Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2024, 22:59
Static task
static1
Behavioral task
behavioral1
Sample
9635a0a4359f0b7c6c8d023dcf9791a8f8fc7bdd3d04b7035f521bd26576d4ea.exe
Resource
win10v2004-20241007-en
General
-
Target
9635a0a4359f0b7c6c8d023dcf9791a8f8fc7bdd3d04b7035f521bd26576d4ea.exe
-
Size
537KB
-
MD5
4c14a523953e38399e1c462cd3884a68
-
SHA1
5e94d60ec8d4233ba54118960e93ba89826b3ca5
-
SHA256
9635a0a4359f0b7c6c8d023dcf9791a8f8fc7bdd3d04b7035f521bd26576d4ea
-
SHA512
ae93e40b318191a965ce154e613d5b5164f2228bae969d9e262b66e227e6cca6f4f68e702af89184958bec3e8a9e90797f5df1ef3639cc68dffe5c4d1f19bf1b
-
SSDEEP
12288:AMrfy90mMlQiuTKPxE+iCMWkYuzdUmLHDwlzzvSrkaXsUnWA:PyPiumSCMWkVzdVjwlzz+rpnWA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cc0-12.dat healer behavioral1/memory/4596-15-0x0000000000FD0000-0x0000000000FDA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr624072.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr624072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr624072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr624072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr624072.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr624072.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4736-22-0x0000000002880000-0x00000000028C6000-memory.dmp family_redline behavioral1/memory/4736-24-0x0000000005420000-0x0000000005464000-memory.dmp family_redline behavioral1/memory/4736-30-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-38-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-88-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-86-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-82-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-80-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-78-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-76-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-74-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-72-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-68-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-66-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-64-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-60-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-58-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-54-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-50-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-48-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-46-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-42-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-36-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-34-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-32-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-84-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-70-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-62-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-56-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-52-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-44-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-40-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-28-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-26-0x0000000005420000-0x000000000545F000-memory.dmp family_redline behavioral1/memory/4736-25-0x0000000005420000-0x000000000545F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1416 zitk0782.exe 4596 jr624072.exe 4736 ku262523.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr624072.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9635a0a4359f0b7c6c8d023dcf9791a8f8fc7bdd3d04b7035f521bd26576d4ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zitk0782.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 220 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9635a0a4359f0b7c6c8d023dcf9791a8f8fc7bdd3d04b7035f521bd26576d4ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zitk0782.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku262523.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4596 jr624072.exe 4596 jr624072.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4596 jr624072.exe Token: SeDebugPrivilege 4736 ku262523.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 232 wrote to memory of 1416 232 9635a0a4359f0b7c6c8d023dcf9791a8f8fc7bdd3d04b7035f521bd26576d4ea.exe 86 PID 232 wrote to memory of 1416 232 9635a0a4359f0b7c6c8d023dcf9791a8f8fc7bdd3d04b7035f521bd26576d4ea.exe 86 PID 232 wrote to memory of 1416 232 9635a0a4359f0b7c6c8d023dcf9791a8f8fc7bdd3d04b7035f521bd26576d4ea.exe 86 PID 1416 wrote to memory of 4596 1416 zitk0782.exe 87 PID 1416 wrote to memory of 4596 1416 zitk0782.exe 87 PID 1416 wrote to memory of 4736 1416 zitk0782.exe 94 PID 1416 wrote to memory of 4736 1416 zitk0782.exe 94 PID 1416 wrote to memory of 4736 1416 zitk0782.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\9635a0a4359f0b7c6c8d023dcf9791a8f8fc7bdd3d04b7035f521bd26576d4ea.exe"C:\Users\Admin\AppData\Local\Temp\9635a0a4359f0b7c6c8d023dcf9791a8f8fc7bdd3d04b7035f521bd26576d4ea.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitk0782.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitk0782.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr624072.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr624072.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku262523.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku262523.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:220
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5b5312f0ded3dd379478878bf2d4c7c69
SHA13eb753f146c4d9b70c884dcc242af5d9915836ad
SHA2568bfd70abc6b75a977bdacaea8937b547bac313541d62f793560cc8a3cc6ccb01
SHA5129f135ee35245d0f3c03fc123a23e7a323907f451414dbabde9de3bfa8b59cc3d98311a7719361479fe08a849293402f8a0e5c0677bb6639ff490e35dd3793af4
-
Filesize
14KB
MD56e761d3ea3c4d8b88f33184461f0a822
SHA1272156007060c8059052808edbcf9328d7b89000
SHA2563473e3bf8edf1ff5ae44ec93ae59dddcc80d852d28daf0629f889f45793e1549
SHA512c3ecdb47f26262ddc4f670de31d3a4ea56ad5309fe57e2f8f1c27216739eb3aa729e60bbfc84bc1c976f044c777daf484b40a2f060fb559ebc678ce0458afcfd
-
Filesize
352KB
MD524a68c68885f58e10e59464e5c2cf9aa
SHA14b375a3e440c00799180b19134646d67f89677b0
SHA2561b042becedea4eb03ce5e2d18ff08ea52c9aa81aec115a8370180a78d240fa53
SHA5128bc03cee79f285ac430f861f7be075cfffb937dd41e79c4a983308981430325fb4919713b4d21e209b283b08bf5fb89a25c127a6fde6dcd896806e6e8212c7cb