Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
ff8b3d6785b9082c2ad8c3c949bab57764dc270cd3dc7e6a306eba673d441725.exe
Resource
win10v2004-20241007-en
General
-
Target
ff8b3d6785b9082c2ad8c3c949bab57764dc270cd3dc7e6a306eba673d441725.exe
-
Size
530KB
-
MD5
7125dd997afc9be930b94511ca54040d
-
SHA1
f61f5eb5ed1d5b462a16569646f4b5f92669485c
-
SHA256
ff8b3d6785b9082c2ad8c3c949bab57764dc270cd3dc7e6a306eba673d441725
-
SHA512
4ca8373e83771d2e6a07876a8d5abb363e7b4f8c85fcea5abe39252cb994e7c0632d4d40ec01f6cbfe3ea1808095b9a2ff32c068b2f76d29d75606c8805afa1b
-
SSDEEP
12288:WMrYy90d2vQU8TQkZRWjCTcf5KXa/Vmuaam0WVAee1dO:CyZR4WnAWmAq0dO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b81-12.dat healer behavioral1/memory/1856-15-0x0000000000030000-0x000000000003A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr937307.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr937307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr937307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr937307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr937307.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr937307.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/372-22-0x0000000004C30000-0x0000000004C76000-memory.dmp family_redline behavioral1/memory/372-24-0x00000000052D0000-0x0000000005314000-memory.dmp family_redline behavioral1/memory/372-86-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-88-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-84-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-82-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-80-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-78-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-76-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-74-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-72-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-70-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-68-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-64-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-62-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-61-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-58-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-56-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-55-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-52-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-50-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-48-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-46-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-44-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-42-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-40-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-38-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-34-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-32-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-30-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-28-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-66-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-36-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-26-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline behavioral1/memory/372-25-0x00000000052D0000-0x000000000530F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1940 ziAD6264.exe 1856 jr937307.exe 372 ku436897.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr937307.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ff8b3d6785b9082c2ad8c3c949bab57764dc270cd3dc7e6a306eba673d441725.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziAD6264.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff8b3d6785b9082c2ad8c3c949bab57764dc270cd3dc7e6a306eba673d441725.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziAD6264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku436897.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1856 jr937307.exe 1856 jr937307.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1856 jr937307.exe Token: SeDebugPrivilege 372 ku436897.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 736 wrote to memory of 1940 736 ff8b3d6785b9082c2ad8c3c949bab57764dc270cd3dc7e6a306eba673d441725.exe 85 PID 736 wrote to memory of 1940 736 ff8b3d6785b9082c2ad8c3c949bab57764dc270cd3dc7e6a306eba673d441725.exe 85 PID 736 wrote to memory of 1940 736 ff8b3d6785b9082c2ad8c3c949bab57764dc270cd3dc7e6a306eba673d441725.exe 85 PID 1940 wrote to memory of 1856 1940 ziAD6264.exe 87 PID 1940 wrote to memory of 1856 1940 ziAD6264.exe 87 PID 1940 wrote to memory of 372 1940 ziAD6264.exe 100 PID 1940 wrote to memory of 372 1940 ziAD6264.exe 100 PID 1940 wrote to memory of 372 1940 ziAD6264.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\ff8b3d6785b9082c2ad8c3c949bab57764dc270cd3dc7e6a306eba673d441725.exe"C:\Users\Admin\AppData\Local\Temp\ff8b3d6785b9082c2ad8c3c949bab57764dc270cd3dc7e6a306eba673d441725.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAD6264.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAD6264.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr937307.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr937307.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku436897.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku436897.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:372
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
388KB
MD5fbcdaa64373fcba09e643c22198e9269
SHA11cd32bc384429ffe1deef60c5d17a8df50eb3850
SHA2569a09de015ee85676101ad8e82855e27edb733ed92e355105937adbd3c6944e6c
SHA5127c1f6583b4f0816d5289ca0df3d831599c63062f39945019ad176ad3cec3dec2af552937293edad37a44fc7f850a2c6508057f69f68976d8212459b241c98826
-
Filesize
12KB
MD5397dc98d345b87247d32fe469660617d
SHA19af8b91041a6f770aedf595cd8c2a7c6e0707816
SHA256435585059224493ea5768ab88aae0f560d2ba17738bf2a54490379aadd33ba80
SHA512be9b3001ed77e9dfa8b9e0b969f29be77ab1b9212e7c057fa9304d2cc331f2b6c6001c8872e8cea912957c774098028146c574dddabc37645d694561945db8d1
-
Filesize
434KB
MD5dcc475e6c2a6c5dd37727f449b570b6b
SHA138f8d58c7a5a954d363bd2e31a45fb69401596a5
SHA2568b41d4bca0c7732f10c292360013b4e89b19ca3b9e4cb39bccea619bf25b8ef0
SHA51203e6faed8aad3de89a4f9231c87c9dc90897d12e9faf2508f78705810c1acdfb0aab9312d5ba565ad8a84e84d61ffd55109e0b51b9c25b7f418203e347d4bb3b