Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
c82ae1b83355a92bd47cca2ce825eaab2f1c98a2624144e8d51f3470f7a34d27.exe
Resource
win10v2004-20241007-en
General
-
Target
c82ae1b83355a92bd47cca2ce825eaab2f1c98a2624144e8d51f3470f7a34d27.exe
-
Size
523KB
-
MD5
64c6033cc367bfa5c784ecf45b32b352
-
SHA1
4b5cf55a4500ed9e44aec84015602f365dfd8b70
-
SHA256
c82ae1b83355a92bd47cca2ce825eaab2f1c98a2624144e8d51f3470f7a34d27
-
SHA512
2f98f71133b2169e46859e666060a8ab1051982fe982bbc2b63e72dadfa7905688a14ef7e4bc8b34a020e4ddcb6738b803c6eedf1643050b6cb9c25de939bf5d
-
SSDEEP
6144:KAy+bnr+zp0yN90QE9K+CmZNThJNhaF6Zewu/1UsOhHi5wtc4fgvfkt0rq6VjFBb:QMrLy90i+CmZN7u2qd8ZaLVjFBnSd3S
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr621622.exe healer behavioral1/memory/2396-15-0x0000000000080000-0x000000000008A000-memory.dmp healer -
Healer family
-
Processes:
jr621622.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr621622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr621622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr621622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr621622.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr621622.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr621622.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/4760-22-0x00000000024E0000-0x0000000002526000-memory.dmp family_redline behavioral1/memory/4760-24-0x0000000005090000-0x00000000050D4000-memory.dmp family_redline behavioral1/memory/4760-28-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-30-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-82-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-62-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-40-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-26-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-25-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-88-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-86-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-84-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-80-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-78-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-76-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-74-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-72-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-70-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-68-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-66-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-64-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-60-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-58-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-56-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-54-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-52-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-50-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-48-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-46-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-44-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-42-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-38-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-36-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-35-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline behavioral1/memory/4760-32-0x0000000005090000-0x00000000050CF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
ziCL1192.exejr621622.exeku255349.exepid process 1596 ziCL1192.exe 2396 jr621622.exe 4760 ku255349.exe -
Processes:
jr621622.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr621622.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c82ae1b83355a92bd47cca2ce825eaab2f1c98a2624144e8d51f3470f7a34d27.exeziCL1192.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c82ae1b83355a92bd47cca2ce825eaab2f1c98a2624144e8d51f3470f7a34d27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziCL1192.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c82ae1b83355a92bd47cca2ce825eaab2f1c98a2624144e8d51f3470f7a34d27.exeziCL1192.exeku255349.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c82ae1b83355a92bd47cca2ce825eaab2f1c98a2624144e8d51f3470f7a34d27.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziCL1192.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku255349.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr621622.exepid process 2396 jr621622.exe 2396 jr621622.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr621622.exeku255349.exedescription pid process Token: SeDebugPrivilege 2396 jr621622.exe Token: SeDebugPrivilege 4760 ku255349.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
c82ae1b83355a92bd47cca2ce825eaab2f1c98a2624144e8d51f3470f7a34d27.exeziCL1192.exedescription pid process target process PID 3812 wrote to memory of 1596 3812 c82ae1b83355a92bd47cca2ce825eaab2f1c98a2624144e8d51f3470f7a34d27.exe ziCL1192.exe PID 3812 wrote to memory of 1596 3812 c82ae1b83355a92bd47cca2ce825eaab2f1c98a2624144e8d51f3470f7a34d27.exe ziCL1192.exe PID 3812 wrote to memory of 1596 3812 c82ae1b83355a92bd47cca2ce825eaab2f1c98a2624144e8d51f3470f7a34d27.exe ziCL1192.exe PID 1596 wrote to memory of 2396 1596 ziCL1192.exe jr621622.exe PID 1596 wrote to memory of 2396 1596 ziCL1192.exe jr621622.exe PID 1596 wrote to memory of 4760 1596 ziCL1192.exe ku255349.exe PID 1596 wrote to memory of 4760 1596 ziCL1192.exe ku255349.exe PID 1596 wrote to memory of 4760 1596 ziCL1192.exe ku255349.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c82ae1b83355a92bd47cca2ce825eaab2f1c98a2624144e8d51f3470f7a34d27.exe"C:\Users\Admin\AppData\Local\Temp\c82ae1b83355a92bd47cca2ce825eaab2f1c98a2624144e8d51f3470f7a34d27.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCL1192.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCL1192.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr621622.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr621622.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku255349.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku255349.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4760
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD57f74c8cac8cf090f4a54f7a8e9b600b8
SHA1b58c2e95ad6122b40ee4155a45d426a899b6ebc5
SHA25654048e3e44cc62525f9fc04d61ccfdb5b2bb345a37835c9e64bbc170b0697660
SHA5124b14ee41e5b9933991accd921b1f957028e5c06bfb01d368392ce9a6a807a221744988608ae6515a0f40fcbe23851475f2770a1262a7048242f54735fedf07fb
-
Filesize
14KB
MD5419731e4189bee9f6cd78891111a7123
SHA1f21dd7b5af74b46afb732b4eccba8d9031967144
SHA256f8401659165772ca4b6982d519f5a41f761c55760fa023eb5f0f37581f7a29de
SHA51249cba5daa9acf8b9cb90a6f2d94753fce2b3665189b67fa2955a1b9e0363d7dad71b86932f35a60db26ac8424463d6b62b9cf223b224de4b479d35807c954b66
-
Filesize
295KB
MD564e8a22da2abce7d953567ab10856673
SHA1e84814b8d3c80d3022d70d08b2db983d83a0a739
SHA256b8328f03719bbc354c4fcbe3c5668a087b739059b26e26a844472cd71240c26b
SHA51243c0e1397cc99fa59fca262d87ce27ce55866185bc17b3e71ef2b2ccf1f46f42a85f5b8fcb6b5da95e8d9069c5f98777d83883366fea62c161984d5cfa8f278f