Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 08:04
Static task
static1
Behavioral task
behavioral1
Sample
3ee13696244a657d1c49765ff52299f7823b03383eda0e664bafd7651ac2f95aN.exe
Resource
win10v2004-20241007-en
General
-
Target
3ee13696244a657d1c49765ff52299f7823b03383eda0e664bafd7651ac2f95aN.exe
-
Size
536KB
-
MD5
7e896c54db3618d1e0139bd0a0c6f4d0
-
SHA1
9d8d03dfe95bdf3b1d8bc419220ad787b0dabfe8
-
SHA256
3ee13696244a657d1c49765ff52299f7823b03383eda0e664bafd7651ac2f95a
-
SHA512
01c272d483b54aee1ec98a82092d68eecfcb93150d4a5b2f6b80331524fb8d825f960b002ec5506ebc1994f83697dc48f1526d233a278d01b5054a11cbb227e2
-
SSDEEP
12288:6MrXy905KzzO8KWrseWluoNdzfg4ZLDbqkrQEfJhcwN:pyCK/fhd8BNdxZHbX/N
Malware Config
Extracted
redline
rosn
176.113.115.145:4125
-
auth_value
050a19e1db4d0024b0f23b37dcf961f4
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b8b-12.dat healer behavioral1/memory/1372-15-0x0000000000260000-0x000000000026A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" jr486165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" jr486165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" jr486165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" jr486165.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" jr486165.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection jr486165.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4860-22-0x00000000027F0000-0x0000000002836000-memory.dmp family_redline behavioral1/memory/4860-24-0x0000000005410000-0x0000000005454000-memory.dmp family_redline behavioral1/memory/4860-38-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-50-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-88-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-87-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-84-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-82-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-80-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-78-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-76-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-72-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-70-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-68-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-67-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-64-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-62-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-60-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-58-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-54-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-52-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-48-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-46-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-44-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-42-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-40-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-36-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-34-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-32-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-74-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-57-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-30-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-28-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-26-0x0000000005410000-0x000000000544F000-memory.dmp family_redline behavioral1/memory/4860-25-0x0000000005410000-0x000000000544F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4920 zioA5875.exe 1372 jr486165.exe 4860 ku043443.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" jr486165.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3ee13696244a657d1c49765ff52299f7823b03383eda0e664bafd7651ac2f95aN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" zioA5875.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3ee13696244a657d1c49765ff52299f7823b03383eda0e664bafd7651ac2f95aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zioA5875.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ku043443.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1372 jr486165.exe 1372 jr486165.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1372 jr486165.exe Token: SeDebugPrivilege 4860 ku043443.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4932 wrote to memory of 4920 4932 3ee13696244a657d1c49765ff52299f7823b03383eda0e664bafd7651ac2f95aN.exe 83 PID 4932 wrote to memory of 4920 4932 3ee13696244a657d1c49765ff52299f7823b03383eda0e664bafd7651ac2f95aN.exe 83 PID 4932 wrote to memory of 4920 4932 3ee13696244a657d1c49765ff52299f7823b03383eda0e664bafd7651ac2f95aN.exe 83 PID 4920 wrote to memory of 1372 4920 zioA5875.exe 84 PID 4920 wrote to memory of 1372 4920 zioA5875.exe 84 PID 4920 wrote to memory of 4860 4920 zioA5875.exe 86 PID 4920 wrote to memory of 4860 4920 zioA5875.exe 86 PID 4920 wrote to memory of 4860 4920 zioA5875.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ee13696244a657d1c49765ff52299f7823b03383eda0e664bafd7651ac2f95aN.exe"C:\Users\Admin\AppData\Local\Temp\3ee13696244a657d1c49765ff52299f7823b03383eda0e664bafd7651ac2f95aN.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioA5875.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zioA5875.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486165.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486165.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1372
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku043443.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku043443.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD543390c2754960030c370eacb75b2975a
SHA111d001592240f714698565c10e2817b69caeb21d
SHA25636e15883068bbc16bb2a9bf9165907353a493d72b3d49484e969f114fc97b512
SHA512fa5671574f20ee1cf80b15013325e24f830b3b87546cb5df9e12edd0db1a44fd227529dc944bf552dd911ae64902acce4bdc11a5364bbaa86bce56fafaa7436d
-
Filesize
13KB
MD54ecbba448e5a9a2e96b1a1c56e2ccdbb
SHA1d0ae7e0258496ab49656a6048a81dd7c285609ad
SHA25618408933b4dc3bf8a324c3b274a309f348f234074b159af02e52b023cc80e907
SHA51292c5b9c06e1a6fa7341820491b43080a3e99407a6de4f9b66fe54098c5b1105d7ecb959145f31a36f15bb657efce23d8fd0f942e31a421f27d6ba9776dbd766a
-
Filesize
353KB
MD5ba4a6637a0c3a13e1a8e612fe20003fd
SHA10391461cc8e227dfb73bd672fffbc8b03392d77f
SHA256d3ad11481cdc2f269dfd0a952e82305de2872b08f7bd23c66f382de8bb7739bd
SHA5126df1f06f807a7941551e666469e1915610870454ec0472c2c804adc32580b1fd90a06ca203d0f9c28f3f48f84b5b181a7a053dedb9890a21984d3b50437457e8