Analysis
-
max time kernel
144s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:39
Static task
static1
Behavioral task
behavioral1
Sample
7e44d182f5eaf84abfd25a600d3566c836db308172c1bbcaf96ecfa11230d1cf.exe
Resource
win10v2004-20241007-en
General
-
Target
7e44d182f5eaf84abfd25a600d3566c836db308172c1bbcaf96ecfa11230d1cf.exe
-
Size
522KB
-
MD5
718c0fbb4951cc347d9358e3983a2fa2
-
SHA1
5be3d5f474dbad2eabfc498b910142a3b6270dbc
-
SHA256
7e44d182f5eaf84abfd25a600d3566c836db308172c1bbcaf96ecfa11230d1cf
-
SHA512
c4ec76aa0d98e93168befa0108bf1619d97ad4aa7d780ceb6031a6af6839a2cbe8e6ef6cf966eee1498aeb103035177c2b6f7fd135c587d17bf3674857dc1dda
-
SSDEEP
12288:KMrJy90E7DwMNCz0c0McyI9/6m+trhVuCy9kqb86N5Uhd:LydITT0McyI9/s/uCrm58d
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb6-12.dat healer behavioral1/memory/1332-15-0x00000000009C0000-0x00000000009CA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr416650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr416650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr416650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr416650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr416650.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr416650.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1784-22-0x0000000002340000-0x0000000002386000-memory.dmp family_redline behavioral1/memory/1784-24-0x00000000051D0000-0x0000000005214000-memory.dmp family_redline behavioral1/memory/1784-28-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-34-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-88-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-86-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-84-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-82-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-81-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-78-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-76-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-74-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-72-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-70-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-66-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-64-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-62-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-60-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-58-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-57-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-54-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-52-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-50-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-48-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-46-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-44-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-40-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-38-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-36-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-32-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-30-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-68-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-42-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-26-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline behavioral1/memory/1784-25-0x00000000051D0000-0x000000000520F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3648 ziIw9543.exe 1332 jr416650.exe 1784 ku630268.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr416650.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e44d182f5eaf84abfd25a600d3566c836db308172c1bbcaf96ecfa11230d1cf.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziIw9543.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e44d182f5eaf84abfd25a600d3566c836db308172c1bbcaf96ecfa11230d1cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziIw9543.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku630268.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1332 jr416650.exe 1332 jr416650.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1332 jr416650.exe Token: SeDebugPrivilege 1784 ku630268.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3744 wrote to memory of 3648 3744 7e44d182f5eaf84abfd25a600d3566c836db308172c1bbcaf96ecfa11230d1cf.exe 83 PID 3744 wrote to memory of 3648 3744 7e44d182f5eaf84abfd25a600d3566c836db308172c1bbcaf96ecfa11230d1cf.exe 83 PID 3744 wrote to memory of 3648 3744 7e44d182f5eaf84abfd25a600d3566c836db308172c1bbcaf96ecfa11230d1cf.exe 83 PID 3648 wrote to memory of 1332 3648 ziIw9543.exe 84 PID 3648 wrote to memory of 1332 3648 ziIw9543.exe 84 PID 3648 wrote to memory of 1784 3648 ziIw9543.exe 93 PID 3648 wrote to memory of 1784 3648 ziIw9543.exe 93 PID 3648 wrote to memory of 1784 3648 ziIw9543.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e44d182f5eaf84abfd25a600d3566c836db308172c1bbcaf96ecfa11230d1cf.exe"C:\Users\Admin\AppData\Local\Temp\7e44d182f5eaf84abfd25a600d3566c836db308172c1bbcaf96ecfa11230d1cf.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziIw9543.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziIw9543.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr416650.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr416650.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1332
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku630268.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku630268.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5d6b9c554ff1e264875303751137b1308
SHA1c320e7cfbd8086fc08f74838b3dec04ba67e3749
SHA256a5b42d3b2dbcd81623a8bbe3450474dbbe3c34f25e3dedb793861e1392cf49c0
SHA512ab272543188700915caacd3c6ec2976b6e4b1b28deb018da2aae6cb7fc8a4acce055b0ab4da2430f239e3257760bc75dd63c11b38e701b0aa0e3086336b67f32
-
Filesize
11KB
MD56636ec7aa9b2d3187ccfd61add9d8215
SHA11bdb29ac65279fb8f91ad3533452ddc4abf0b3c8
SHA25609453b3ce01f930d0f2e73564c1c269b2995a5a8322f1a846013a97d4f90be8b
SHA512826a0b8fa185aac5231d2156170f2a5e1e4f496f11e2d3d88c717d34d5fbad2fa423bbf51bc32340de8e914b9a9662ecdd6512d592821f64f8c8ee584bb49cb5
-
Filesize
294KB
MD5ad297e24efc661795e90ae4eb48535ad
SHA14921b63dff673a91c45ef7af5f02e0c0d2aed334
SHA256e085e7471cd8058e3133949382b65bd776246d4a6e69f33e4ad8a7a096cecaaf
SHA5121e47bac59cd777e06f068014e64bc0a0c6f069f83dea75d734896f441aad9c588455edc14fa4a00ca7d4842cd92fbc90f90fb2c596444e314cdba516ddef111b