Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 12:30
Static task
static1
Behavioral task
behavioral1
Sample
badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723.exe
Resource
win10v2004-20241007-en
General
-
Target
badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723.exe
-
Size
530KB
-
MD5
502ed4476c3dfa43e378098542f34454
-
SHA1
48e47074a2daf44c0bf67e665dc0594244a7da02
-
SHA256
badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723
-
SHA512
23da1faf871aea9e21b5840075180f9cb975589929082c07630c62ff94557610bee004b550131221d15f6966e56d0a704fb326e131e98b7a1e0a41214692a385
-
SSDEEP
12288:PMrGy90RCMowi1tXe2rPdiKDzMx4f5KXa/cKtjMA+O:JyajMXrrPdiMzDALK5MA+O
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr104584.exe healer behavioral1/memory/1484-15-0x00000000004B0000-0x00000000004BA000-memory.dmp healer -
Healer family
-
Processes:
jr104584.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr104584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr104584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr104584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr104584.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr104584.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr104584.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/912-22-0x0000000002580000-0x00000000025C6000-memory.dmp family_redline behavioral1/memory/912-24-0x0000000002660000-0x00000000026A4000-memory.dmp family_redline behavioral1/memory/912-32-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-30-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-28-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-26-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-25-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-44-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-86-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-84-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-82-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-80-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-78-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-76-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-74-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-72-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-70-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-68-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-66-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-64-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-60-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-58-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-56-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-54-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-52-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-48-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-46-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-43-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-40-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-38-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-36-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-34-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-88-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-63-0x0000000002660000-0x000000000269F000-memory.dmp family_redline behavioral1/memory/912-50-0x0000000002660000-0x000000000269F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziKh9401.exejr104584.exeku158803.exepid process 1592 ziKh9401.exe 1484 jr104584.exe 912 ku158803.exe -
Processes:
jr104584.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr104584.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723.exeziKh9401.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziKh9401.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723.exeziKh9401.exeku158803.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziKh9401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku158803.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr104584.exepid process 1484 jr104584.exe 1484 jr104584.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr104584.exeku158803.exedescription pid process Token: SeDebugPrivilege 1484 jr104584.exe Token: SeDebugPrivilege 912 ku158803.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723.exeziKh9401.exedescription pid process target process PID 1448 wrote to memory of 1592 1448 badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723.exe ziKh9401.exe PID 1448 wrote to memory of 1592 1448 badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723.exe ziKh9401.exe PID 1448 wrote to memory of 1592 1448 badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723.exe ziKh9401.exe PID 1592 wrote to memory of 1484 1592 ziKh9401.exe jr104584.exe PID 1592 wrote to memory of 1484 1592 ziKh9401.exe jr104584.exe PID 1592 wrote to memory of 912 1592 ziKh9401.exe ku158803.exe PID 1592 wrote to memory of 912 1592 ziKh9401.exe ku158803.exe PID 1592 wrote to memory of 912 1592 ziKh9401.exe ku158803.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723.exe"C:\Users\Admin\AppData\Local\Temp\badf50be7344d5490811df76e7459ff91678dda698a0e1bf47d6ef268742e723.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKh9401.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKh9401.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr104584.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr104584.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku158803.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku158803.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:912
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5f2138538307d70c9d3cebddf6bd52ee3
SHA18d40b33fd7de9feef2c5275a0c1fdcebd5579c9e
SHA256958d081e4940cd900ad708b0a354d8a9e9195e86d4b8ed452f9ad0910765fdc1
SHA5123d9c337beeac0e8268a45f298e1135ac05b0e1406b23d6dc661f656d0081a93e860645f8cbf5900324b715ead5417f116f29a28ede5e3894d271c0df11315f51
-
Filesize
12KB
MD5728c2643f6171667a53b462e7d6de96b
SHA1caee1641ad3f76999e20ce59cec3e4c26c8378ae
SHA25605eb4456e2f1b5308f37f41427e353a3721db10b5ca39beec021a0f2170253e8
SHA512cd4376b27b6fbbaa89fecd580545e8788e084baacb13c79079cfc792cb66580b1c01d6d2e1babf908a31b81afb77d63d3c8018a9eb4168e467b1bfae361d564e
-
Filesize
434KB
MD522d1b8d00184871637a51b8ebc510f45
SHA1e54d8f080bce986cd58efa7b5c9f4b8738cb7ad0
SHA25656eeb3eedbab5c57d0c970613060462b44498862c3a2919c9c888fed0d979e81
SHA512bba4922a430c4df6193ebd1eca8dbfa51181f4f5b02396f5d2c4f7eaa94c08f26b574f249f864a0803a83aa187696f95f33ba08131e38d2593b9e7711d07e169