Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 02:47
Static task
static1
Behavioral task
behavioral1
Sample
48659c2b5a430d42f23e87ba1de60280bddef602aec9f9a2534a069bd5b8184a.exe
Resource
win10v2004-20241007-en
General
-
Target
48659c2b5a430d42f23e87ba1de60280bddef602aec9f9a2534a069bd5b8184a.exe
-
Size
529KB
-
MD5
d118f94ddb3d4a2e49d21541686e963f
-
SHA1
f2e603673bcc83dd182d1dac5d1f16b0611502d2
-
SHA256
48659c2b5a430d42f23e87ba1de60280bddef602aec9f9a2534a069bd5b8184a
-
SHA512
9dc8f573392933bf13fcfd97cd8b8157e235d0f9683386b25bcbb5d04f9227b85707032bb5c079f4474ec23567b8fe2810a2378954d66a5721d31029f74d7a35
-
SSDEEP
12288:sMray90wtQi05WaY0OPMFc35rI7OehOj1Ow8rarKVRP:uyjt6I7MFyLIOj1Luj
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b99-12.dat healer behavioral1/memory/368-15-0x0000000000B40000-0x0000000000B4A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr488918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr488918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr488918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr488918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr488918.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr488918.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4972-22-0x0000000002710000-0x0000000002756000-memory.dmp family_redline behavioral1/memory/4972-24-0x0000000004E10000-0x0000000004E54000-memory.dmp family_redline behavioral1/memory/4972-40-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-64-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-86-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-84-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-82-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-80-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-78-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-76-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-74-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-70-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-68-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-66-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-62-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-61-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-58-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-56-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-54-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-52-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-50-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-48-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-46-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-44-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-42-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-38-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-36-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-34-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-32-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-88-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-72-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-30-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-28-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-26-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline behavioral1/memory/4972-25-0x0000000004E10000-0x0000000004E4F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 1280 zick1236.exe 368 jr488918.exe 4972 ku848118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr488918.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 48659c2b5a430d42f23e87ba1de60280bddef602aec9f9a2534a069bd5b8184a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zick1236.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48659c2b5a430d42f23e87ba1de60280bddef602aec9f9a2534a069bd5b8184a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zick1236.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku848118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 368 jr488918.exe 368 jr488918.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 368 jr488918.exe Token: SeDebugPrivilege 4972 ku848118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2160 wrote to memory of 1280 2160 48659c2b5a430d42f23e87ba1de60280bddef602aec9f9a2534a069bd5b8184a.exe 83 PID 2160 wrote to memory of 1280 2160 48659c2b5a430d42f23e87ba1de60280bddef602aec9f9a2534a069bd5b8184a.exe 83 PID 2160 wrote to memory of 1280 2160 48659c2b5a430d42f23e87ba1de60280bddef602aec9f9a2534a069bd5b8184a.exe 83 PID 1280 wrote to memory of 368 1280 zick1236.exe 84 PID 1280 wrote to memory of 368 1280 zick1236.exe 84 PID 1280 wrote to memory of 4972 1280 zick1236.exe 93 PID 1280 wrote to memory of 4972 1280 zick1236.exe 93 PID 1280 wrote to memory of 4972 1280 zick1236.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\48659c2b5a430d42f23e87ba1de60280bddef602aec9f9a2534a069bd5b8184a.exe"C:\Users\Admin\AppData\Local\Temp\48659c2b5a430d42f23e87ba1de60280bddef602aec9f9a2534a069bd5b8184a.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zick1236.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zick1236.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr488918.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr488918.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku848118.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku848118.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
387KB
MD5c0316c2a302c71f2896e196c0e796cfd
SHA17e3ff1acb634e5f7a4efee89c5f8e72c7176b205
SHA256a47ec0e8a355bd047ef14dffceb0dc8c8bc71d502d68cdb18ad55590a1908963
SHA51278b3e55a8f6841760c673850253062e2e37973d95132f096d3afc2b65fd27cbdff496b8c702744f3c70f9250ce31cf3eb82577e90a0552cf4543b056dd596454
-
Filesize
12KB
MD59a52e0cd4bbb26ddbf4776c52bbad1b4
SHA1f85cbbdb854aa8e1db8940e7e8eb2a42731d68fd
SHA256daef1e12f0d48cbb069cc8cdb8bf2f3f67281501fd2a1102a5c1f43c350ed2e1
SHA51257b5e45bc7bcc7f12be28dc2800b81faaba9d22cd49182a7836084798b45218820ab121aeec2c100289a3fd5bc1ca55632f2511f54480b0d8f2e55ad7b02be10
-
Filesize
353KB
MD5005b79cf30833511f68f06ad2739073a
SHA13413ef451ceaf85736eadb52df861d093577af6b
SHA256247de288c0d1d59f5d51952f401cf43a308a64b8b9dc3a1e2c8d00bc23eb81b2
SHA5125ae9e30865ebfbc1f4837061631fc4f02496346cbdd61f17762b648f6695426f3516dfd596619174c7a513f7929f41c36f86c06689142deea8b7a546f51bdcf7