Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 00:12
Static task
static1
Behavioral task
behavioral1
Sample
b778fe52de70df84db2a1b5412e656be11b4e44831ba81ddac71fe065199c31e.exe
Resource
win10v2004-20241007-en
General
-
Target
b778fe52de70df84db2a1b5412e656be11b4e44831ba81ddac71fe065199c31e.exe
-
Size
530KB
-
MD5
8ce7077eb51c26309ab27da3f2fd17c8
-
SHA1
3a9e3f3a636e7091963a83571db478f5b9097bb5
-
SHA256
b778fe52de70df84db2a1b5412e656be11b4e44831ba81ddac71fe065199c31e
-
SHA512
1e46a98acc548a55093b263f8dac497b740356b136fc0974167e91eafd0c101a9217b3c21f90be80889fc13e0d5cbe4a65cdf5469cd9911237c3a0567167a055
-
SSDEEP
12288:HMriy90eB00y6JTvHX87U6Jf5KXa/DVTQdMGDBGJxhM:By5cgPH6AoVT8BBGJU
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b8a-12.dat healer behavioral1/memory/2948-15-0x0000000000510000-0x000000000051A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr996515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr996515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr996515.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr996515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr996515.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr996515.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1732-22-0x0000000002460000-0x00000000024A6000-memory.dmp family_redline behavioral1/memory/1732-24-0x0000000002870000-0x00000000028B4000-memory.dmp family_redline behavioral1/memory/1732-28-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-36-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-88-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-87-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-82-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-80-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-78-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-76-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-74-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-72-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-68-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-66-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-64-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-62-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-60-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-58-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-56-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-54-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-52-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-48-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-46-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-44-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-42-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-38-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-34-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-32-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-30-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-84-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-70-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-50-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-40-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-26-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline behavioral1/memory/1732-25-0x0000000002870000-0x00000000028AF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2896 zikb6422.exe 2948 jr996515.exe 1732 ku489141.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr996515.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b778fe52de70df84db2a1b5412e656be11b4e44831ba81ddac71fe065199c31e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zikb6422.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5204 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b778fe52de70df84db2a1b5412e656be11b4e44831ba81ddac71fe065199c31e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zikb6422.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku489141.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2948 jr996515.exe 2948 jr996515.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2948 jr996515.exe Token: SeDebugPrivilege 1732 ku489141.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4388 wrote to memory of 2896 4388 b778fe52de70df84db2a1b5412e656be11b4e44831ba81ddac71fe065199c31e.exe 85 PID 4388 wrote to memory of 2896 4388 b778fe52de70df84db2a1b5412e656be11b4e44831ba81ddac71fe065199c31e.exe 85 PID 4388 wrote to memory of 2896 4388 b778fe52de70df84db2a1b5412e656be11b4e44831ba81ddac71fe065199c31e.exe 85 PID 2896 wrote to memory of 2948 2896 zikb6422.exe 86 PID 2896 wrote to memory of 2948 2896 zikb6422.exe 86 PID 2896 wrote to memory of 1732 2896 zikb6422.exe 95 PID 2896 wrote to memory of 1732 2896 zikb6422.exe 95 PID 2896 wrote to memory of 1732 2896 zikb6422.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b778fe52de70df84db2a1b5412e656be11b4e44831ba81ddac71fe065199c31e.exe"C:\Users\Admin\AppData\Local\Temp\b778fe52de70df84db2a1b5412e656be11b4e44831ba81ddac71fe065199c31e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikb6422.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikb6422.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr996515.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr996515.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku489141.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku489141.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5204
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD5cb44a25feaab406b350eb50148da565e
SHA1ebe60a9f416b59ad7612c9c5dc22a933257118b0
SHA2567a0a844c922714aeb6490491c73fcbfd54290f70d759bc073fce2e83b1daff03
SHA512e494e722c07f4dada9481bf7114fa7f724a5946f7adee1a6907d3461552f7356df21914792c4404bb2cb996a0e48bac08d49f2c44f1eb82491c41b0ad0096c38
-
Filesize
11KB
MD566233842cc4c6ffb85b56e67fece2373
SHA1b38277717a66492ca9aa822ba760d26940bc5767
SHA256d8d32c4b550eeb5c689f1424191f48be89b07453b0ca5753f4d19a544ebc0123
SHA5128c7029f9079df2a839eb402c80b8656800ff07a5341930bc5f04494c1ae6777e35644c350ec6a45ffba4c34d1168416ed9ac9c351022241ef5371b08eff2c809
-
Filesize
434KB
MD57f5b1a917bffedee88ca781ccc4bff2f
SHA19e1a705b0cb5562e6425f7de2aef6249d93ace83
SHA25681db56912777b0731cc875135f3c89a20df697c611397fdea5ef78eb3b29f43d
SHA512be3d9b71e77aaf2499ad2dae7b2a2844b38641535c62be97313116db5b9a79cd575335a654cd97ff7ae9ef14c46cd7cfda013c78bec69980c1d5e603844817c3