Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exe
Resource
win10v2004-20241007-en
General
-
Target
fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exe
-
Size
533KB
-
MD5
21b86b48942b2706d79e21157d740f57
-
SHA1
513065e7301ce8c455fc74bd1803e39eb0678392
-
SHA256
fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc
-
SHA512
0b3743ffb6072d0055d1a5ccb8f74e6296f786fba371a8d78bca65923766b9254daf657c21ec67063289dd56451c1907935b19fc3edb140d3dc879aba89fb7a5
-
SSDEEP
12288:tMrcy90hHl1Rwzt8zhU0E6wImt/xZ16At73LqTBMq6Q/FcXX:lyKPe8tAtL16g73GTBM9c6XX
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr350690.exe healer behavioral1/memory/2168-15-0x0000000000BB0000-0x0000000000BBA000-memory.dmp healer -
Healer family
-
Processes:
jr350690.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr350690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr350690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr350690.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr350690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr350690.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr350690.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/2136-22-0x0000000003A30000-0x0000000003A76000-memory.dmp family_redline behavioral1/memory/2136-24-0x0000000003D90000-0x0000000003DD4000-memory.dmp family_redline behavioral1/memory/2136-62-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-36-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-28-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-26-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-25-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-78-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-88-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-86-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-85-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-82-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-80-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-76-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-74-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-72-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-70-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-68-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-66-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-64-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-60-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-59-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-56-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-54-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-52-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-50-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-48-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-46-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-44-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-42-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-40-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-38-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-34-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-33-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline behavioral1/memory/2136-30-0x0000000003D90000-0x0000000003DCF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziTt5365.exejr350690.exeku908187.exepid process 3860 ziTt5365.exe 2168 jr350690.exe 2136 ku908187.exe -
Processes:
jr350690.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr350690.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exeziTt5365.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziTt5365.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exeziTt5365.exeku908187.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziTt5365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku908187.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr350690.exepid process 2168 jr350690.exe 2168 jr350690.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr350690.exeku908187.exedescription pid process Token: SeDebugPrivilege 2168 jr350690.exe Token: SeDebugPrivilege 2136 ku908187.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exeziTt5365.exedescription pid process target process PID 4248 wrote to memory of 3860 4248 fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exe ziTt5365.exe PID 4248 wrote to memory of 3860 4248 fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exe ziTt5365.exe PID 4248 wrote to memory of 3860 4248 fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exe ziTt5365.exe PID 3860 wrote to memory of 2168 3860 ziTt5365.exe jr350690.exe PID 3860 wrote to memory of 2168 3860 ziTt5365.exe jr350690.exe PID 3860 wrote to memory of 2136 3860 ziTt5365.exe ku908187.exe PID 3860 wrote to memory of 2136 3860 ziTt5365.exe ku908187.exe PID 3860 wrote to memory of 2136 3860 ziTt5365.exe ku908187.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exe"C:\Users\Admin\AppData\Local\Temp\fd6dc68a66ac27f5478f554d18c1797c2a8d083cd10ec3dc3c363750e92cf6dc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTt5365.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziTt5365.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr350690.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr350690.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku908187.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku908187.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD5206d66513bf1ed1c53ca9d43a98f9d21
SHA1f358ed5715ac31128c4edf05f468aad59212b936
SHA256a1081c9d8109675f909cdbeb711f354166a8a2fda564bc39522cba3327a7f1ba
SHA5129187d1c528100fd48c6dad3e80fe0094c73b42db26b65ae00246b6118e1fda6353846453dedfa89d72b14372a47cf4e37bdc2b77c63d22fecdbb7396a0a6b295
-
Filesize
11KB
MD54a475d99016d2f9ce287cf2bc9f877c5
SHA1f99f9780c425d7376a6c866423887d49b0c31a1a
SHA256c0ad90c91edfcc7a6f71cebc3791413b468d8e287565b80f4711efc81805de8a
SHA512b2e8d17ca4772fb9a924a55baf4e085df781f9992804116794c701ede593d89ca4c06ad700847cbc7cf31ea0675a53b06c546f9c1aea8a369545429413681e59
-
Filesize
359KB
MD5eee7ec6d80c29e91e5f72314b9865736
SHA1c5907b7c01994abb90b901a4759ef6946e41d2b5
SHA2566e8b681f1e6650ac90038ec6eb0738ed34aa7a900eb52fa485f4f54d9e4af9f7
SHA512eb249a27050a853240fa44065851aaddbd827cbac8b790265e9dfc1c6df7c29dcc4ffe1f694a73629f201ec81845474a95bd1aee34efaa299b92bf7363dd62d5