Analysis
-
max time kernel
143s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 15:16
Static task
static1
Behavioral task
behavioral1
Sample
7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe
Resource
win10v2004-20241007-en
General
-
Target
7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe
-
Size
680KB
-
MD5
840aa854f44a0751cb773caba047b98f
-
SHA1
6fd63f01b3d6b1e876aa6858d13ff459367ab081
-
SHA256
7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee
-
SHA512
aba14a016bbfb880e35f984ed00a74a4bc326ed9fd5ee3583cfaf1ac9980ff9791dcb14ca83a74ce080df8164315deb5901838801e51e6c173da66ce1539edb0
-
SSDEEP
12288:t4pMYbT408y9Spf9T+EGRdvsCoTJfsrlM33TzxIpal4W3UPYeEXldtz:nrBlZ+9Rtu9nTgM4W3LXlP
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\IXP001.TMP\jr506801.exe healer behavioral1/memory/2536-22-0x0000000000290000-0x000000000029A000-memory.dmp healer -
Healer family
-
Processes:
jr506801.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr506801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr506801.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr506801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr506801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr506801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr506801.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
Processes:
resource yara_rule behavioral1/memory/2280-36-0x0000000004BC0000-0x0000000004C06000-memory.dmp family_redline behavioral1/memory/2280-37-0x0000000004C00000-0x0000000004C44000-memory.dmp family_redline behavioral1/memory/2280-38-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-39-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-43-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-51-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-89-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-41-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-45-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-53-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-49-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-55-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-58-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-87-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-86-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-83-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-81-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-80-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-77-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-75-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-73-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-71-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-69-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-67-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-65-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-63-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-62-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-59-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-47-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-99-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-97-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-95-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-93-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline behavioral1/memory/2280-91-0x0000000004C00000-0x0000000004C3F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
Processes:
zibT6056.exejr506801.exeku801740.exepid process 1852 zibT6056.exe 2536 jr506801.exe 2280 ku801740.exe -
Loads dropped DLL 6 IoCs
Processes:
7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exezibT6056.exeku801740.exepid process 1700 7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe 1852 zibT6056.exe 1852 zibT6056.exe 1852 zibT6056.exe 1852 zibT6056.exe 2280 ku801740.exe -
Processes:
jr506801.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features jr506801.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr506801.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exezibT6056.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zibT6056.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
zibT6056.exeku801740.exe7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zibT6056.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku801740.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr506801.exepid process 2536 jr506801.exe 2536 jr506801.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr506801.exeku801740.exedescription pid process Token: SeDebugPrivilege 2536 jr506801.exe Token: SeDebugPrivilege 2280 ku801740.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exezibT6056.exedescription pid process target process PID 1700 wrote to memory of 1852 1700 7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe zibT6056.exe PID 1700 wrote to memory of 1852 1700 7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe zibT6056.exe PID 1700 wrote to memory of 1852 1700 7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe zibT6056.exe PID 1700 wrote to memory of 1852 1700 7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe zibT6056.exe PID 1700 wrote to memory of 1852 1700 7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe zibT6056.exe PID 1700 wrote to memory of 1852 1700 7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe zibT6056.exe PID 1700 wrote to memory of 1852 1700 7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe zibT6056.exe PID 1852 wrote to memory of 2536 1852 zibT6056.exe jr506801.exe PID 1852 wrote to memory of 2536 1852 zibT6056.exe jr506801.exe PID 1852 wrote to memory of 2536 1852 zibT6056.exe jr506801.exe PID 1852 wrote to memory of 2536 1852 zibT6056.exe jr506801.exe PID 1852 wrote to memory of 2536 1852 zibT6056.exe jr506801.exe PID 1852 wrote to memory of 2536 1852 zibT6056.exe jr506801.exe PID 1852 wrote to memory of 2536 1852 zibT6056.exe jr506801.exe PID 1852 wrote to memory of 2280 1852 zibT6056.exe ku801740.exe PID 1852 wrote to memory of 2280 1852 zibT6056.exe ku801740.exe PID 1852 wrote to memory of 2280 1852 zibT6056.exe ku801740.exe PID 1852 wrote to memory of 2280 1852 zibT6056.exe ku801740.exe PID 1852 wrote to memory of 2280 1852 zibT6056.exe ku801740.exe PID 1852 wrote to memory of 2280 1852 zibT6056.exe ku801740.exe PID 1852 wrote to memory of 2280 1852 zibT6056.exe ku801740.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe"C:\Users\Admin\AppData\Local\Temp\7c7b6e61bd10d40f6d730ebe4275cce939570478e654c18370c2b1d9643d22ee.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibT6056.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibT6056.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr506801.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr506801.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku801740.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku801740.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2280
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
420KB
MD5f517375ea4dd5f0507ee819390fe2714
SHA11aec142e1954702e1665528d7c17e6302820050c
SHA256ab0eb669a6ed078a5a7856a781f38cb24c098c56a5f55d2f87cda0590d98a1c2
SHA512fef39f5033d38b4bee68a37870ce32f7deb7b4f16fa8a439b0102690c52125ccc8247b96174854efa830e0f7942e2466a84110c77a1dc6852bafcdd784fade7c
-
Filesize
12KB
MD5f998e0d439e230e9a2328f6795673953
SHA162aca608da0970a759217a7dab8ebc22174f926a
SHA2564c4d44de95191bbd13e0c6b8aeb6460dec13089dd54bc8f9601e1b31928e12f0
SHA512456a4a3b77d2bdbdb0c20413330dd636f38309e2e41be0ed0e470968364f0d4a2c0775d8c9aef6e65646026cd8b7cd687ed3a8dbf0cffa810057454d3068ceb3
-
Filesize
403KB
MD5e5f1eea0775d1300a4589e8e86260211
SHA1cb5d660ecb593d89dddb5eac453f57a54275392a
SHA256296a1be8d88090e0b0fcb73b7c4041e2414df0e2b1b5f7e7246166ed0d3e9ec2
SHA51260050fb2cf3377fc0a8a45506103cf14329390f893e1bc24040c36f75e079c74ec7455408a3b83480d37efa3acee9668864308c87a1e36774ef964d13747f59d