Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
fc7e71a01a327164c62eac8d44b5fa19234bd3602ff7e8bbad8e4c74b23c3599.exe
Resource
win10v2004-20241007-en
General
-
Target
fc7e71a01a327164c62eac8d44b5fa19234bd3602ff7e8bbad8e4c74b23c3599.exe
-
Size
530KB
-
MD5
715d8adf328ff8b2d8f66290e35b1867
-
SHA1
afc9326cc23429098c7b71dfeeef769fec05b607
-
SHA256
fc7e71a01a327164c62eac8d44b5fa19234bd3602ff7e8bbad8e4c74b23c3599
-
SHA512
62a2c31b9ff16f5d5a994dc33cfd69ef68a8abb59d1f922d9b5fcad8d177dcbb087eec43aa943c9d16784dc48b964090bb483ef723784cc379a3ae45f5463c99
-
SSDEEP
12288:nMrYy90+rdUm/vpB6VNK1DIaKJTQhqBm/yFEWTkpl:HybdVD6VQ1DIDlQgbBal
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr968870.exe healer behavioral1/memory/384-15-0x0000000000F70000-0x0000000000F7A000-memory.dmp healer -
Healer family
-
Processes:
jr968870.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr968870.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr968870.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr968870.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr968870.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr968870.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr968870.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2124-22-0x0000000004B60000-0x0000000004BA6000-memory.dmp family_redline behavioral1/memory/2124-24-0x00000000071A0000-0x00000000071E4000-memory.dmp family_redline behavioral1/memory/2124-36-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-88-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-86-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-84-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-80-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-78-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-77-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-74-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-72-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-70-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-68-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-66-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-64-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-62-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-58-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-56-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-54-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-52-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-50-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-48-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-46-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-44-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-42-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-40-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-38-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-34-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-32-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-82-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-30-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-28-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-60-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-26-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline behavioral1/memory/2124-25-0x00000000071A0000-0x00000000071DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziPx2882.exejr968870.exeku473438.exepid process 4920 ziPx2882.exe 384 jr968870.exe 2124 ku473438.exe -
Processes:
jr968870.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr968870.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fc7e71a01a327164c62eac8d44b5fa19234bd3602ff7e8bbad8e4c74b23c3599.exeziPx2882.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fc7e71a01a327164c62eac8d44b5fa19234bd3602ff7e8bbad8e4c74b23c3599.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziPx2882.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fc7e71a01a327164c62eac8d44b5fa19234bd3602ff7e8bbad8e4c74b23c3599.exeziPx2882.exeku473438.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc7e71a01a327164c62eac8d44b5fa19234bd3602ff7e8bbad8e4c74b23c3599.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziPx2882.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku473438.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr968870.exepid process 384 jr968870.exe 384 jr968870.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr968870.exeku473438.exedescription pid process Token: SeDebugPrivilege 384 jr968870.exe Token: SeDebugPrivilege 2124 ku473438.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fc7e71a01a327164c62eac8d44b5fa19234bd3602ff7e8bbad8e4c74b23c3599.exeziPx2882.exedescription pid process target process PID 748 wrote to memory of 4920 748 fc7e71a01a327164c62eac8d44b5fa19234bd3602ff7e8bbad8e4c74b23c3599.exe ziPx2882.exe PID 748 wrote to memory of 4920 748 fc7e71a01a327164c62eac8d44b5fa19234bd3602ff7e8bbad8e4c74b23c3599.exe ziPx2882.exe PID 748 wrote to memory of 4920 748 fc7e71a01a327164c62eac8d44b5fa19234bd3602ff7e8bbad8e4c74b23c3599.exe ziPx2882.exe PID 4920 wrote to memory of 384 4920 ziPx2882.exe jr968870.exe PID 4920 wrote to memory of 384 4920 ziPx2882.exe jr968870.exe PID 4920 wrote to memory of 2124 4920 ziPx2882.exe ku473438.exe PID 4920 wrote to memory of 2124 4920 ziPx2882.exe ku473438.exe PID 4920 wrote to memory of 2124 4920 ziPx2882.exe ku473438.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc7e71a01a327164c62eac8d44b5fa19234bd3602ff7e8bbad8e4c74b23c3599.exe"C:\Users\Admin\AppData\Local\Temp\fc7e71a01a327164c62eac8d44b5fa19234bd3602ff7e8bbad8e4c74b23c3599.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPx2882.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPx2882.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr968870.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr968870.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku473438.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku473438.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2124
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD53dd9a7e17d9c4d408c643b861f24cdbe
SHA18d528b1b185295e777e5bab10a206261ebd18702
SHA2568f211fc54b084429aa619120122749b313b6b528edfd4df9799566ee50da288e
SHA5126dd639ac39ddbdd7202492a9b2e4dcfa37d20edaa294de63b5f6c8e981f6920ff5f17ca75dec871a625ff7c5ee85b0601e73f753c2116581466223acf01e7b80
-
Filesize
11KB
MD52869a7f906ac9e2eb01ed4812603ae36
SHA19996c1e205a50999d89d8d9486e2042573dcb5b0
SHA2562b977e2eb48f920c7501959d3458bb768d44a4ac58e54519f2daa527270a6965
SHA512f1f07cf36dad5d959c5451a3a846a7b737663ffee7c611524bed89fc3f288375f2bf2e56e039cc5155be05460991fed955db3a514c2692c5a7d70a2ee58b13c4
-
Filesize
354KB
MD5dcd20d71fe2ea84acf5743efa501d886
SHA13d80a9b120ef3d66fa84f66cd0e0ef6e681b9ccf
SHA256ebabe0ddf5432cb081986be7df31b847901a819b509c9b4ee8b93221c4c2fa2b
SHA512d81e821dbdcea7f86971daf71f18fe7684f428930dbe3dc87be68f646eae4335f0992e2e181de37cb9ff5c0a398d0b1ca58ed81b3dba096185a21f3fa001c976