Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
bfa6a358bc1d5f97f6fe5a93f96153f9bc831f5959d7fc5ebbfcb3aa1c5cf2c8.exe
Resource
win10v2004-20241007-en
General
-
Target
bfa6a358bc1d5f97f6fe5a93f96153f9bc831f5959d7fc5ebbfcb3aa1c5cf2c8.exe
-
Size
534KB
-
MD5
39344fa7272b175fcfddf62463027dfc
-
SHA1
f0bda7dec2dec1655f221ed8b166e71656b324dd
-
SHA256
bfa6a358bc1d5f97f6fe5a93f96153f9bc831f5959d7fc5ebbfcb3aa1c5cf2c8
-
SHA512
874f1234e5425c5e2ae6e222eeaa271e93dd1a3929951c45aabe531183b5cb1869bcf6c712cd07222717e127bf9c4d98a422f6167b02f33aa49cd6790e16adc8
-
SSDEEP
12288:aMrSy90vK/kV3bRazEwDVF3tlmObgr27Vs0e:8yJcVchF3tvbZ5E
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c96-12.dat healer behavioral1/memory/3660-15-0x0000000000FB0000-0x0000000000FBA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr963673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr963673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr963673.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr963673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr963673.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr963673.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3428-22-0x0000000002560000-0x00000000025A6000-memory.dmp family_redline behavioral1/memory/3428-24-0x00000000050B0000-0x00000000050F4000-memory.dmp family_redline behavioral1/memory/3428-72-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-84-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-88-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-86-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-82-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-80-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-78-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-76-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-74-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-70-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-68-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-66-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-64-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-60-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-58-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-56-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-54-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-52-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-48-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-46-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-44-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-42-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-40-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-38-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-36-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-34-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-32-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-30-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-28-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-26-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-25-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-62-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline behavioral1/memory/3428-50-0x00000000050B0000-0x00000000050EF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1700 ziZd0991.exe 3660 jr963673.exe 3428 ku767220.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr963673.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" bfa6a358bc1d5f97f6fe5a93f96153f9bc831f5959d7fc5ebbfcb3aa1c5cf2c8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziZd0991.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfa6a358bc1d5f97f6fe5a93f96153f9bc831f5959d7fc5ebbfcb3aa1c5cf2c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziZd0991.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku767220.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3660 jr963673.exe 3660 jr963673.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3660 jr963673.exe Token: SeDebugPrivilege 3428 ku767220.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1700 2344 bfa6a358bc1d5f97f6fe5a93f96153f9bc831f5959d7fc5ebbfcb3aa1c5cf2c8.exe 83 PID 2344 wrote to memory of 1700 2344 bfa6a358bc1d5f97f6fe5a93f96153f9bc831f5959d7fc5ebbfcb3aa1c5cf2c8.exe 83 PID 2344 wrote to memory of 1700 2344 bfa6a358bc1d5f97f6fe5a93f96153f9bc831f5959d7fc5ebbfcb3aa1c5cf2c8.exe 83 PID 1700 wrote to memory of 3660 1700 ziZd0991.exe 84 PID 1700 wrote to memory of 3660 1700 ziZd0991.exe 84 PID 1700 wrote to memory of 3428 1700 ziZd0991.exe 94 PID 1700 wrote to memory of 3428 1700 ziZd0991.exe 94 PID 1700 wrote to memory of 3428 1700 ziZd0991.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfa6a358bc1d5f97f6fe5a93f96153f9bc831f5959d7fc5ebbfcb3aa1c5cf2c8.exe"C:\Users\Admin\AppData\Local\Temp\bfa6a358bc1d5f97f6fe5a93f96153f9bc831f5959d7fc5ebbfcb3aa1c5cf2c8.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZd0991.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZd0991.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr963673.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr963673.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku767220.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku767220.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
392KB
MD590f954796b5fd633dddd311f150c385b
SHA10dc8a32bb4d264c39f2d02283f9fc0981b3a28e1
SHA2563f66cfd1693f6c639f1ed7cfe1732b1413590c7d68de71b7656da772bac5fabc
SHA512fbc561237bad4c0d007c38aa192639fadf4a054df077f03b99cfbc832f00b90bb3b103d8c060f1fd2bd1a765aae74a63559eefd34adbcb0c2f936b1d3139660f
-
Filesize
11KB
MD59c7875bba80ab76652eaaf0707f6ce80
SHA1897298ea589484384bc2f10297952a680ef661b8
SHA25689c7e538387a4e94bdba09b321936c7325f5248d3dafe43fcb3568659345520f
SHA512ddb96a7eb9683aea7a1044c5be2b0374327c7b6740955d64f84a9dac9d410e3883b24b4b8d9ac981f9d6692aac7afc6d7fa8aeaffdb57d382d38827d19c17b8d
-
Filesize
318KB
MD55752276807fe923b99d26f996ac2b46c
SHA1f9d946d230c0ec5d218b3e528b9ac1c36e9e8ad1
SHA25683ed7b61aab555aaa234e06f4c9ffb8828930f3f24cf4935b5a2a86c160af8ad
SHA51204d5222a553c49cb29c20bedfaddad11ae231e302ee9a347b95390292049ddac3d2b93244fcd4823386c81fb408e24cfbc3f6995da3a54855ac12c29564bbf5f