Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:29
Static task
static1
Behavioral task
behavioral1
Sample
eaf6dceafab7a9c788ae5a4c4769a0564b4e6e9f63ee13c65789f62c3382951b.exe
Resource
win10v2004-20241007-en
General
-
Target
eaf6dceafab7a9c788ae5a4c4769a0564b4e6e9f63ee13c65789f62c3382951b.exe
-
Size
560KB
-
MD5
c1ade34fe3fbddfc9101ebb62bab1311
-
SHA1
75b78eba67baa6e189e24af17584050f55f221a6
-
SHA256
eaf6dceafab7a9c788ae5a4c4769a0564b4e6e9f63ee13c65789f62c3382951b
-
SHA512
2939f735d857b7b4de5cc8a7ee762f487648044bb4eade29e5fb73b668159345ff6857167de099ed861bc9030974715da36bc82a29f20908813a59a044eeea99
-
SSDEEP
12288:aMr/y90XDLq5E6rdVMkLRAC9szmiOmRQa7sDyb:Zym30/h9AjxvAw
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9e-12.dat healer behavioral1/memory/1776-15-0x0000000000630000-0x000000000063A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr921666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr921666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr921666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr921666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr921666.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr921666.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2660-22-0x00000000029F0000-0x0000000002A36000-memory.dmp family_redline behavioral1/memory/2660-24-0x0000000004E10000-0x0000000004E54000-memory.dmp family_redline behavioral1/memory/2660-26-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-38-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-88-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-86-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-84-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-82-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-78-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-76-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-74-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-72-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-70-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-68-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-66-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-64-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-62-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-60-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-58-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-56-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-54-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-52-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-50-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-46-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-44-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-43-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-40-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-36-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-34-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-32-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-30-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-28-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-80-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-48-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/2660-25-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3928 ziMc6600.exe 1776 jr921666.exe 2660 ku599977.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr921666.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" eaf6dceafab7a9c788ae5a4c4769a0564b4e6e9f63ee13c65789f62c3382951b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziMc6600.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaf6dceafab7a9c788ae5a4c4769a0564b4e6e9f63ee13c65789f62c3382951b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziMc6600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku599977.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1776 jr921666.exe 1776 jr921666.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1776 jr921666.exe Token: SeDebugPrivilege 2660 ku599977.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4728 wrote to memory of 3928 4728 eaf6dceafab7a9c788ae5a4c4769a0564b4e6e9f63ee13c65789f62c3382951b.exe 83 PID 4728 wrote to memory of 3928 4728 eaf6dceafab7a9c788ae5a4c4769a0564b4e6e9f63ee13c65789f62c3382951b.exe 83 PID 4728 wrote to memory of 3928 4728 eaf6dceafab7a9c788ae5a4c4769a0564b4e6e9f63ee13c65789f62c3382951b.exe 83 PID 3928 wrote to memory of 1776 3928 ziMc6600.exe 84 PID 3928 wrote to memory of 1776 3928 ziMc6600.exe 84 PID 3928 wrote to memory of 2660 3928 ziMc6600.exe 92 PID 3928 wrote to memory of 2660 3928 ziMc6600.exe 92 PID 3928 wrote to memory of 2660 3928 ziMc6600.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaf6dceafab7a9c788ae5a4c4769a0564b4e6e9f63ee13c65789f62c3382951b.exe"C:\Users\Admin\AppData\Local\Temp\eaf6dceafab7a9c788ae5a4c4769a0564b4e6e9f63ee13c65789f62c3382951b.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMc6600.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziMc6600.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr921666.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr921666.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku599977.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku599977.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
407KB
MD574136db1bd9669d82b47f0b05bc45dc9
SHA1298b4b4a884cbaf67ea28d9d77cfe4bb8c8ec3f6
SHA256cb146fd97f0447bea72d4b9bfb3d619ca626b90a835691d45545179b34de45e6
SHA51209bebc7eea840fab3ad5863704d9f1071a9408e3bd9ee272c58b62c00462e3badf555a92263aac6e497129c26dd30c49177867bcc009b7c7bafb0e33bb0fd70e
-
Filesize
13KB
MD5914e7b873e144b95437b71d298686f07
SHA1dd2f830bf404a52e0b16a6c1009ec0369a77aced
SHA2568014e0d69612898ef5c7605bdde14ee8e4d99c65adfdc4293b69df4683228abc
SHA5126875c705fc89022beaec88c91ca2773742d50b0cdf330cc09aa26a041426ec5c84ba634d600b70b49ff1d96bd01e509532c0be1c55738d4d625aff4ceb3efe9f
-
Filesize
370KB
MD5404f74a1345f5ba046131bf6aea73af9
SHA12deb2bf407c3c4314d2cc168dddb6bba9312d7a3
SHA25665a96f3ab4cbcd0e730c468bf0249099641a32272e4e35bf1884f4b85c9abaaa
SHA512354b2b8f089f88453a809e04c31e16e7848891f42f14dad9ddd5d70688feefac42cf319ea07d1e9dc035330aad0d1b1d106fe044d20de5beef1b67b716a9adaa