Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 21:37
Static task
static1
Behavioral task
behavioral1
Sample
cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe
Resource
win10v2004-20241007-en
General
-
Target
cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe
-
Size
685KB
-
MD5
5873a2e6e767dd09b70c57b0f098cd31
-
SHA1
eaa5469600568d26ce2b0be3720cb6d4a8fdb03f
-
SHA256
cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9
-
SHA512
3438d8376e01b5b9f8301dd6fa6c488f6440a4d589d191206433a2fd2fbb14718e6d2a8b7b2a5401dfd158c3681630814924a9e10f2ba9755bb0d4986cd02f1f
-
SSDEEP
12288:fMrKy90GHnQy70dGyOJlHa4WjOrSZiZ5FEvOjJg6Mc4w2m+Y4sqYB:FylAG/Ha4dN5WGjJH4sd
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/1852-17-0x0000000004A20000-0x0000000004A3A000-memory.dmp healer behavioral1/memory/1852-20-0x0000000004CF0000-0x0000000004D08000-memory.dmp healer behavioral1/memory/1852-48-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-46-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-44-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-42-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-40-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-38-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-37-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-35-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-33-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-30-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-28-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-26-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-24-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-22-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer behavioral1/memory/1852-21-0x0000000004CF0000-0x0000000004D02000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7336.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro7336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7336.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2424-60-0x0000000004B50000-0x0000000004B96000-memory.dmp family_redline behavioral1/memory/2424-61-0x0000000007060000-0x00000000070A4000-memory.dmp family_redline behavioral1/memory/2424-75-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-95-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-93-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-91-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-89-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-88-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-85-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-84-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-81-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-79-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-77-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-73-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-71-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-70-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-67-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-66-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-63-0x0000000007060000-0x000000000709F000-memory.dmp family_redline behavioral1/memory/2424-62-0x0000000007060000-0x000000000709F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 5008 un647047.exe 1852 pro7336.exe 2424 qu9075.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro7336.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7336.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un647047.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un647047.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro7336.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9075.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1852 pro7336.exe 1852 pro7336.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1852 pro7336.exe Token: SeDebugPrivilege 2424 qu9075.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2128 wrote to memory of 5008 2128 cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe 84 PID 2128 wrote to memory of 5008 2128 cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe 84 PID 2128 wrote to memory of 5008 2128 cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe 84 PID 5008 wrote to memory of 1852 5008 un647047.exe 85 PID 5008 wrote to memory of 1852 5008 un647047.exe 85 PID 5008 wrote to memory of 1852 5008 un647047.exe 85 PID 5008 wrote to memory of 2424 5008 un647047.exe 96 PID 5008 wrote to memory of 2424 5008 un647047.exe 96 PID 5008 wrote to memory of 2424 5008 un647047.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe"C:\Users\Admin\AppData\Local\Temp\cf6817ced20824484a33856711e2518452dd161faac0c92e64fd76549a7bd4c9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un647047.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un647047.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7336.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7336.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9075.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9075.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2424
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD599a06c47eabfabd9217b63922b811f8c
SHA12d56079ada889c7dcb3bb0dd1515dd12fed203e8
SHA256306dfd2f9d2452b2ac277053d1ea743b1101dcf9bcf8e472f4ceb4d5b7f254b7
SHA5121480c6d80718fd7ba455ae170a7e6e5ec131ff63d4db589315552e0ac63a78dc8585a499303af5baf8d431d50f64a12b5e0d0ce5f6b959d89afe05b9f34ba0c0
-
Filesize
325KB
MD54f902904a145e357bab3aa0626fc81df
SHA144b1b3f8efd7ac081b706105d92fb6160d1f63e5
SHA2566795ca593e37a6f96b6ec679d9be971df0077db240ba88c8cb37c568f599bd2d
SHA512fba556f1e32b6329ebaa14016312cd38148e3b26d596309eb08f281af4db860eead966663008c330a8d8ba10fdd09ce4667bc0e098e556d0a3e9af1dae627485
-
Filesize
384KB
MD5461398ae701db529c82b245bc7acc831
SHA1eb966f74e5c02e61bcbdd4f9a5bf83e28d120d44
SHA25665ac4453bf7d95bce2e8b96247dbf95bfa30fa957c991ba9c79b522f2514903f
SHA512aa3462d826d2a7fca52248c552ddede9c6c5bccdf23bf7ae334c29b49210bdda600b1fffce853e1aa0581819b4ae42dd8497923b13eb94e648fcdf471ab9a145