Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
1b6f3ca14227962972998137146057c03379461deaf38673b3dc45bd20e54d5b.exe
Resource
win10v2004-20241007-en
General
-
Target
1b6f3ca14227962972998137146057c03379461deaf38673b3dc45bd20e54d5b.exe
-
Size
560KB
-
MD5
b1ca92d72985dac982d393bb8ba6d6dd
-
SHA1
969b52bcce8b1443d8d74ff4bb04373d138c26ca
-
SHA256
1b6f3ca14227962972998137146057c03379461deaf38673b3dc45bd20e54d5b
-
SHA512
b978a63ab0b2d1698fe98f99e9f9ef14a6b2c6b29ebf94044cf127c2a55d321f4db893cbabfe7920fb411a0b4f832deec1b6dc0303cc4f09ac96548414a85d5a
-
SSDEEP
12288:tMr4y90P43H87Uq1PpHAPMFOy6VMsfdPAW3wZ:Ryv3cYq0PMFtkfi
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr498355.exe healer behavioral1/memory/4800-15-0x0000000000050000-0x000000000005A000-memory.dmp healer -
Healer family
-
Processes:
jr498355.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr498355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr498355.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr498355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr498355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr498355.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr498355.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/1136-21-0x00000000026A0000-0x00000000026E6000-memory.dmp family_redline behavioral1/memory/1136-23-0x0000000002880000-0x00000000028C4000-memory.dmp family_redline behavioral1/memory/1136-55-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-67-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-87-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-85-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-83-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-81-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-79-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-75-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-73-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-71-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-69-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-65-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-63-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-61-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-59-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-57-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-53-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-51-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-50-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-47-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-43-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-41-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-39-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-37-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-33-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-31-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-29-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-77-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-45-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-35-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-27-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-25-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline behavioral1/memory/1136-24-0x0000000002880000-0x00000000028BF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziRc5208.exejr498355.exeku415043.exepid process 5060 ziRc5208.exe 4800 jr498355.exe 1136 ku415043.exe -
Processes:
jr498355.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr498355.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
ziRc5208.exe1b6f3ca14227962972998137146057c03379461deaf38673b3dc45bd20e54d5b.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziRc5208.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1b6f3ca14227962972998137146057c03379461deaf38673b3dc45bd20e54d5b.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ku415043.exe1b6f3ca14227962972998137146057c03379461deaf38673b3dc45bd20e54d5b.exeziRc5208.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku415043.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b6f3ca14227962972998137146057c03379461deaf38673b3dc45bd20e54d5b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziRc5208.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr498355.exepid process 4800 jr498355.exe 4800 jr498355.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr498355.exeku415043.exedescription pid process Token: SeDebugPrivilege 4800 jr498355.exe Token: SeDebugPrivilege 1136 ku415043.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
1b6f3ca14227962972998137146057c03379461deaf38673b3dc45bd20e54d5b.exeziRc5208.exedescription pid process target process PID 456 wrote to memory of 5060 456 1b6f3ca14227962972998137146057c03379461deaf38673b3dc45bd20e54d5b.exe ziRc5208.exe PID 456 wrote to memory of 5060 456 1b6f3ca14227962972998137146057c03379461deaf38673b3dc45bd20e54d5b.exe ziRc5208.exe PID 456 wrote to memory of 5060 456 1b6f3ca14227962972998137146057c03379461deaf38673b3dc45bd20e54d5b.exe ziRc5208.exe PID 5060 wrote to memory of 4800 5060 ziRc5208.exe jr498355.exe PID 5060 wrote to memory of 4800 5060 ziRc5208.exe jr498355.exe PID 5060 wrote to memory of 1136 5060 ziRc5208.exe ku415043.exe PID 5060 wrote to memory of 1136 5060 ziRc5208.exe ku415043.exe PID 5060 wrote to memory of 1136 5060 ziRc5208.exe ku415043.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b6f3ca14227962972998137146057c03379461deaf38673b3dc45bd20e54d5b.exe"C:\Users\Admin\AppData\Local\Temp\1b6f3ca14227962972998137146057c03379461deaf38673b3dc45bd20e54d5b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRc5208.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRc5208.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr498355.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr498355.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku415043.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku415043.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD5783415b91e9ed607770790b59e7fb8f6
SHA180c7908ec55433e628b65ff5c4efbb255b4ab786
SHA256a06741182f938e2be474f81a60087d220e6f39211c8dd76772159e22c0b8aa98
SHA5125ac9bca09c1ca87da2ae925a05aa6341ca57882239973ed9ac9277e9e31ce4139617c9f5d6e2d8ced81ae40420487c6cf325202f2e671ed4b8d73798fcd3e7a6
-
Filesize
13KB
MD561d5385a09ae16771065b24d5a34887c
SHA16d377101c255b5cf41b504483b405b0aef94e0bb
SHA25621d50adae03faaf24abc479b614360343336f9890f868b7fc6232de06769a31f
SHA5123faa8e332b57af79a80b86015fd47b9350561ccd4ca94d2d904c6a460d6cad73c83d163b5164e471396504ab8d7aebd1142399c3a5d3657d1f9ed9f3865f06bb
-
Filesize
370KB
MD513662f6082ca5dfd6fe3e9a06831d1e8
SHA170c624c764c9fa47b070d1cce391ba3267f7d92d
SHA2561c9c2128fea0327b0e38d9232dbbbc0868296970450e486ecc1e571a44082355
SHA512c88dc25d8dc9f218c74ae364ddd5f97f284d8b6f383780030ec94c3b3fa14e98e44edcc340ce6f438300de00b3e8c0d0acd97e411f036a4b131054bc57c92dc6