Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65.exe
Resource
win10v2004-20241007-en
General
-
Target
63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65.exe
-
Size
560KB
-
MD5
24a8e98a7e10a2312697143ec276c2cd
-
SHA1
db4175ad094d1ca247107941cc83ca8c7fa56083
-
SHA256
63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65
-
SHA512
bd5d102b46ab5b1f6697655c3c61d468a64c8ac8a4c3e94896b7e7f5b1c7152257b53e5d976c472fe2939bc65a32123e791944c0063593e8c228b3dcc7a22c1b
-
SSDEEP
12288:VMrIy90ZDBh+MrLJIKaWvA+Sfx8ElxJqfx2QOFGXOe:hy4n+0rfC8El+fx2QOcL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr774281.exe healer behavioral1/memory/1772-15-0x0000000000890000-0x000000000089A000-memory.dmp healer -
Healer family
-
Processes:
jr774281.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr774281.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr774281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr774281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr774281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr774281.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr774281.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2348-22-0x00000000027C0000-0x0000000002806000-memory.dmp family_redline behavioral1/memory/2348-24-0x0000000004DE0000-0x0000000004E24000-memory.dmp family_redline behavioral1/memory/2348-28-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-26-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-25-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-40-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-88-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-86-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-84-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-82-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-78-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-76-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-74-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-72-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-70-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-68-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-66-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-64-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-62-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-60-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-58-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-54-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-52-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-48-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-44-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-42-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-38-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-36-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-34-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-33-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-30-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-80-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-57-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-50-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2348-46-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zidM0191.exejr774281.exeku442956.exepid process 632 zidM0191.exe 1772 jr774281.exe 2348 ku442956.exe -
Processes:
jr774281.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr774281.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65.exezidM0191.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zidM0191.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65.exezidM0191.exeku442956.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zidM0191.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku442956.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr774281.exepid process 1772 jr774281.exe 1772 jr774281.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr774281.exeku442956.exedescription pid process Token: SeDebugPrivilege 1772 jr774281.exe Token: SeDebugPrivilege 2348 ku442956.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65.exezidM0191.exedescription pid process target process PID 2808 wrote to memory of 632 2808 63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65.exe zidM0191.exe PID 2808 wrote to memory of 632 2808 63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65.exe zidM0191.exe PID 2808 wrote to memory of 632 2808 63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65.exe zidM0191.exe PID 632 wrote to memory of 1772 632 zidM0191.exe jr774281.exe PID 632 wrote to memory of 1772 632 zidM0191.exe jr774281.exe PID 632 wrote to memory of 2348 632 zidM0191.exe ku442956.exe PID 632 wrote to memory of 2348 632 zidM0191.exe ku442956.exe PID 632 wrote to memory of 2348 632 zidM0191.exe ku442956.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65.exe"C:\Users\Admin\AppData\Local\Temp\63c1750c52a5aba4e4f06da0215f111aac029155274b412588f3b86728725d65.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidM0191.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidM0191.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr774281.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr774281.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku442956.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku442956.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2348
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406KB
MD54a3d4403f075655c242f9dba34e683e0
SHA189dc33c63a2c1c4dfb448bc65fd7ff5391720cb8
SHA2568a4a42dbd02dd26763a8e2a1dbf224ded355f1195a4dbc2681813b2df35589c2
SHA51244e3211957feb6070ea6ae0282477a55a89fb01ba5c8ab4224475a704a105c4c38dd81aa15b3904025d3880313776c10af8ba34a8a83bf2cb90d08081536046c
-
Filesize
12KB
MD52bcc070dc52f97c3b135f57a44d67150
SHA16810763bb99c524659a2b65064b9ccc830d5b886
SHA256c22847a348d8baaadb479e0e89f50feda557526a5e07573aa8977a2b55e2fecc
SHA512b7f7d72b9600082f38c57e7b2c4298c8f7d03c9851e834fc73e29306d5ea6759efc419a204be434a5d4466d49a6c7aa1b8b8e1ae8ce112d57d438647d90d28f3
-
Filesize
372KB
MD55b872875f42160cce4617fbd35d71c5d
SHA1d24c0374913afe483f994fa7753c51de66323ccb
SHA256dfe261179812c792d668a39e49aa9a8fc88dadc5b73ff813fd299be453de2e99
SHA51257d60930cf69473b503e9ecd21bf8c8249d0f42f09e53110270c244b80887e36e2c12a3a0b034733b6c2c341f737c591502df6f3a36a78803599834dde6e5b62