Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 23:23
Static task
static1
Behavioral task
behavioral1
Sample
171f1d365c419c8ca3e4d9d494c756aba2353b674691c1947414108541330f47.exe
Resource
win10v2004-20241007-en
General
-
Target
171f1d365c419c8ca3e4d9d494c756aba2353b674691c1947414108541330f47.exe
-
Size
522KB
-
MD5
b6225337dd5189828066809314650109
-
SHA1
abf3058a76fd9ab9d80ea2cbfe8b092d90510c1f
-
SHA256
171f1d365c419c8ca3e4d9d494c756aba2353b674691c1947414108541330f47
-
SHA512
6930c67e0207d36da330a9a72e47c06c8015ccdb6d3528447aac16bedc95b1194f6fe7e9fb45a7de6a4500ccbc7f3f766142b91c2503571c47e966d3ebd183fd
-
SSDEEP
12288:FMrpy904rEl/VvhkirfUzOorhCNJy/O9Md/dbH0L:0y2VJWOUYNs/O9c0L
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b9d-12.dat healer behavioral1/memory/4052-15-0x0000000000460000-0x000000000046A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr301026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr301026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr301026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr301026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr301026.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr301026.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3348-22-0x0000000004A10000-0x0000000004A56000-memory.dmp family_redline behavioral1/memory/3348-24-0x0000000005060000-0x00000000050A4000-memory.dmp family_redline behavioral1/memory/3348-26-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-88-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-86-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-84-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-80-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-78-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-76-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-74-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-72-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-68-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-66-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-64-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-62-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-60-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-58-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-56-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-52-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-50-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-48-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-47-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-44-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-42-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-40-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-38-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-36-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-34-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-32-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-30-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-28-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-25-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-82-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-70-0x0000000005060000-0x000000000509F000-memory.dmp family_redline behavioral1/memory/3348-54-0x0000000005060000-0x000000000509F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2912 ziIb0354.exe 4052 jr301026.exe 3348 ku242872.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr301026.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 171f1d365c419c8ca3e4d9d494c756aba2353b674691c1947414108541330f47.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziIb0354.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku242872.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 171f1d365c419c8ca3e4d9d494c756aba2353b674691c1947414108541330f47.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziIb0354.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4052 jr301026.exe 4052 jr301026.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4052 jr301026.exe Token: SeDebugPrivilege 3348 ku242872.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 696 wrote to memory of 2912 696 171f1d365c419c8ca3e4d9d494c756aba2353b674691c1947414108541330f47.exe 84 PID 696 wrote to memory of 2912 696 171f1d365c419c8ca3e4d9d494c756aba2353b674691c1947414108541330f47.exe 84 PID 696 wrote to memory of 2912 696 171f1d365c419c8ca3e4d9d494c756aba2353b674691c1947414108541330f47.exe 84 PID 2912 wrote to memory of 4052 2912 ziIb0354.exe 85 PID 2912 wrote to memory of 4052 2912 ziIb0354.exe 85 PID 2912 wrote to memory of 3348 2912 ziIb0354.exe 97 PID 2912 wrote to memory of 3348 2912 ziIb0354.exe 97 PID 2912 wrote to memory of 3348 2912 ziIb0354.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\171f1d365c419c8ca3e4d9d494c756aba2353b674691c1947414108541330f47.exe"C:\Users\Admin\AppData\Local\Temp\171f1d365c419c8ca3e4d9d494c756aba2353b674691c1947414108541330f47.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziIb0354.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziIb0354.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr301026.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr301026.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku242872.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku242872.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD58ccf45a74a5da446a35dc431692d6ba6
SHA14960ec6346082f9cfa2838cbf0b9ee81aeab8728
SHA2562e5aad5d1b894bcab153c733934d61432374bf44cc8ce422e9d6421da8d19f86
SHA51243a82d5681a50ff7cb994922183f89bc8fc495cc1c3f127053f35fdaaeeb810725d85b7f719c7b4fecc2a0d5a5ab3bd3d0bfbb995d9187457bac335563430083
-
Filesize
15KB
MD5d1e68648135d18e827480607b7d91aaf
SHA1ddf855a40ed31f1ffb6f42a9aad925157fc66ac1
SHA256e7ab5d5d1ec4da99812bda6bf83085cc0967177fe0452b9c381681f0df26d784
SHA51269588336ccfc591e0c152a4d9a7a2152f03ce4b34548915d15d6f0a211f436f8e11765fbd80f304c6543dea3f5a9d445e9d137dc07d0844e96c7678a7ceb557e
-
Filesize
295KB
MD520b178c8ce2b7d17ba658ab6eb68c44a
SHA1630d1666e7ec96fb01c3b17bcd53733b5f0b6f11
SHA256a27a42fc4b938b563f7239771cca2b2fc64094c32b84772f3cc36181a00db55e
SHA51224d6f3e98d1d3b74f358c5b72349e41968d998d9cd8a172a88187c20c0a7b42da16536cc7e8cd5bec9d69cdebf034c1ffc56c2bcf64889fe8602323184c3a511