Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 22:45
Static task
static1
Behavioral task
behavioral1
Sample
d6df4fb186892da3d769e6754f5e49f167bf06243c37d1d3d62b928642d889cfN.exe
Resource
win10v2004-20241007-en
General
-
Target
d6df4fb186892da3d769e6754f5e49f167bf06243c37d1d3d62b928642d889cfN.exe
-
Size
548KB
-
MD5
f82f0d50d786ba03de530f7721b46d10
-
SHA1
76fceb1d98f20da4d4e72260b11badbb133cf1a6
-
SHA256
d6df4fb186892da3d769e6754f5e49f167bf06243c37d1d3d62b928642d889cf
-
SHA512
be2d5408b4b8d32ce71fabcffdc51a00f0b476eb0c6db0ee253ee08942f777f20dcdea2ddfc5e81c2f7538c09eb5ebe0cbb9a0197496f364da162d9019ccd0c8
-
SSDEEP
12288:9Mrzy90ncCRzXpVxW40FfSbUj8ProDWCIj0fPJwZcD:myxCBjM4KAUjK5lcD
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c7b-12.dat healer behavioral1/memory/216-15-0x0000000000DA0000-0x0000000000DAA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr299054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr299054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr299054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr299054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr299054.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr299054.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3884-22-0x0000000002520000-0x0000000002566000-memory.dmp family_redline behavioral1/memory/3884-24-0x0000000004E20000-0x0000000004E64000-memory.dmp family_redline behavioral1/memory/3884-26-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-36-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-88-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-86-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-84-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-82-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-80-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-78-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-74-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-73-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-68-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-66-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-65-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-62-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-60-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-58-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-56-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-54-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-52-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-50-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-48-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-46-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-44-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-42-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-40-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-38-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-34-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-32-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-30-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-28-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-76-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-70-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline behavioral1/memory/3884-25-0x0000000004E20000-0x0000000004E5F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 348 ziOb5704.exe 216 jr299054.exe 3884 ku865287.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr299054.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d6df4fb186892da3d769e6754f5e49f167bf06243c37d1d3d62b928642d889cfN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" ziOb5704.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku865287.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6df4fb186892da3d769e6754f5e49f167bf06243c37d1d3d62b928642d889cfN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ziOb5704.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 216 jr299054.exe 216 jr299054.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 216 jr299054.exe Token: SeDebugPrivilege 3884 ku865287.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4500 wrote to memory of 348 4500 d6df4fb186892da3d769e6754f5e49f167bf06243c37d1d3d62b928642d889cfN.exe 85 PID 4500 wrote to memory of 348 4500 d6df4fb186892da3d769e6754f5e49f167bf06243c37d1d3d62b928642d889cfN.exe 85 PID 4500 wrote to memory of 348 4500 d6df4fb186892da3d769e6754f5e49f167bf06243c37d1d3d62b928642d889cfN.exe 85 PID 348 wrote to memory of 216 348 ziOb5704.exe 86 PID 348 wrote to memory of 216 348 ziOb5704.exe 86 PID 348 wrote to memory of 3884 348 ziOb5704.exe 97 PID 348 wrote to memory of 3884 348 ziOb5704.exe 97 PID 348 wrote to memory of 3884 348 ziOb5704.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6df4fb186892da3d769e6754f5e49f167bf06243c37d1d3d62b928642d889cfN.exe"C:\Users\Admin\AppData\Local\Temp\d6df4fb186892da3d769e6754f5e49f167bf06243c37d1d3d62b928642d889cfN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOb5704.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziOb5704.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr299054.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr299054.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku865287.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku865287.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3884
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
395KB
MD5d4d9b3cde7c33afcfbdbbb0b618e522b
SHA1f460c5af7f7e435fade50334880017486fea0f08
SHA256d0fa7885f8d4d8e44a5a7f04d352013dd4ed9085f6d18dc5bd9f7dc78fb83ee8
SHA512ba98bf74a25ee0b021363fc294af01c5063578183a727769ddf83f2ba2ffef2a76a7d67ffd95c129065afee2bfbdef57ce6d7b0c13befff61779571610a1ed7c
-
Filesize
11KB
MD5c980f9b51f735536cb17f33896f058f5
SHA18bb70679a73bf5239032ecde2bc9958f1811dbe7
SHA2568c5ce5f2fce798c91cb265b84aea50262834c4e3399d28efece531e8209a8c66
SHA5125435e6993a4bdc23e93cf3bef623cb5493d37ecf79532316f583a7f1ff2355ca676e3b1f05740a54bd8eb36c86e3169c9f5663ec5ce8bb1f363e254f4461546d
-
Filesize
348KB
MD5bf1a97937370e3bf03ca58fd9e60e546
SHA13067da4147a100f62e5e10f3fab7de0b41b6ed6b
SHA256ba5bf282ff733e7c39202532333f99c2270fa09b787da9f3f00ebff8e1594f7d
SHA512d3d5da1867785063393f78d705cf9a19075e30754625c8c91baf0678acd7e23bf9b4f0d61ad1c2b3c255fff87e52469bb6168780e4e503e7aac75d12519a02ce