ff3bd7e967404073f1afe5b
SHA2563edc2649d73b4c92b305cbdfd679813ce4c6202116e8ba238cc0b1a413f28023
SHA5126046f5ebc831816ce57bc37a7a721db8640ef46fe46aa12129d3a07029e5bb645d49223d411a99c85e30ea25c3b4ae53a02f3ff9070132c87b29951886082aad
-
Filesize
12KB
MD584c3573d4e0f1d9810367e4236f48274
SHA1b7b3a6986ca881652f2ca25d15857720e78e8271
SHA25631920c1be577c4184c2eae7c8480366f1eeb441542c79ea59293a24dcb202174
SHA5126492d31c0d600c0322ad146b4901ad98a25ffe711e4b307c5a3dd6afe88483465f4779dbdc95cc01e8f0b99cb6cbc5c295c1902c65ab973ca87d0f911f351ce6
-
Filesize
319KB
MD52769d104deb54d11eb7cfbf6135c5827
SHA1c497ab7cad9c3ebdc79f7219a695b45488c5e3f7
SHA2560c82802d754ae622bc4cf4a731ad2f96d312d52cd3a7357c342f83bed95a5fbe
SHA512fc6ea016ac2dc5c813c11163cb1d837c49774f6e9645a806a065a199f879da0bc1c29e3eb4375aeadb574e07d57909570b4d9b2047ed3a6517dfad50bf1ab2ce