Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:27
Static task
static1
Behavioral task
behavioral1
Sample
7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69.exe
Resource
win10v2004-20241007-en
General
-
Target
7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69.exe
-
Size
537KB
-
MD5
c62d2192420264453738e947ca9fa0d2
-
SHA1
131d731b6111ad4619c8386e01696af3c37a48d3
-
SHA256
7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69
-
SHA512
12a0e53dca70e3a15c089ce730a67933cd1f0babdff4bea62649ebe998f9e67a1523aed24fd29263efbd668fe519cd5b9183501c7116ed3fb0d9d2bcfe08ebc0
-
SSDEEP
12288:yMrgy90Rg7RqJL/UzvN6UnuH0wYkHuhTj32:WydygvN6jUwO1jG
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca5-12.dat healer behavioral1/memory/1404-15-0x0000000000E90000-0x0000000000E9A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr585374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr585374.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr585374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr585374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr585374.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr585374.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4772-22-0x00000000027D0000-0x0000000002816000-memory.dmp family_redline behavioral1/memory/4772-24-0x00000000028A0000-0x00000000028E4000-memory.dmp family_redline behavioral1/memory/4772-26-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-46-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-88-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-86-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-84-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-82-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-80-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-76-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-75-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-72-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-71-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-68-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-66-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-64-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-62-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-60-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-58-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-56-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-54-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-53-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-50-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-49-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-45-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-42-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-41-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-38-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-36-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-34-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-32-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-31-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-28-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-78-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline behavioral1/memory/4772-25-0x00000000028A0000-0x00000000028DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3760 zizO8296.exe 1404 jr585374.exe 4772 ku215049.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr585374.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zizO8296.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zizO8296.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku215049.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1404 jr585374.exe 1404 jr585374.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1404 jr585374.exe Token: SeDebugPrivilege 4772 ku215049.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1728 wrote to memory of 3760 1728 7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69.exe 83 PID 1728 wrote to memory of 3760 1728 7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69.exe 83 PID 1728 wrote to memory of 3760 1728 7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69.exe 83 PID 3760 wrote to memory of 1404 3760 zizO8296.exe 84 PID 3760 wrote to memory of 1404 3760 zizO8296.exe 84 PID 3760 wrote to memory of 4772 3760 zizO8296.exe 95 PID 3760 wrote to memory of 4772 3760 zizO8296.exe 95 PID 3760 wrote to memory of 4772 3760 zizO8296.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69.exe"C:\Users\Admin\AppData\Local\Temp\7818a0b5d6e33204856431bfee885d8d0ca7488c1aae6a7166f0145737c2dc69.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizO8296.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zizO8296.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr585374.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr585374.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku215049.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku215049.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5720edf0fbd98996a348fcada80847069
SHA18525374dd269f163eb6b27d5323a813ae14587ed
SHA256ff3c73f8315bc15f51278cc334067b9d2cb415f21222226e4ab027d4b2c196cb
SHA512ff8ebab7e30a3912627280fcdc4eb3b38365c4cd96397ae5d336d87d25717defbf039ebdb0e1edb452d2534df45a1250ba8d779be5cf32c3903f3afdc3563a4d
-
Filesize
13KB
MD57a2ecc7161bb1314d8925050fd091f4a
SHA1c804a34002bcadd3541adc1065cecc86a63607a6
SHA2566b98fc86c6ef842c912cbdc00ade9d73477ae7ab593c03113857eb20bd7651ef
SHA512a29196e2b06e285e67aeeaa2dfedd964924b479ef89b48fc32293d6ac9de1efbe0527ab90883157acf7440d22f1caee1171015a7ebfd657c2d0f5f3008ab092a
-
Filesize
352KB
MD5c142ba3050940de925a364c6b61a148f
SHA1fad3b4bd59854cb1c052a1f05007410a61064a9b
SHA2566bb6604fb75c47673b4716674ebb3fca17de3e41f9e35068b0017f60a85e67c5
SHA512cd71a68d652cbb5040307d9272df8a8ef2738040bd218d069199a0fe5602723b2edd7c00cf072d14516d1f67b4f608da3a753761376c02e475b211218a95a735