Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 17:36
Static task
static1
Behavioral task
behavioral1
Sample
3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exe
Resource
win10v2004-20241007-en
General
-
Target
3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exe
-
Size
383KB
-
MD5
dabdd3319c727832122a7a8f5e94e910
-
SHA1
b21adc5fdef732b8bdd997bed0855fb38d272257
-
SHA256
3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6a
-
SHA512
56bfee4dcf847e12a9ddcdeea857ba56cd5dc0673168d38bc4bf11d07176588c9b518e77dda50a8f389bcbeefcf1c8dd29bab81b6bf62cfebdcd5c1e88cb07e4
-
SSDEEP
6144:Kay+bnr+zp0yN90QE8RVq38RJFJm5VhgUGE4D/zTHyVEsos1FUAXEGRmgQQOaS+b:OMrjy90SRc8byXhgE4D7TmEJniEGUgQm
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
Processes:
resource yara_rule behavioral1/files/0x000b000000023b9d-6.dat healer behavioral1/memory/4236-8-0x00000000007B0000-0x00000000007BA000-memory.dmp healer -
Healer family
-
Processes:
jr171688.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr171688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr171688.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr171688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr171688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr171688.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr171688.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
Processes:
resource yara_rule behavioral1/memory/5060-18-0x0000000002520000-0x0000000002566000-memory.dmp family_redline behavioral1/memory/5060-20-0x0000000004A90000-0x0000000004AD4000-memory.dmp family_redline behavioral1/memory/5060-22-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-26-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-84-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-82-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-78-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-77-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-74-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-72-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-70-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-68-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-66-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-64-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-62-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-60-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-58-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-56-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-54-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-52-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-50-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-48-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-46-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-42-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-40-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-38-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-36-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-34-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-32-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-30-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-28-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-24-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-80-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-44-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline behavioral1/memory/5060-21-0x0000000004A90000-0x0000000004ACF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 2 IoCs
Processes:
jr171688.exeku200936.exepid Process 4236 jr171688.exe 5060 ku200936.exe -
Processes:
jr171688.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr171688.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exeku200936.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku200936.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
jr171688.exepid Process 4236 jr171688.exe 4236 jr171688.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
jr171688.exeku200936.exedescription pid Process Token: SeDebugPrivilege 4236 jr171688.exe Token: SeDebugPrivilege 5060 ku200936.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exedescription pid Process procid_target PID 4556 wrote to memory of 4236 4556 3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exe 83 PID 4556 wrote to memory of 4236 4556 3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exe 83 PID 4556 wrote to memory of 5060 4556 3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exe 91 PID 4556 wrote to memory of 5060 4556 3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exe 91 PID 4556 wrote to memory of 5060 4556 3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exe"C:\Users\Admin\AppData\Local\Temp\3076f377a71b5f1f623f6d5d36b4645748a0190f42490216bb1eee5ba2424c6aN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr171688.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\jr171688.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ku200936.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ku200936.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5060
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD52f2ef334746d9d95b33a7c3571511f2d
SHA1d990ad7748a85e651aa3d66108e0ad60a28505a9
SHA256cd9cca6914abf3051c93da6abe1721100ab37c4eb6fbf8fd80228c7546601664
SHA51208e5ad3da6f6080863ceb68c8002d39229614720286193f98d7121a0bc3d6405cc3f98b81558566c8fc06c436fa68061b7707611f5be8009416fcdf17ef4fe57
-
Filesize
311KB
MD585c38fca9bd703808c47d4d809ba4f0b
SHA1b0ce0ae0944d2a0dd64627e7bab45148e46eef2d
SHA256944b2c92782cdb4b2121cd8f4b4dde9bad1bb6e28c8b3d6223585382af813b79
SHA51289568af5db4773aa9527ed4007811485f0de509c2ae2ca066f885cc3df918e6b78690ccec3918e0fddc02a4a32224466e54e94f2fdee29d68893f509241a3cca