Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:37
Static task
static1
Behavioral task
behavioral1
Sample
f43262b9f77bd359d2aedbe577efe1e5fd59e2df3c62e959ff34cf3e9fb843d8.exe
Resource
win10v2004-20241007-en
General
-
Target
f43262b9f77bd359d2aedbe577efe1e5fd59e2df3c62e959ff34cf3e9fb843d8.exe
-
Size
530KB
-
MD5
f1286a6a44b858a016438da04ce4428e
-
SHA1
13939803673bda491ff5c05021dfe748288e1ca6
-
SHA256
f43262b9f77bd359d2aedbe577efe1e5fd59e2df3c62e959ff34cf3e9fb843d8
-
SHA512
46560efd1f6eed62034e8648c72122fc89af0b257e9e7315029b5768bbcafb97f32cd059573d41558ed8849e6417474db4175d2d929f5ac95bdfe5bd0dd20799
-
SSDEEP
12288:tMrYy90c74OoP7rxHiAVHDwOK4IZ7C6HnINC:RyxkLvxj7s7XIA
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c7b-12.dat healer behavioral1/memory/4240-15-0x0000000000080000-0x000000000008A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr080888.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr080888.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr080888.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr080888.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr080888.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr080888.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1152-22-0x0000000004A50000-0x0000000004A96000-memory.dmp family_redline behavioral1/memory/1152-24-0x0000000004C10000-0x0000000004C54000-memory.dmp family_redline behavioral1/memory/1152-30-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-48-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-88-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-86-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-84-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-82-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-80-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-78-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-74-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-72-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-70-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-68-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-66-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-64-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-60-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-58-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-56-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-54-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-50-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-46-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-44-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-42-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-40-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-38-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-36-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-34-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-32-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-76-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-62-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-52-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-28-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-26-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/1152-25-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1428 ziCg0854.exe 4240 jr080888.exe 1152 ku432721.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr080888.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f43262b9f77bd359d2aedbe577efe1e5fd59e2df3c62e959ff34cf3e9fb843d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziCg0854.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5336 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziCg0854.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku432721.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f43262b9f77bd359d2aedbe577efe1e5fd59e2df3c62e959ff34cf3e9fb843d8.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4240 jr080888.exe 4240 jr080888.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4240 jr080888.exe Token: SeDebugPrivilege 1152 ku432721.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 5048 wrote to memory of 1428 5048 f43262b9f77bd359d2aedbe577efe1e5fd59e2df3c62e959ff34cf3e9fb843d8.exe 85 PID 5048 wrote to memory of 1428 5048 f43262b9f77bd359d2aedbe577efe1e5fd59e2df3c62e959ff34cf3e9fb843d8.exe 85 PID 5048 wrote to memory of 1428 5048 f43262b9f77bd359d2aedbe577efe1e5fd59e2df3c62e959ff34cf3e9fb843d8.exe 85 PID 1428 wrote to memory of 4240 1428 ziCg0854.exe 86 PID 1428 wrote to memory of 4240 1428 ziCg0854.exe 86 PID 1428 wrote to memory of 1152 1428 ziCg0854.exe 95 PID 1428 wrote to memory of 1152 1428 ziCg0854.exe 95 PID 1428 wrote to memory of 1152 1428 ziCg0854.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\f43262b9f77bd359d2aedbe577efe1e5fd59e2df3c62e959ff34cf3e9fb843d8.exe"C:\Users\Admin\AppData\Local\Temp\f43262b9f77bd359d2aedbe577efe1e5fd59e2df3c62e959ff34cf3e9fb843d8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCg0854.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCg0854.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr080888.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr080888.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku432721.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku432721.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5336
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD5be75a1dadd9ac6dd3ded95314854219a
SHA13975a53661a973d15f4b1dd6f6621188fc36c1a2
SHA25626571ff6c269cd0983c14be5e7aeeddc2c84e6765ad3de4305bcf9ecce557613
SHA512bd595c775548a5b0e5753cf4dc780a05884cf71584b5a43b3274d74b30ecb4aa75c7d3afd89b4b57aee4cb637b0dfaf02aa05033e05cdd1e48c330be1d4c40e3
-
Filesize
12KB
MD5b5aa4d07f416806f3334e202815376be
SHA12d342e2019027f3d26fa6bf34998feef11cbde1d
SHA25695d8aa545fa1fc72d67c1a305e7b1f6f442b3d7d80d511f8b24b25d3405bcd44
SHA51289c7fc2f9b10a1abe17f4eb118ac957b516c6f3ba407a8d4a6888bbaa98adcd776ae44d8f19012d1838b78823bec9a7fb199f47dadb7afa0c510c8ea9feadcb5
-
Filesize
342KB
MD5b59bc9320ae1ddceacfb8829f020d1ac
SHA140b25af3028667cfed291314acde2daf194521b2
SHA25628c5ded5e219867a2cf7f156f6d86e7061da31953a07b1b4996838d96e93592c
SHA512a9cc951c27b7306cadcfdb7dd404322dcb4e343a40558ba8bb8e329e422a5eda525d64333a9b156d7fe4b6e96ea20e926bc8b809a66995294c239908dd49fb9e