Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:38
Static task
static1
Behavioral task
behavioral1
Sample
7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd.exe
Resource
win10v2004-20241007-en
General
-
Target
7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd.exe
-
Size
560KB
-
MD5
7d88039eedd366ba4b80df50ec9589e9
-
SHA1
13deeb47ceb6468d1e247178e6746f8f38f28f97
-
SHA256
7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd
-
SHA512
f3311c2f3bd31d88445cbb6cfa33a6f0b3e67edfecdb6b3b3aa8f1ec6e867ca4dcbb71dfe9241eb454d04a65b38e8fc5f4cb8e0aed0c4e6c0e0a3fc2add2f432
-
SSDEEP
12288:zMryy90p0HLljIE6YP3uBEbxJYWa4yL3WqIj:dybljz6BBEbcL4yLGbj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b81-12.dat healer behavioral1/memory/1144-15-0x0000000000680000-0x000000000068A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr519767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr519767.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr519767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr519767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr519767.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr519767.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4112-22-0x0000000002880000-0x00000000028C6000-memory.dmp family_redline behavioral1/memory/4112-24-0x0000000005520000-0x0000000005564000-memory.dmp family_redline behavioral1/memory/4112-34-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-40-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-88-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-86-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-84-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-82-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-78-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-76-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-74-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-72-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-70-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-68-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-66-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-64-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-60-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-58-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-56-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-54-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-53-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-50-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-48-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-46-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-44-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-42-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-38-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-36-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-32-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-30-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-80-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-62-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-28-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-26-0x0000000005520000-0x000000000555F000-memory.dmp family_redline behavioral1/memory/4112-25-0x0000000005520000-0x000000000555F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1124 ziqN4579.exe 1144 jr519767.exe 4112 ku000701.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr519767.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziqN4579.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziqN4579.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku000701.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1144 jr519767.exe 1144 jr519767.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1144 jr519767.exe Token: SeDebugPrivilege 4112 ku000701.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1508 wrote to memory of 1124 1508 7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd.exe 83 PID 1508 wrote to memory of 1124 1508 7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd.exe 83 PID 1508 wrote to memory of 1124 1508 7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd.exe 83 PID 1124 wrote to memory of 1144 1124 ziqN4579.exe 85 PID 1124 wrote to memory of 1144 1124 ziqN4579.exe 85 PID 1124 wrote to memory of 4112 1124 ziqN4579.exe 101 PID 1124 wrote to memory of 4112 1124 ziqN4579.exe 101 PID 1124 wrote to memory of 4112 1124 ziqN4579.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd.exe"C:\Users\Admin\AppData\Local\Temp\7626891da4c63a2480cc90e376699227cece43cfa1df5f2fdf97f117bd47effd.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqN4579.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqN4579.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr519767.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr519767.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku000701.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku000701.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4112
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406KB
MD5732d0641be3a12cc0c393481516adb14
SHA1bc033c2af1aecfe60442b04954999a167d5074f8
SHA25619df85b09fa9547f4c16d3ca9c11165c4c6a685b69361c5b5cc42be9c9c9eb83
SHA512411501e6855cc4ec0e68b4ea57691ffe828cfacc1ab41d183f5b6205f1b8b45b5230bc4d674b67426b59e02d0e46c241d19dac21d1cd606faaaeea920ea712ce
-
Filesize
12KB
MD5b49e65ab3808f4c2057b6efa92a5446f
SHA17450a229775f0e94ac900ab05b4eb51d35d8d73d
SHA2563a147fa9724e3100050461fc839111184a23e4e213faeb0375be9d1ba50cdb22
SHA512079ba6c49caf1def03f6e256efac44c81eb45459726aceda6dcb8a76c7343d14a094e0f17fe7680b9d39bba37f7cced927364876a64a2433b8eb45932c073c83
-
Filesize
372KB
MD55495afa50e3008bd5e3ba12d68fe783c
SHA13c239dbeb302a8f17ad206a10633915181441a8a
SHA2569d424d24250ed7d106b0a228be3646f708848df2f27c4d6c0672f894cc4138fa
SHA512aa924c506ea24e5216a6f04582ff31a068bbbf93524b0accd2c8b1ceae03d5400b3c92d3dfe14d17343b77dbe1112b10adba7d46b8e18d6a42f00d56848dff8a