Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:54
Static task
static1
Behavioral task
behavioral1
Sample
cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1.exe
Resource
win10v2004-20241007-en
General
-
Target
cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1.exe
-
Size
529KB
-
MD5
20d8d3e4ac22b3f425a108860ba65be7
-
SHA1
8ca180adfeacc7843b50df5dc1d67d6576d44776
-
SHA256
cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1
-
SHA512
f93f6a676f1846fa98e414f4e6257a62f4fde1e98ec966c5f6b9511074014feddd4f81cbc8ae5db3e6b73550548cec8060c0e0aaa7414b56b643ac54066a57b8
-
SSDEEP
6144:KCy+bnr+Rp0yN90QEhccxdkbq1WA9FFhQMtqJ/YCanOPRFQ49jFiHvbXW6MJeV7h:mMrZy90HfxZWlJ/G3mIHvbTz7h
Malware Config
Extracted
redline
rulit
pedigj.eu:4162
-
auth_value
f4df9ef56871d4ac883b282abaf635e0
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cab-12.dat healer behavioral1/memory/4324-15-0x00000000000E0000-0x00000000000EA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sf43DH52xo54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sf43DH52xo54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sf43DH52xo54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sf43DH52xo54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sf43DH52xo54.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sf43DH52xo54.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1260-22-0x00000000024B0000-0x00000000024F6000-memory.dmp family_redline behavioral1/memory/1260-24-0x0000000002890000-0x00000000028D4000-memory.dmp family_redline behavioral1/memory/1260-52-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-89-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-86-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-84-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-82-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-80-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-78-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-76-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-74-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-72-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-68-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-66-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-64-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-62-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-60-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-56-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-54-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-50-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-48-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-46-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-44-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-42-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-40-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-38-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-36-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-34-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-32-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-30-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-28-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-26-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-70-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-58-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/1260-25-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2256 vhAp3874uA.exe 4324 sf43DH52xo54.exe 1260 tf86uB15iA63.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sf43DH52xo54.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vhAp3874uA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5460 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vhAp3874uA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tf86uB15iA63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4324 sf43DH52xo54.exe 4324 sf43DH52xo54.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4324 sf43DH52xo54.exe Token: SeDebugPrivilege 1260 tf86uB15iA63.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2256 2864 cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1.exe 84 PID 2864 wrote to memory of 2256 2864 cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1.exe 84 PID 2864 wrote to memory of 2256 2864 cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1.exe 84 PID 2256 wrote to memory of 4324 2256 vhAp3874uA.exe 85 PID 2256 wrote to memory of 4324 2256 vhAp3874uA.exe 85 PID 2256 wrote to memory of 1260 2256 vhAp3874uA.exe 94 PID 2256 wrote to memory of 1260 2256 vhAp3874uA.exe 94 PID 2256 wrote to memory of 1260 2256 vhAp3874uA.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1.exe"C:\Users\Admin\AppData\Local\Temp\cc66615528694b36aef5a482dc65cac1b017fbbebfe8b40b409ad0e5ac3247b1.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhAp3874uA.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vhAp3874uA.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf43DH52xo54.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sf43DH52xo54.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4324
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf86uB15iA63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tf86uB15iA63.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5460
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD5af3dc313c59df3c40713eced08dd427f
SHA1d073cf22d6ba5109cc68455295510d5c2ec4a2fb
SHA256a904e939f352f4e92f07e8d09528142841ed33a23c6607e81fb7d4bfcf490529
SHA512ebdaccef1e415c68971633bd40a056ace4a04a3657a8cb6ffcfb2b9fbc2f0fbbc01b8ed1b329a364cfb9e785c1b15f76ed4978edfbd3a0e5a6978179796d20de
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
364KB
MD55e67eb7edcaace5d899b76dde9ebf3fc
SHA1b10b57155d4ac2a83e78216f4a7d44b372a4379a
SHA256eefd6accb089c16eec0d44a0e37497f0b25ded905bc3da4706d0e00fc099a117
SHA5129a5489adaf0f449734d0e78b129117232eac6d1693a6b13cedfbe4a4fede13d5ae753a83508ae0d803612d841b712231d9711fb9476c397973b97d0f9183fef4