Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 22:22
Static task
static1
Behavioral task
behavioral1
Sample
9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38.exe
Resource
win10v2004-20241007-en
General
-
Target
9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38.exe
-
Size
530KB
-
MD5
168b99a4a4a225fb1400856d8559581f
-
SHA1
39c84da1fa75ac3c818224e8e47c2da3604095b3
-
SHA256
9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38
-
SHA512
69f77ef3aaf50f13e9b683e823aa2356c3b77f5ca58f7aea1571978b7d8eceda4bb0df390e97145709a51d676abbb8359ea41e82554cc9282ac2eca26c79e533
-
SSDEEP
12288:IMr0y90PlRMjZXgWnX1zEXKnKJQQyqBM2HGYQwKFj2vouo:MyouXpXt4bmQRswKFqo
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb1-13.dat healer behavioral1/memory/1408-15-0x0000000000890000-0x000000000089A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr751951.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr751951.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr751951.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr751951.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr751951.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr751951.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4588-22-0x0000000004B30000-0x0000000004B76000-memory.dmp family_redline behavioral1/memory/4588-24-0x00000000071B0000-0x00000000071F4000-memory.dmp family_redline behavioral1/memory/4588-60-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-50-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-40-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-26-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-25-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-88-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-86-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-84-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-82-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-80-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-78-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-76-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-74-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-72-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-70-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-68-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-66-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-64-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-62-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-58-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-56-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-54-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-52-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-48-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-46-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-44-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-42-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-38-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-36-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-34-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-32-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-30-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline behavioral1/memory/4588-28-0x00000000071B0000-0x00000000071EF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1136 ziyJ9826.exe 1408 jr751951.exe 4588 ku566133.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr751951.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziyJ9826.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziyJ9826.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku566133.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1408 jr751951.exe 1408 jr751951.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1408 jr751951.exe Token: SeDebugPrivilege 4588 ku566133.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4400 wrote to memory of 1136 4400 9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38.exe 83 PID 4400 wrote to memory of 1136 4400 9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38.exe 83 PID 4400 wrote to memory of 1136 4400 9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38.exe 83 PID 1136 wrote to memory of 1408 1136 ziyJ9826.exe 84 PID 1136 wrote to memory of 1408 1136 ziyJ9826.exe 84 PID 1136 wrote to memory of 4588 1136 ziyJ9826.exe 96 PID 1136 wrote to memory of 4588 1136 ziyJ9826.exe 96 PID 1136 wrote to memory of 4588 1136 ziyJ9826.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38.exe"C:\Users\Admin\AppData\Local\Temp\9aa95f4fe33967540e10191ed8d5645305b039b2b7785b5e046070e644367a38.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyJ9826.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyJ9826.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr751951.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr751951.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1408
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku566133.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku566133.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD542a8395cbae01d0c14a21cc622ed6bb4
SHA11ef8d79e7c0140681da0e2de9e010cbbfd461da8
SHA2562470f316a1d3fff3f9eb8d7001c12d2ce71a8d382ab4020da90c46c4b9471593
SHA5121e1fe3009ba00699950fbc6deb9f382eb9bbaaeb28c75142f52c84c09cabdd89154faddf5d486bc0a577db00ef6d139c60f8f3deb68e3888f8e53f2c1f2a508a
-
Filesize
11KB
MD5c1c020c59cdf379c115377423ebcd969
SHA1156ff2c61339f776ce26be8f4489fbb5966ec1f7
SHA2562990ab23d14cb70a564db14a77dd09a8afff17f1f344d4163042860879ed430d
SHA512994e5cd7be3d64988c5d795afef7f8b92fb3c335291fefc9b2b4f8a99e037f3c42fe2728bc31453ddd2bee3a6d41325f1b1743cf813780eb9fa91212b9c71ad5
-
Filesize
354KB
MD5702f11b1c0e9a808c224e5f5c94e55e1
SHA1711473806dafbc4fbade490a60ebdb3bc189ae3d
SHA256096f72c5160bcb3ce16709553679cf6d0e210cfa9417ee80452dc6a422fb8e5e
SHA5126bd3089308d94048710244daa71fd573585cd34634bf78ef5965e64dc9c7baaedcd7413c00d1d40865328963c07fd0c92c7f72f2aeb4e11df907be2823127a81