Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 17:58
Static task
static1
Behavioral task
behavioral1
Sample
6ec1eb82342f53b688b78fcc6b8ef0acc8aef97c147f415bba082c89620e9f1f.exe
Resource
win10v2004-20241007-en
General
-
Target
6ec1eb82342f53b688b78fcc6b8ef0acc8aef97c147f415bba082c89620e9f1f.exe
-
Size
530KB
-
MD5
3d29bd1fe4bbcf06301121393b7caf49
-
SHA1
323c1f8fa6ec6c4df23d43a0600046d3be939f4f
-
SHA256
6ec1eb82342f53b688b78fcc6b8ef0acc8aef97c147f415bba082c89620e9f1f
-
SHA512
0e957f62d87978126884b298dba776c306dddcab8333414c67141426af93ab404eb790089eba88f12c6a7f4e82cb49302f595827b1837965d1663f5b2e0f74ad
-
SSDEEP
12288:zMrmy90dHTf3VvmfiXkb7RE8YxyLC5XOMduEQ:xysH7Vvm6kb7RE8+vOMdhQ
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr341629.exe healer behavioral1/memory/2324-15-0x0000000000370000-0x000000000037A000-memory.dmp healer -
Healer family
-
Processes:
jr341629.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr341629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr341629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr341629.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr341629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr341629.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr341629.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2896-22-0x0000000004A70000-0x0000000004AB6000-memory.dmp family_redline behavioral1/memory/2896-24-0x0000000004C40000-0x0000000004C84000-memory.dmp family_redline behavioral1/memory/2896-78-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-64-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-52-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-28-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-26-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-25-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-88-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-86-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-84-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-82-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-80-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-76-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-74-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-72-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-70-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-68-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-66-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-62-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-60-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-58-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-56-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-54-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-50-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-48-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-46-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-44-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-42-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-41-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-38-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-36-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-34-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-32-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline behavioral1/memory/2896-30-0x0000000004C40000-0x0000000004C7F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziDr1860.exejr341629.exeku046318.exepid process 3972 ziDr1860.exe 2324 jr341629.exe 2896 ku046318.exe -
Processes:
jr341629.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr341629.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
6ec1eb82342f53b688b78fcc6b8ef0acc8aef97c147f415bba082c89620e9f1f.exeziDr1860.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6ec1eb82342f53b688b78fcc6b8ef0acc8aef97c147f415bba082c89620e9f1f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziDr1860.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6ec1eb82342f53b688b78fcc6b8ef0acc8aef97c147f415bba082c89620e9f1f.exeziDr1860.exeku046318.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ec1eb82342f53b688b78fcc6b8ef0acc8aef97c147f415bba082c89620e9f1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziDr1860.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku046318.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr341629.exepid process 2324 jr341629.exe 2324 jr341629.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr341629.exeku046318.exedescription pid process Token: SeDebugPrivilege 2324 jr341629.exe Token: SeDebugPrivilege 2896 ku046318.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
6ec1eb82342f53b688b78fcc6b8ef0acc8aef97c147f415bba082c89620e9f1f.exeziDr1860.exedescription pid process target process PID 4092 wrote to memory of 3972 4092 6ec1eb82342f53b688b78fcc6b8ef0acc8aef97c147f415bba082c89620e9f1f.exe ziDr1860.exe PID 4092 wrote to memory of 3972 4092 6ec1eb82342f53b688b78fcc6b8ef0acc8aef97c147f415bba082c89620e9f1f.exe ziDr1860.exe PID 4092 wrote to memory of 3972 4092 6ec1eb82342f53b688b78fcc6b8ef0acc8aef97c147f415bba082c89620e9f1f.exe ziDr1860.exe PID 3972 wrote to memory of 2324 3972 ziDr1860.exe jr341629.exe PID 3972 wrote to memory of 2324 3972 ziDr1860.exe jr341629.exe PID 3972 wrote to memory of 2896 3972 ziDr1860.exe ku046318.exe PID 3972 wrote to memory of 2896 3972 ziDr1860.exe ku046318.exe PID 3972 wrote to memory of 2896 3972 ziDr1860.exe ku046318.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ec1eb82342f53b688b78fcc6b8ef0acc8aef97c147f415bba082c89620e9f1f.exe"C:\Users\Admin\AppData\Local\Temp\6ec1eb82342f53b688b78fcc6b8ef0acc8aef97c147f415bba082c89620e9f1f.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr1860.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDr1860.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr341629.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr341629.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku046318.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku046318.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2896
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5fce2b409fc1dda242c615476b054504e
SHA1bcf3d8f621706c7cc9a362599ef33b3eb3a1a06b
SHA2560166f702779183cf32006b1d522bebd5fcf155ff5bac18eccf85cf3d5dcfbbcc
SHA512f52257e2e3f439d5710759bd191bfd22433f31e65d2127c2bd4938d3ff80d213c2139ace4be757082d9e4d40696ef9c36bf554fb30848a16f3c5fe089fa80603
-
Filesize
11KB
MD50473840d8e6e3863d9d683977e421cc1
SHA13d1624d2f59e5714109c766750d0969601b26b4b
SHA256973059496ccdd8081095f7ce30715f28124ad5dde9afca7bdf43f5b483696928
SHA512f7d69fbd9e88d4d6ce324c2b639611237ca9b732d55da6305baae8beaeb9678fe7072cb60ce67758db1f581cf63134b390a3052bf13f5b717afd867e037cd1cc
-
Filesize
354KB
MD506fcc29b76181207b8f63c911263c4f3
SHA1c8e4c14ff6a67ad45e53e57d917074611798e274
SHA2561dec2ab1ff744520474c1dde794e61ddee0ad8d807f864f1b09c257532c3b213
SHA5128228d8f963ce10c48b1278e60c7c4157b79f199e9cc9ac9c66ecb94df1b987ad29b6235280ee72872a61c45a257fbb7958ac0507eb2de79c875f0bab33791c1c