Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 21:21
Static task
static1
Behavioral task
behavioral1
Sample
43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3.exe
Resource
win10v2004-20241007-en
General
-
Target
43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3.exe
-
Size
561KB
-
MD5
29b8039837a7e7aa28a5004c20cc5ab2
-
SHA1
64e096245471b97ef26359459a58ff7e3d098d41
-
SHA256
43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3
-
SHA512
a32a6e721c9e3ee530a82e4492e0cdd7446a85fb61437ca1808ac0acda3aed9c1a6b9a7f4c4f33fa1ccf82cdafec8e6ebb3d6f9f2e85225639cd33517e4e8436
-
SSDEEP
12288:pMrQy90JI2S5zmNtyOiurYpEMxJopH55H0hSNKnTju:5yN2uz0f3eEMspH2qAu
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9a-12.dat healer behavioral1/memory/3740-15-0x0000000000A00000-0x0000000000A0A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr005471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr005471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr005471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr005471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr005471.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr005471.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/876-22-0x0000000002810000-0x0000000002856000-memory.dmp family_redline behavioral1/memory/876-24-0x0000000002AE0000-0x0000000002B24000-memory.dmp family_redline behavioral1/memory/876-32-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-38-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-88-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-86-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-84-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-82-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-80-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-78-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-76-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-74-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-70-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-68-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-66-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-64-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-62-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-60-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-58-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-56-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-54-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-52-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-50-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-46-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-44-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-42-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-40-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-36-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-34-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-30-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-72-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-48-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-28-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-26-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline behavioral1/memory/876-25-0x0000000002AE0000-0x0000000002B1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2512 ziVf2653.exe 3740 jr005471.exe 876 ku217131.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr005471.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVf2653.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziVf2653.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku217131.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3740 jr005471.exe 3740 jr005471.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3740 jr005471.exe Token: SeDebugPrivilege 876 ku217131.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3520 wrote to memory of 2512 3520 43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3.exe 85 PID 3520 wrote to memory of 2512 3520 43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3.exe 85 PID 3520 wrote to memory of 2512 3520 43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3.exe 85 PID 2512 wrote to memory of 3740 2512 ziVf2653.exe 86 PID 2512 wrote to memory of 3740 2512 ziVf2653.exe 86 PID 2512 wrote to memory of 876 2512 ziVf2653.exe 97 PID 2512 wrote to memory of 876 2512 ziVf2653.exe 97 PID 2512 wrote to memory of 876 2512 ziVf2653.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3.exe"C:\Users\Admin\AppData\Local\Temp\43caa4f6f4c6daec5a0fb0b21007eb0a0af89ba44ec20cc7b3a7459198dce2c3.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVf2653.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVf2653.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr005471.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr005471.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku217131.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku217131.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408KB
MD559f89b2e6911e2f48c87d29f08b2da6b
SHA1311fc260866f4e736eaaa7bd148917bd98a649ca
SHA2566101c34f8057e3b0349bb31ac20aa8aaed8f68d3b4c47d72b519f8a024557c66
SHA512a5cb10e1147de9fe8912fd0640d8604e15046dd7f9d0300093b7c9040e9595dd2f2966ef2f638cd60f0deffcb735c70de096ba52faa9a21890a831913f93403c
-
Filesize
12KB
MD5e07a7b2a08c7e8254b294ae9fd79455d
SHA16dce4445f6132ecec600ae10a307f5ea1a0ba5fc
SHA2563d0cf5ed46fe8e21d69191cedfabdc89367361498c238f0e18b4c5e3dd0f3529
SHA512e0519c99fdd1936a9349097ddcdbc0e79306258c344b5f691f5352afb67a2d6628f861b3f6324d0319675fd776ad7045c500c3ba706d05c407489a0a6cc17f8b
-
Filesize
372KB
MD543f69e410323066737c4b0c0e25bd40b
SHA175c3ca3b2dac235d8df7f802ec0de58e71d1d935
SHA2569228a32ccaa4871ed3baea693e7bd091080cc180899aa46fb4e6f4c2ce48dc23
SHA512e3d04885d7a94cc805aa373ee1bbb26ed32e4635d6c5545d0489bbf0e041fa1f37d6c466d60f2dc9ca32e8c4d7359de8cdd3e998361c994d58af95950c08a8c1