Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:03
Static task
static1
Behavioral task
behavioral1
Sample
c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d.exe
Resource
win10v2004-20241007-en
General
-
Target
c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d.exe
-
Size
559KB
-
MD5
ec5bd8c7ab57f2ea648392a8ccb88620
-
SHA1
c1f85dd1559e3e623a9ecc08c46135c9552bc744
-
SHA256
c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d
-
SHA512
f9a1a989f2be8421a08d0bb59a47a0ab859d82929c446d2248c92fc86c6ce328f68ea68925d62a844640b1367636ccf16f8bca07464b276a832b52744a79f11b
-
SSDEEP
12288:IMrey90il5ydxTS7E3Q/XWmYaggHMn76+jGAOwXPQL:2yh1E3GXWmggHM7pjGAOxL
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b86-12.dat healer behavioral1/memory/4592-15-0x00000000006D0000-0x00000000006DA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr725993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr725993.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr725993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr725993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr725993.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr725993.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1440-22-0x00000000028B0000-0x00000000028F6000-memory.dmp family_redline behavioral1/memory/1440-24-0x0000000004F60000-0x0000000004FA4000-memory.dmp family_redline behavioral1/memory/1440-28-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-48-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-88-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-87-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-84-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-82-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-81-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-78-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-76-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-74-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-72-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-70-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-66-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-64-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-62-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-60-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-56-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-54-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-52-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-50-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-46-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-44-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-42-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-40-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-38-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-36-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-34-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-32-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-30-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-68-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-58-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-26-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline behavioral1/memory/1440-25-0x0000000004F60000-0x0000000004F9F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3892 ziZh6558.exe 4592 jr725993.exe 1440 ku700226.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr725993.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziZh6558.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziZh6558.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku700226.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4592 jr725993.exe 4592 jr725993.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4592 jr725993.exe Token: SeDebugPrivilege 1440 ku700226.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 468 wrote to memory of 3892 468 c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d.exe 83 PID 468 wrote to memory of 3892 468 c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d.exe 83 PID 468 wrote to memory of 3892 468 c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d.exe 83 PID 3892 wrote to memory of 4592 3892 ziZh6558.exe 85 PID 3892 wrote to memory of 4592 3892 ziZh6558.exe 85 PID 3892 wrote to memory of 1440 3892 ziZh6558.exe 96 PID 3892 wrote to memory of 1440 3892 ziZh6558.exe 96 PID 3892 wrote to memory of 1440 3892 ziZh6558.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d.exe"C:\Users\Admin\AppData\Local\Temp\c63bff4eb8c2a238155bfbed3266e79a0098385f6788a84b13a716a572c1112d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZh6558.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZh6558.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr725993.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr725993.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku700226.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku700226.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
406KB
MD51a6e09aee4d4e9113c2b054f3080fff7
SHA1038e4d43d35ac2c8134a954e0d021e9adccf1e36
SHA25638f83e22e46aadd55420928d13a89fb3841bbe433b4a51756526e49d71eb2dd0
SHA51251346de53fc7eda2d1ac519780efe9b28445d31d3b68974463ffe4e0675eb0b1548b9588e7d32d5d050c38776b0434b8627b701e87153f4135603a4cb166c8d3
-
Filesize
12KB
MD52409ccd03a3e9266e4b66a66be7a841c
SHA1773e5debb739acba20758001c32fe04a78ac8fe9
SHA2562e04747fbfb910be1b4b7208a5142f76314878cc6d0fb3e9707d59c2b79ae777
SHA512dfd3d51714eafe0c20e38ea02884c4380cfb4ad7b29b0bda1357cd18087455df5ed9772813f91e7aa3acb81a8bff9361ad217aa395045be3db646b12dd14e8a2
-
Filesize
370KB
MD5a2c653bca75e882a43217087d6c4a454
SHA11536b1c267dcfadcb2b563abd02abc5f43eabca8
SHA25684d781b3ed55af89ea73f33f45a0836281effd8524777b1cab3ff33f2679ed8b
SHA5128daaec894884c06321b6f17b0859cd4d0ae067ef0cf141643959f7433b3525e16577a05d79ea03e10b235d5f26b73d98d086cc54f1e7f001fe94eb569d1e9827