Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:19
Static task
static1
Behavioral task
behavioral1
Sample
59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101.exe
Resource
win10v2004-20241007-en
General
-
Target
59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101.exe
-
Size
537KB
-
MD5
93a78c4a5f0d4775fbe11092367a5f67
-
SHA1
afca23f5a7b0440e3bfed3498878f13cc9748036
-
SHA256
59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101
-
SHA512
24798599ea0b0408c80fc812104f3366c5324dfca1529b76c4ddaca6c3cec6a12d8395acff674123a12e527183204dc45b921d42fb37e98f6a7ab293935c49ad
-
SSDEEP
12288:GMrcy90LmhCUbL6S5rULkHhwGPkyVbsY:2yDjrFBwGcMP
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cbd-12.dat healer behavioral1/memory/1316-15-0x0000000000CB0000-0x0000000000CBA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr150960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr150960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr150960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr150960.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr150960.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr150960.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4760-22-0x0000000004D50000-0x0000000004D96000-memory.dmp family_redline behavioral1/memory/4760-24-0x00000000053C0000-0x0000000005404000-memory.dmp family_redline behavioral1/memory/4760-30-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-28-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-26-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-25-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-40-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-88-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-86-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-84-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-80-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-78-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-76-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-74-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-70-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-68-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-66-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-64-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-62-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-60-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-58-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-54-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-52-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-50-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-49-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-44-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-42-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-38-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-36-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-34-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-32-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-82-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-72-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-56-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline behavioral1/memory/4760-46-0x00000000053C0000-0x00000000053FF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4196 zizO4088.exe 1316 jr150960.exe 4760 ku639327.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr150960.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zizO4088.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5712 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zizO4088.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku639327.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1316 jr150960.exe 1316 jr150960.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1316 jr150960.exe Token: SeDebugPrivilege 4760 ku639327.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 720 wrote to memory of 4196 720 59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101.exe 83 PID 720 wrote to memory of 4196 720 59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101.exe 83 PID 720 wrote to memory of 4196 720 59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101.exe 83 PID 4196 wrote to memory of 1316 4196 zizO4088.exe 85 PID 4196 wrote to memory of 1316 4196 zizO4088.exe 85 PID 4196 wrote to memory of 4760 4196 zizO4088.exe 93 PID 4196 wrote to memory of 4760 4196 zizO4088.exe 93 PID 4196 wrote to memory of 4760 4196 zizO4088.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101.exe"C:\Users\Admin\AppData\Local\Temp\59ad435f81a7ac0ba553d624d5df2930859384196bc4ffeb8b8995b154e3a101.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizO4088.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizO4088.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr150960.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr150960.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku639327.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku639327.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4760
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5712
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD517cbcd75a7e19f251919e684f374a8a9
SHA18a971b78d6516301645f5af61cd8f5b1627e9aa9
SHA256f93071b42051bac1dd79fbe6965ff2bc6bb81fd1c5f0cc6f123961c86a1c1772
SHA512874342293b9583bc441268e2b5b261ff90d0a5c8354584884b61287c7ff01bf9704d1b870e0b059909baf4bf85ca8b168939f436d52d975a72a34143eade5a7f
-
Filesize
14KB
MD573397f266a43391d786838a8438493ef
SHA1ef22bc8d6608805b21f79d52deedfc1baf1842a2
SHA256f103dbef491a7beef6e2f6e3ca0fa413dc16e8c136ef4683b782adc7da21f3dd
SHA5123d8597bb915c6a1ce9365194b83c4c6c1719424a383e4797257b8ea1e10d9d8eae433965714db958bc37e08809fe68d0e6386a766a6ca06026af03e2573438da
-
Filesize
352KB
MD5e9189e352309d4308cea9b8219caff62
SHA1589e0b688eb637687810e3749730b5f0bfe46988
SHA256589386c641323fc809e44c145665761484a8104183e46a964ecbf3c0e51a6585
SHA512b2ce0269525ee101b9b0f44aae95a4f78d6f16b921bf5e4d011fd16519f414c5bd7196b153f4fd5985df1a7be8bbaac7f9cfc5f42902f869b125d84a425af9d8