Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:42
Static task
static1
Behavioral task
behavioral1
Sample
ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220.exe
Resource
win10v2004-20241007-en
General
-
Target
ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220.exe
-
Size
560KB
-
MD5
5f7b7c79133a8490d207db7c282d7c28
-
SHA1
d5954f7fdc0cfcb86653bef7a46c3a1c235613ac
-
SHA256
ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220
-
SHA512
04eb0982e4273e73d1635ec538b8a9dfd69b270b34a9608d76fbe63a2d72ef1713b3d63f4ef4fb9b00e71277bd4dd61b32b7abe122c556336ce2fb311b73bc54
-
SSDEEP
6144:KRy+bnr+2p0yN90QEjrvjLA25mZFzAeC0KqPXuCUcUF6w63ABnUQ+t+0PAQmDc8o:/Mriy90drvH5yFzJKG8LUQXNasMS0
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000f000000023bc4-12.dat healer behavioral1/memory/3916-15-0x0000000000D60000-0x0000000000D6A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr673211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr673211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr673211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr673211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr673211.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr673211.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2684-22-0x0000000004D30000-0x0000000004D76000-memory.dmp family_redline behavioral1/memory/2684-24-0x00000000053B0000-0x00000000053F4000-memory.dmp family_redline behavioral1/memory/2684-26-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-25-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-42-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-88-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-84-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-82-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-80-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-78-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-77-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-74-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-72-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-71-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-68-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-66-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-64-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-62-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-60-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-58-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-56-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-54-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-52-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-50-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-46-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-45-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-41-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-38-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-36-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-35-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-32-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-30-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-28-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-86-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline behavioral1/memory/2684-48-0x00000000053B0000-0x00000000053EF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1564 ziFT9101.exe 3916 jr673211.exe 2684 ku508848.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr673211.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziFT9101.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2244 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziFT9101.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku508848.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3916 jr673211.exe 3916 jr673211.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3916 jr673211.exe Token: SeDebugPrivilege 2684 ku508848.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3644 wrote to memory of 1564 3644 ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220.exe 83 PID 3644 wrote to memory of 1564 3644 ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220.exe 83 PID 3644 wrote to memory of 1564 3644 ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220.exe 83 PID 1564 wrote to memory of 3916 1564 ziFT9101.exe 85 PID 1564 wrote to memory of 3916 1564 ziFT9101.exe 85 PID 1564 wrote to memory of 2684 1564 ziFT9101.exe 95 PID 1564 wrote to memory of 2684 1564 ziFT9101.exe 95 PID 1564 wrote to memory of 2684 1564 ziFT9101.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220.exe"C:\Users\Admin\AppData\Local\Temp\ade9c7c9d0e6fab95da28389189fac7c5ddb5e406a3cc600b91cfd330b9e4220.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFT9101.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFT9101.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr673211.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr673211.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3916
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508848.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508848.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2244
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD5de239a0e3b398b2114b1ff02e0a3abe8
SHA18060a121cc93b409dda6403740a3861e91f79392
SHA256b0ace4b7406edf8e72d35d5d2f7e3284b1ef326afa93cca20b74ddcbf18f7255
SHA512b6a3cda5447de7149fb36bea206c7825e90459db316ded836b5dda28239503b55baea7220fc7c6f3db20dd592e199894f2f80d52b685f8294909f7025fc0bf73
-
Filesize
13KB
MD58a9f8ad46501e1b0818186277070dba6
SHA1c704914b50750d8d66c2a14d7954143940b75ad8
SHA25669b13adb670913616552fbe7c3a34c403112e4f03447d08f97415ae3faccd9cf
SHA512e895b4ee1fc0582b70cfa347cc5ecd22613ac903cb7cbab43301200a4843374ffd3414bffbd4e999ba2486411c1c0086fdeaf815623243be5742767ab427b339
-
Filesize
370KB
MD5c34c8849063774854fe77a03030ff399
SHA1964d1c2c6b3263692ddceb298f05202a8c6dd914
SHA25627975cd10d7dbdc65f3cb7917fd2b61f8d94291e9df5d6e0d39366f4fc93045d
SHA5121efe93a03549d19c012f8fa43bf36281a71dd265fd34d5cf69f175d474555fef1685056c2cb781d09e49c8f49743544d2c96b696cad43d55fb60246b47077789