Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:06
Static task
static1
Behavioral task
behavioral1
Sample
67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559.exe
Resource
win10v2004-20241007-en
General
-
Target
67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559.exe
-
Size
537KB
-
MD5
d50b34d1e23ba5898eb25ea760ac068e
-
SHA1
1feb59ea9916f26e44786d44a210d4a3efe5db02
-
SHA256
67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559
-
SHA512
39de364f05e28922751bf5ba794cb4f2cadd32b4295e187f0303fa87c23743d1eb5c5d61851f20f9a24d1b37f24625c352edf2a451dc3488ebeb4863c1a34742
-
SSDEEP
12288:aMrSy90Kue6DMGI0CCOrU92H2w/0x9Dhk:sy96CCOrLWw/oDe
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b8a-12.dat healer behavioral1/memory/2428-15-0x0000000000CD0000-0x0000000000CDA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr029534.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr029534.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr029534.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr029534.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr029534.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr029534.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2776-22-0x00000000028A0000-0x00000000028E6000-memory.dmp family_redline behavioral1/memory/2776-24-0x0000000004DE0000-0x0000000004E24000-memory.dmp family_redline behavioral1/memory/2776-74-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-78-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-88-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-86-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-84-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-82-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-80-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-76-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-72-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-70-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-69-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-64-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-62-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-60-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-58-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-56-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-54-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-52-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-50-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-48-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-46-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-44-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-42-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-40-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-38-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-36-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-34-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-32-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-66-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-30-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-28-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-26-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline behavioral1/memory/2776-25-0x0000000004DE0000-0x0000000004E1F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 116 ziWL2754.exe 2428 jr029534.exe 2776 ku735396.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr029534.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziWL2754.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziWL2754.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku735396.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2428 jr029534.exe 2428 jr029534.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2428 jr029534.exe Token: SeDebugPrivilege 2776 ku735396.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4576 wrote to memory of 116 4576 67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559.exe 83 PID 4576 wrote to memory of 116 4576 67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559.exe 83 PID 4576 wrote to memory of 116 4576 67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559.exe 83 PID 116 wrote to memory of 2428 116 ziWL2754.exe 84 PID 116 wrote to memory of 2428 116 ziWL2754.exe 84 PID 116 wrote to memory of 2776 116 ziWL2754.exe 97 PID 116 wrote to memory of 2776 116 ziWL2754.exe 97 PID 116 wrote to memory of 2776 116 ziWL2754.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559.exe"C:\Users\Admin\AppData\Local\Temp\67c5e4f787d58d5be08a6d98bd05a4dad0ecfd299544a2d5a8cf8d4ec1c22559.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWL2754.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWL2754.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr029534.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr029534.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku735396.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku735396.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5ec6e3df0e6cb23bd288e65b5342a8dfd
SHA1ca4aea659b0efabbab44731151c7e137a6ceefba
SHA256e629d08fcd30dc61edb1901660c44735776d8e81b166b382709ae9bd130acbbd
SHA51211e83eb03b61478eb3d6ef9cd42ab9f6f8caa1b76eaecb1ea8cdaa0991d69be13369ee1f404cacef7b35b7112086ca5cb0d243b4fdd08838828cd4a6d69b1c6c
-
Filesize
14KB
MD52e556c8af88a8f888fb74141a9c8da61
SHA1a1d93813e96226766562cc3d3909f9f0265bf7ff
SHA2560dc48b89020f6bce79e98e90488f42f562b91202d2017ad9d58aee93ff3745bb
SHA5123912d3689877b6bd1793a116df8d9b1ab12dcb04e3a4b7e12c78219778a1c5d149f2d1587adb62360f399df69b05e12b03f918cab617b4e89020210b123a7795
-
Filesize
352KB
MD5b1cb28f242072bec47cc5f5b50fdf042
SHA1e4a534149b883e48800c48afc5cdef1982938ad6
SHA256b1ed975eb3a33a178fdec093e0a121c1d417ff459050701e677048db4481ecec
SHA512d39631e78724235af0ad5a56797b01d917041fed5a390511ea317c0a4c83ffd47dc1677e30c9fab37937ea3ccefbd9ff6436a7f68089f70218f01a58e5f3ba59