Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
21beb80dd67b50387d06d22b98052658ecd4049e7b7fab4868a94d1021558f39.exe
Resource
win10v2004-20241007-en
General
-
Target
21beb80dd67b50387d06d22b98052658ecd4049e7b7fab4868a94d1021558f39.exe
-
Size
534KB
-
MD5
7440ab2fea17bfac289d7a231a78f07c
-
SHA1
ddf3144c9459fef3c34c83ffeae7369ddf2de078
-
SHA256
21beb80dd67b50387d06d22b98052658ecd4049e7b7fab4868a94d1021558f39
-
SHA512
49202a7f544dce7d501e394ac7f69a5033eac58d09c0c60dd8a4e63b1a9378e1470ac9679c7845096eac67aaa09018f9a14edfae0e3bb58e1589f5a927ad2ff5
-
SSDEEP
12288:bMr2y90Tfys10NpkzObYWaBkXJt9RgDjb3:pyxkz2YnuJt9Rcjz
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr319118.exe healer behavioral1/memory/1272-15-0x0000000000DD0000-0x0000000000DDA000-memory.dmp healer -
Healer family
-
Processes:
jr319118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr319118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr319118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr319118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr319118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr319118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr319118.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/3716-22-0x00000000026A0000-0x00000000026E6000-memory.dmp family_redline behavioral1/memory/3716-24-0x0000000004AA0000-0x0000000004AE4000-memory.dmp family_redline behavioral1/memory/3716-38-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-40-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-86-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-84-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-82-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-80-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-78-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-76-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-74-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-70-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-68-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-66-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-64-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-62-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-60-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-58-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-54-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-52-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-50-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-48-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-44-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-42-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-36-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-34-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-32-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-30-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-88-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-72-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-56-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-46-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-28-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-26-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline behavioral1/memory/3716-25-0x0000000004AA0000-0x0000000004ADF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziCR9169.exejr319118.exeku108370.exepid process 3832 ziCR9169.exe 1272 jr319118.exe 3716 ku108370.exe -
Processes:
jr319118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr319118.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
21beb80dd67b50387d06d22b98052658ecd4049e7b7fab4868a94d1021558f39.exeziCR9169.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 21beb80dd67b50387d06d22b98052658ecd4049e7b7fab4868a94d1021558f39.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziCR9169.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
21beb80dd67b50387d06d22b98052658ecd4049e7b7fab4868a94d1021558f39.exeziCR9169.exeku108370.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21beb80dd67b50387d06d22b98052658ecd4049e7b7fab4868a94d1021558f39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziCR9169.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku108370.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr319118.exepid process 1272 jr319118.exe 1272 jr319118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr319118.exeku108370.exedescription pid process Token: SeDebugPrivilege 1272 jr319118.exe Token: SeDebugPrivilege 3716 ku108370.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
21beb80dd67b50387d06d22b98052658ecd4049e7b7fab4868a94d1021558f39.exeziCR9169.exedescription pid process target process PID 4808 wrote to memory of 3832 4808 21beb80dd67b50387d06d22b98052658ecd4049e7b7fab4868a94d1021558f39.exe ziCR9169.exe PID 4808 wrote to memory of 3832 4808 21beb80dd67b50387d06d22b98052658ecd4049e7b7fab4868a94d1021558f39.exe ziCR9169.exe PID 4808 wrote to memory of 3832 4808 21beb80dd67b50387d06d22b98052658ecd4049e7b7fab4868a94d1021558f39.exe ziCR9169.exe PID 3832 wrote to memory of 1272 3832 ziCR9169.exe jr319118.exe PID 3832 wrote to memory of 1272 3832 ziCR9169.exe jr319118.exe PID 3832 wrote to memory of 3716 3832 ziCR9169.exe ku108370.exe PID 3832 wrote to memory of 3716 3832 ziCR9169.exe ku108370.exe PID 3832 wrote to memory of 3716 3832 ziCR9169.exe ku108370.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\21beb80dd67b50387d06d22b98052658ecd4049e7b7fab4868a94d1021558f39.exe"C:\Users\Admin\AppData\Local\Temp\21beb80dd67b50387d06d22b98052658ecd4049e7b7fab4868a94d1021558f39.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCR9169.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCR9169.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr319118.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr319118.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku108370.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku108370.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3716
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD5050a2604266e8f972ac1c2ee38179346
SHA1aa274edfea989ac88bca5441c61e524738e0d0ae
SHA256168a4c240a741918c0a3e3d8bf1eac39be2b258ac67c218b5eecb155468a289f
SHA51269d6cc092e0fb7cd15cf214ead4daaa27306ec4297b5a779b1e31cf4d078c0e05737f97f37ab92cf7d652f2213157a9b7b7d19b6c52f1f6b5894631253847b2c
-
Filesize
11KB
MD5a7b1b4c3c835dff5c17281964636a0a4
SHA160f52fc90c37662973102523b6d54521b587d711
SHA2560184ead8dd8dd3ef3fa1d556930d96c89addae63d32359c19e0dd18f9d9fa30b
SHA51235a03b4a9a6959320c5b91828e2cfdda64f538bc26c0e9a31df38d4c473ff7f0106cdd149e30bd262ac7fc98cb2774cdaf4864337cc58e03a2dab1c95dce2bec
-
Filesize
319KB
MD5755d5690a8a3ad01e0010fed7190964b
SHA13bb11a77e5c8408bcfc5606a3c8e7d685e92d490
SHA256a3b5b83f85d221c88d1f70533463240fac893a5f40fb96aef3e7009bf7e0c4a2
SHA512cc621ac11e0ffb1a0f179e92dcc529d4cbfbae2a0a5aa4a35a159f8a3ae6f8925849141bc2987621a8b880197d0484ae6e99d1d9c71ffdfe27f204949570f8e9