Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 09:26
Static task
static1
Behavioral task
behavioral1
Sample
49a4466303fa308fc24d77092ee27235376668a81f20c1d2f3afe8b1b3f778a1.exe
Resource
win10v2004-20241007-en
General
-
Target
49a4466303fa308fc24d77092ee27235376668a81f20c1d2f3afe8b1b3f778a1.exe
-
Size
537KB
-
MD5
b418e92aee0ee8d906478802b0c47cf4
-
SHA1
46c41792971706c733d6d231a5b7d8fa7ed2a10c
-
SHA256
49a4466303fa308fc24d77092ee27235376668a81f20c1d2f3afe8b1b3f778a1
-
SHA512
d761e483737d5f4b77af70692e2b6aae64712971b4b34231ee8f6c805d63f154f6543867606f49e9ad9cb1be348c51cbe841eeea0cb3c55469c859f1955417bf
-
SSDEEP
12288:BMriy90+wz+Xa+Wa/FOphdw2ZRDbIASSRq5gv:/yTwa1WKuR3kEq5w
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr333027.exe healer behavioral1/memory/232-15-0x00000000002D0000-0x00000000002DA000-memory.dmp healer -
Healer family
-
Processes:
jr333027.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr333027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr333027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr333027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr333027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr333027.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr333027.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/5092-22-0x00000000025A0000-0x00000000025E6000-memory.dmp family_redline behavioral1/memory/5092-24-0x00000000026D0000-0x0000000002714000-memory.dmp family_redline behavioral1/memory/5092-30-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-38-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-88-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-86-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-85-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-82-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-80-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-78-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-76-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-74-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-72-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-70-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-66-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-64-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-62-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-60-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-58-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-56-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-54-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-52-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-50-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-48-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-44-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-42-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-40-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-36-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-34-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-32-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-68-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-46-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-28-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-26-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline behavioral1/memory/5092-25-0x00000000026D0000-0x000000000270F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziHe3488.exejr333027.exeku719101.exepid process 4916 ziHe3488.exe 232 jr333027.exe 5092 ku719101.exe -
Processes:
jr333027.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr333027.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
49a4466303fa308fc24d77092ee27235376668a81f20c1d2f3afe8b1b3f778a1.exeziHe3488.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 49a4466303fa308fc24d77092ee27235376668a81f20c1d2f3afe8b1b3f778a1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziHe3488.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
ziHe3488.exeku719101.exe49a4466303fa308fc24d77092ee27235376668a81f20c1d2f3afe8b1b3f778a1.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziHe3488.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku719101.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49a4466303fa308fc24d77092ee27235376668a81f20c1d2f3afe8b1b3f778a1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr333027.exepid process 232 jr333027.exe 232 jr333027.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr333027.exeku719101.exedescription pid process Token: SeDebugPrivilege 232 jr333027.exe Token: SeDebugPrivilege 5092 ku719101.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
49a4466303fa308fc24d77092ee27235376668a81f20c1d2f3afe8b1b3f778a1.exeziHe3488.exedescription pid process target process PID 3212 wrote to memory of 4916 3212 49a4466303fa308fc24d77092ee27235376668a81f20c1d2f3afe8b1b3f778a1.exe ziHe3488.exe PID 3212 wrote to memory of 4916 3212 49a4466303fa308fc24d77092ee27235376668a81f20c1d2f3afe8b1b3f778a1.exe ziHe3488.exe PID 3212 wrote to memory of 4916 3212 49a4466303fa308fc24d77092ee27235376668a81f20c1d2f3afe8b1b3f778a1.exe ziHe3488.exe PID 4916 wrote to memory of 232 4916 ziHe3488.exe jr333027.exe PID 4916 wrote to memory of 232 4916 ziHe3488.exe jr333027.exe PID 4916 wrote to memory of 5092 4916 ziHe3488.exe ku719101.exe PID 4916 wrote to memory of 5092 4916 ziHe3488.exe ku719101.exe PID 4916 wrote to memory of 5092 4916 ziHe3488.exe ku719101.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49a4466303fa308fc24d77092ee27235376668a81f20c1d2f3afe8b1b3f778a1.exe"C:\Users\Admin\AppData\Local\Temp\49a4466303fa308fc24d77092ee27235376668a81f20c1d2f3afe8b1b3f778a1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHe3488.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHe3488.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr333027.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr333027.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:232 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku719101.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku719101.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5092
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5271cd92b55c0e4c1c70cc8fbfa341f75
SHA183a4612b1622c2cba0d59d338e3a26d470d84565
SHA256de803b8e05ca9e4cadca71f4616f61f2c1c94e7a40367403886636a7ceb40caf
SHA51233edbb1cfcfa297ccaf8c6f4dcfb334bc7f19e2669489d598a278e5f5e9f834af1547ccae4a30702b5ff7fe31c055a425b8c603740577527fbbbf2b6ea37291c
-
Filesize
13KB
MD53fbac28edacbeeb7dc903f4b8035754e
SHA1248910f8f62dce155c2f762a8a880bc378534092
SHA2563712027e1e54229ce3562e79af21bdf5e75947e63478175fd5e6b6fa4a0dc1c3
SHA512dc1617a658b6f2e3c9725c8e84e262464f181dd00e47e12ea0973ead66337603f0e17c72d3600dc95aa606e476c0aa9d3e49b20bd63bab9b372b3775d337cb72
-
Filesize
353KB
MD511cdd4dfe116d6c95900e0ad0aeb2a7f
SHA16214a9735371c98cfd4e11713a2c4ae3dbb48973
SHA2569a023fcf7e139b635b0193415ef099a4b452767e7b27777986f1b2a2f666ba10
SHA512bfba19f1d9ee37e3e65a4f22b5856cd6de09a4e6d845c2dc431a372bf4480cb7ae89fd185732e38e1f60def01839a4218c7635fd1b7ab3f8d5b82a9b3eaf0718