Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:38
Static task
static1
Behavioral task
behavioral1
Sample
7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe
Resource
win10v2004-20241007-en
General
-
Target
7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe
-
Size
530KB
-
MD5
d83183071887588d4851118dcdbb2be3
-
SHA1
0cb36c88ff1138c9c0044810a2dca178becd7b0e
-
SHA256
7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d
-
SHA512
82e78eec3c8a79e596f2e9b29b149f8c1fd8008e1e177be2bedf291dfa6e143f70d047c00fa46affc7dae26cc062b2ea6513e0bf5912e4f523adb12cdb6481f7
-
SSDEEP
12288:nMrsy90lFMkxItJjDgAZ7SW/zijcQPqBcb/p9R9hix:LyIFMa6lGWWAQiG/7Ix
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c7a-12.dat healer behavioral1/memory/3656-15-0x0000000000D60000-0x0000000000D6A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr006100.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr006100.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr006100.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr006100.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr006100.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr006100.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3220-22-0x0000000004B90000-0x0000000004BD6000-memory.dmp family_redline behavioral1/memory/3220-24-0x0000000007760000-0x00000000077A4000-memory.dmp family_redline behavioral1/memory/3220-34-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-40-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-88-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-86-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-84-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-82-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-80-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-78-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-74-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-72-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-70-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-68-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-66-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-65-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-60-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-58-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-56-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-54-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-50-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-48-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-46-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-44-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-42-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-38-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-36-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-32-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-31-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-76-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-62-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-52-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-28-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-26-0x0000000007760000-0x000000000779F000-memory.dmp family_redline behavioral1/memory/3220-25-0x0000000007760000-0x000000000779F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2676 ziap8519.exe 3656 jr006100.exe 3220 ku730077.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr006100.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziap8519.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziap8519.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku730077.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3656 jr006100.exe 3656 jr006100.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3656 jr006100.exe Token: SeDebugPrivilege 3220 ku730077.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2788 wrote to memory of 2676 2788 7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe 83 PID 2788 wrote to memory of 2676 2788 7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe 83 PID 2788 wrote to memory of 2676 2788 7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe 83 PID 2676 wrote to memory of 3656 2676 ziap8519.exe 84 PID 2676 wrote to memory of 3656 2676 ziap8519.exe 84 PID 2676 wrote to memory of 3220 2676 ziap8519.exe 93 PID 2676 wrote to memory of 3220 2676 ziap8519.exe 93 PID 2676 wrote to memory of 3220 2676 ziap8519.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe"C:\Users\Admin\AppData\Local\Temp\7e4805a9349ce4210f4dbbb35be4e6ea2752801572bf155c7470848b75c9ba0d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziap8519.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziap8519.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr006100.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr006100.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku730077.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku730077.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3220
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD51693d05ff3f774cdb40516a4a3f375a6
SHA184721f7fe833cc53128d7a47365a667a6d76c0bd
SHA2561c9c761a2caba433c29644cd840f74560e7daeb26236ac12e25b335e4e5871c7
SHA5122beeb8dbb841007967ecb956ab2782e60e12edffde6c34a666112d66dce3c482c7dafc998f7e0d3cba5e5f08f45bdbb5da87d1833ea757e6713ab1cf0f4d57dc
-
Filesize
11KB
MD57a67e1b185f738d8f1076ef43cdf08a3
SHA107d5e5bf24eabd1ddf6a229d9a625e1a57d25c79
SHA256042bcdd7691df8a5fa05948656a076a3ffd3bbee4bc8eef405852b7e1e1e899b
SHA51279557b6d2d568121c96e15bcb07736f91216f40dc2eb2b080b7cb054c0ebcd1ee1738bcf8d98efc1f80e31f86661ecb9b98b47402f80ddc1e2d452f863f87d84
-
Filesize
354KB
MD5e77a06025bf5eba2a5ea46e383bd1c33
SHA1d96f4a0901c5947a8aa99a59fce3ee3211e7ffe9
SHA256c23878c7b8f5e73c02cbf8285aa45f9b63f92dc3a2c74a0d25637e9205e0097e
SHA512cb719d49c0a5114377a5f01a5fc0bc8609d7395b0123a5bab731d2e8cc763a8717f997050a0150db7fce6c24a39f9173ccad17487e56aecff7c3b181e18aeb43