Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c.exe
Resource
win10v2004-20241007-en
General
-
Target
e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c.exe
-
Size
559KB
-
MD5
6e98f4137ff00a17797f3bd256ef4695
-
SHA1
d37295610102bfca21c449e0da66cf996368f12a
-
SHA256
e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c
-
SHA512
f7ff390dafb25011904d07af00d3f90e2577c9af7202152d5c44416d0f616096fd03f0c2c2c80b583585e117c3edc56cdc341e7d69d3b3f9ec99f2dca0a30157
-
SSDEEP
12288:qMrSy90noxlNbclS+gf10eF+PW+320DDd4aO:cyXlVwSBfsPWAtDDyaO
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb8-12.dat healer behavioral1/memory/2592-15-0x0000000000CD0000-0x0000000000CDA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr448237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr448237.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr448237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr448237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr448237.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr448237.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3476-21-0x00000000026E0000-0x0000000002726000-memory.dmp family_redline behavioral1/memory/3476-23-0x0000000002AA0000-0x0000000002AE4000-memory.dmp family_redline behavioral1/memory/3476-27-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-25-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-24-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-79-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-57-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-39-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-87-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-85-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-83-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-81-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-77-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-75-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-73-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-72-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-69-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-67-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-65-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-63-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-61-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-59-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-55-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-53-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-51-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-49-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-47-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-45-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-43-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-41-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-37-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-35-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-33-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-31-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline behavioral1/memory/3476-30-0x0000000002AA0000-0x0000000002ADF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2784 ziVD2245.exe 2592 jr448237.exe 3476 ku143718.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr448237.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziVD2245.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5616 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziVD2245.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku143718.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2592 jr448237.exe 2592 jr448237.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2592 jr448237.exe Token: SeDebugPrivilege 3476 ku143718.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3156 wrote to memory of 2784 3156 e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c.exe 83 PID 3156 wrote to memory of 2784 3156 e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c.exe 83 PID 3156 wrote to memory of 2784 3156 e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c.exe 83 PID 2784 wrote to memory of 2592 2784 ziVD2245.exe 84 PID 2784 wrote to memory of 2592 2784 ziVD2245.exe 84 PID 2784 wrote to memory of 3476 2784 ziVD2245.exe 93 PID 2784 wrote to memory of 3476 2784 ziVD2245.exe 93 PID 2784 wrote to memory of 3476 2784 ziVD2245.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c.exe"C:\Users\Admin\AppData\Local\Temp\e03e04e6fd6407b1234992276c03903b4220562fdf32de0867eaba9db45c113c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVD2245.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziVD2245.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr448237.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr448237.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku143718.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku143718.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3476
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5616
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD5084c847a984e94bdccee673c2474130d
SHA15928444489795957ad3fd39b7d2f260d3afe80cf
SHA25627a4ccf51061f94617fe7689787d2493888a0bc5d570b0b4af3589ee80932f96
SHA5127ad4a8e4fe0cb4d0c343c0de61f795e41e37aba386e565c6b93fa2e141e79b4202fa057b7e633079fa8c25bd5226e1b6d6e9fd80c647ab1414c714679dde1dd8
-
Filesize
13KB
MD5e0eb0a22b5029993751042ed80b22e06
SHA178cd2c8be1132cd38c931e443f721ad441e63445
SHA2569f4206ad23be61cc5c24208110b08ccec3e4f8c312860e9ae01add021b3dc369
SHA512e1fb5d8dcbfa63530b4b339fe2a73756a5924dee642c772a0003f171cd71f7d96f663da4394c0e98bebe48bfa361496596f781ebbfc74c529d41375db6e6290a
-
Filesize
370KB
MD5f279dc04fb7df9942cd257c569ea7a03
SHA1e180ff1e2163d07628a753a1dc9b7c557333472e
SHA256ffdf091b20088008d4a76797901845e21ab3b3accd1c824a5c4a4dff6a07c61c
SHA5125ed3e5ce7a096c382e2ee994a4ed92c6080f26cc8775d635c052efa6fb600f07eaee1544d60fa858919d9f4f89981ab2e3264c59e4fc1b5faf7f37bcd33419d3