Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/11/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe
Resource
win10v2004-20241007-en
General
-
Target
c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe
-
Size
727KB
-
MD5
3025fa14cd73acdd7fa83c6c1749e730
-
SHA1
0c0fe30ab4c67a05b22e5828c44470150adaba31
-
SHA256
c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05
-
SHA512
309a5ab55e7e5a22932b514568a7f9a9af4e4559b7d22e62df0301648eb07f7709cd8f24bfb314256c1f5cf4687c9c12e80681191abdc1161895f2bd07dc6ede
-
SSDEEP
12288:bUncFmjm+9WPtD3BDyTNqHJ1zWPQU7ICRsUb5bmybnJ9kK2vxR:bqjj4BuRy1WYCRsUb57i
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000700000001873d-18.dat healer behavioral1/memory/2560-22-0x0000000000D50000-0x0000000000D5A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr683043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr683043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr683043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr683043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr683043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr683043.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 34 IoCs
resource yara_rule behavioral1/memory/2728-36-0x0000000004C50000-0x0000000004C96000-memory.dmp family_redline behavioral1/memory/2728-37-0x0000000004CA0000-0x0000000004CE4000-memory.dmp family_redline behavioral1/memory/2728-38-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-39-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-41-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-43-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-45-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-47-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-49-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-51-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-55-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-73-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-95-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-99-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-97-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-93-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-91-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-89-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-87-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-85-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-83-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-81-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-79-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-77-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-75-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-71-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-69-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-67-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-65-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-63-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-61-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-59-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-57-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline behavioral1/memory/2728-53-0x0000000004CA0000-0x0000000004CDF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2280 zicD8762.exe 2560 jr683043.exe 2728 ku134912.exe -
Loads dropped DLL 6 IoCs
pid Process 2512 c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe 2280 zicD8762.exe 2280 zicD8762.exe 2280 zicD8762.exe 2280 zicD8762.exe 2728 ku134912.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features jr683043.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr683043.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zicD8762.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku134912.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zicD8762.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2560 jr683043.exe 2560 jr683043.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2560 jr683043.exe Token: SeDebugPrivilege 2728 ku134912.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2280 2512 c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe 30 PID 2512 wrote to memory of 2280 2512 c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe 30 PID 2512 wrote to memory of 2280 2512 c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe 30 PID 2512 wrote to memory of 2280 2512 c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe 30 PID 2512 wrote to memory of 2280 2512 c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe 30 PID 2512 wrote to memory of 2280 2512 c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe 30 PID 2512 wrote to memory of 2280 2512 c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe 30 PID 2280 wrote to memory of 2560 2280 zicD8762.exe 31 PID 2280 wrote to memory of 2560 2280 zicD8762.exe 31 PID 2280 wrote to memory of 2560 2280 zicD8762.exe 31 PID 2280 wrote to memory of 2560 2280 zicD8762.exe 31 PID 2280 wrote to memory of 2560 2280 zicD8762.exe 31 PID 2280 wrote to memory of 2560 2280 zicD8762.exe 31 PID 2280 wrote to memory of 2560 2280 zicD8762.exe 31 PID 2280 wrote to memory of 2728 2280 zicD8762.exe 33 PID 2280 wrote to memory of 2728 2280 zicD8762.exe 33 PID 2280 wrote to memory of 2728 2280 zicD8762.exe 33 PID 2280 wrote to memory of 2728 2280 zicD8762.exe 33 PID 2280 wrote to memory of 2728 2280 zicD8762.exe 33 PID 2280 wrote to memory of 2728 2280 zicD8762.exe 33 PID 2280 wrote to memory of 2728 2280 zicD8762.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe"C:\Users\Admin\AppData\Local\Temp\c0d646bb8d3fce2ea1160529ae90c56ab205c18a1127b0a5b18270f1c92d2e05.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicD8762.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicD8762.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr683043.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr683043.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku134912.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku134912.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2728
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
414KB
MD5bdc5b00970a11c4210511cad06fbfa3a
SHA1b178e1ea7f36874823beaa9a9e6c56c5d8055db4
SHA25661c4c7b43d10088783b8493aace4cee253a1632f4a79c2e0b2ff539209ba868e
SHA512d20ea017764f5ec11db9422b213fedfdbcfcf703860d75973fadb590c9d45651a511fc18bc82d6113ef40d8327f24127b311e85551101e16414e2b7f69140f91
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
386KB
MD5cf46f81c22a53aa2022397fb0153be27
SHA17e7d3d8ed973b4f9678effe884dad7c9a719901d
SHA25661f8bdb21162325efc156c649086127e04ed5de4db26dbec7871c522c56d7816
SHA512f6bc361afe309bc3052f6570ffbc9c6c3666febee9333edb72885b070ef5d8d688b845bcd590dc04e4bc16c029e416e720ac260163eafc6769f4c8cdefd3616d