Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:39
Static task
static1
Behavioral task
behavioral1
Sample
16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431.exe
Resource
win10v2004-20241007-en
General
-
Target
16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431.exe
-
Size
522KB
-
MD5
c57182a6fc314cff72e53b64cf58461a
-
SHA1
5625fcc82bfe9db5480386f1d6c2c8fc119fc7da
-
SHA256
16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431
-
SHA512
c9aac233608e67303c5659f610d4c385359a439ee69be6c30dfbfa623308ee67092afe0e6f3338c537bc4be447dc2401b7f9f0ec0aed9a961f8015084b326761
-
SSDEEP
6144:K8y+bnr+rp0yN90QEDmqPpGHK/KLEtWmdkJcvPdM7S5wNkTrggv4kt0RtzvdviCI:8Mr/y904JK/KvxJcXqar2ft1+sH2T
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca5-12.dat healer behavioral1/memory/1604-15-0x0000000000700000-0x000000000070A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr883663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr883663.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr883663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr883663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr883663.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr883663.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3892-22-0x0000000002520000-0x0000000002566000-memory.dmp family_redline behavioral1/memory/3892-24-0x0000000004AE0000-0x0000000004B24000-memory.dmp family_redline behavioral1/memory/3892-32-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-36-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-34-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-30-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-78-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-60-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-40-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-28-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-26-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-25-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-88-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-86-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-84-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-82-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-80-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-76-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-74-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-72-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-70-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-68-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-66-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-64-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-62-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-58-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-56-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-54-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-52-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-50-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-48-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-46-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-44-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-42-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline behavioral1/memory/3892-38-0x0000000004AE0000-0x0000000004B1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1152 ziFT2487.exe 1604 jr883663.exe 3892 ku203429.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr883663.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziFT2487.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziFT2487.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku203429.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1604 jr883663.exe 1604 jr883663.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1604 jr883663.exe Token: SeDebugPrivilege 3892 ku203429.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1152 1624 16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431.exe 83 PID 1624 wrote to memory of 1152 1624 16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431.exe 83 PID 1624 wrote to memory of 1152 1624 16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431.exe 83 PID 1152 wrote to memory of 1604 1152 ziFT2487.exe 84 PID 1152 wrote to memory of 1604 1152 ziFT2487.exe 84 PID 1152 wrote to memory of 3892 1152 ziFT2487.exe 93 PID 1152 wrote to memory of 3892 1152 ziFT2487.exe 93 PID 1152 wrote to memory of 3892 1152 ziFT2487.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431.exe"C:\Users\Admin\AppData\Local\Temp\16165361685b77a485bf99f5463ae20a6d63e72bbda2d095cf96a0995cd4f431.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFT2487.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFT2487.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr883663.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr883663.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku203429.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku203429.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3892
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD575d96cb9a7d5cb99fbfc1460d63d8181
SHA1d77abf1306b1ac0acea56145392d82de6869fd46
SHA256773b579515e5a75672b6ae5bdac450bc54a6b9884e391fcada3d7702d9f75c26
SHA512f8a680dfd64addf82ff28baa642dcd45a9c9075729d1de9a6ef2aabe9e3393609693a5dd9813831993672c4bce08762195c0e827a54190d0cbac5aff5ab0e1ee
-
Filesize
14KB
MD513e995216f5c3bd5f030f650241e7dbd
SHA10d70f76e8fd00926b7b4c802e28fd362c0837126
SHA256b55b7858d91a400e25383d93665a414755124188cb82006bff40a3c6a40fa3d3
SHA5123c891a886ebaa5caac301e97512bf77f5f7940b287c1467348d29aafd0002ee8cb88554296127884b921eb47716a974bc4df47d790dadcd21d05f87b5cc82276
-
Filesize
295KB
MD5fbf0d074f1f0ca121fae4cbc8b84f627
SHA1c8e83e32b39292676abbdf51254bc8270f27d49a
SHA2569837f57d830813f30d1053b0528eee4eee6a2fe4ae9926b1437779de557876e8
SHA512daab42f97c42e9780c277a7188586ab0524dc8823eb9312fa0cf3348832105577bf879f7f78ec8ee6fc0804a59fb0b38f898f7bfff16263b2b4434d153191df1