Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
b2ee6d4e93977650bce4248096d981c6b85627f2373d4b0a4c11ca7dbde37009.exe
Resource
win10v2004-20241007-en
General
-
Target
b2ee6d4e93977650bce4248096d981c6b85627f2373d4b0a4c11ca7dbde37009.exe
-
Size
1.1MB
-
MD5
12baccda3a3674864e8929e8f2ed0eac
-
SHA1
bcf86526de4c15648b6270546db25b262a2d163e
-
SHA256
b2ee6d4e93977650bce4248096d981c6b85627f2373d4b0a4c11ca7dbde37009
-
SHA512
1b32ef53af7d4715a64e50c408ea55402f63201846bcfb23b2a69929e19afa5adffd12a146aff9a2fa08b14f1996b77c03b41e24070fd1c946921eac55709cd8
-
SSDEEP
24576:2yUJ9UL/yVenrBOqS46YbcMWa7gY8WGkyobWW2XuNvfp/qak3F/:FH/y4rI4nAbpkyo72Xop/Hk1
Malware Config
Extracted
redline
ramon
193.233.20.23:4123
-
auth_value
3197576965d9513f115338c233015b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b84-26.dat healer behavioral1/memory/3680-28-0x0000000000FD0000-0x0000000000FDA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection beZ54QE30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" beZ54QE30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" beZ54QE30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" beZ54QE30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" beZ54QE30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" beZ54QE30.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3112-34-0x0000000004CC0000-0x0000000004D06000-memory.dmp family_redline behavioral1/memory/3112-36-0x0000000004E50000-0x0000000004E94000-memory.dmp family_redline behavioral1/memory/3112-46-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-92-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-100-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-98-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-96-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-94-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-90-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-88-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-86-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-84-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-82-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-80-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-78-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-76-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-74-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-72-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-70-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-68-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-66-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-64-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-62-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-60-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-58-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-56-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-54-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-52-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-50-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-48-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-44-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-42-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-40-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-38-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline behavioral1/memory/3112-37-0x0000000004E50000-0x0000000004E8E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 2752 pIU14cw59.exe 448 pTj36Ma25.exe 3360 pLB20xH91.exe 3680 beZ54QE30.exe 3112 cVt48xh96.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" beZ54QE30.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b2ee6d4e93977650bce4248096d981c6b85627f2373d4b0a4c11ca7dbde37009.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" pIU14cw59.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pTj36Ma25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pLB20xH91.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2ee6d4e93977650bce4248096d981c6b85627f2373d4b0a4c11ca7dbde37009.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pIU14cw59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pTj36Ma25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pLB20xH91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cVt48xh96.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3680 beZ54QE30.exe 3680 beZ54QE30.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3680 beZ54QE30.exe Token: SeDebugPrivilege 3112 cVt48xh96.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4064 wrote to memory of 2752 4064 b2ee6d4e93977650bce4248096d981c6b85627f2373d4b0a4c11ca7dbde37009.exe 84 PID 4064 wrote to memory of 2752 4064 b2ee6d4e93977650bce4248096d981c6b85627f2373d4b0a4c11ca7dbde37009.exe 84 PID 4064 wrote to memory of 2752 4064 b2ee6d4e93977650bce4248096d981c6b85627f2373d4b0a4c11ca7dbde37009.exe 84 PID 2752 wrote to memory of 448 2752 pIU14cw59.exe 85 PID 2752 wrote to memory of 448 2752 pIU14cw59.exe 85 PID 2752 wrote to memory of 448 2752 pIU14cw59.exe 85 PID 448 wrote to memory of 3360 448 pTj36Ma25.exe 86 PID 448 wrote to memory of 3360 448 pTj36Ma25.exe 86 PID 448 wrote to memory of 3360 448 pTj36Ma25.exe 86 PID 3360 wrote to memory of 3680 3360 pLB20xH91.exe 87 PID 3360 wrote to memory of 3680 3360 pLB20xH91.exe 87 PID 3360 wrote to memory of 3112 3360 pLB20xH91.exe 96 PID 3360 wrote to memory of 3112 3360 pLB20xH91.exe 96 PID 3360 wrote to memory of 3112 3360 pLB20xH91.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2ee6d4e93977650bce4248096d981c6b85627f2373d4b0a4c11ca7dbde37009.exe"C:\Users\Admin\AppData\Local\Temp\b2ee6d4e93977650bce4248096d981c6b85627f2373d4b0a4c11ca7dbde37009.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pIU14cw59.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pIU14cw59.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pTj36Ma25.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pTj36Ma25.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pLB20xH91.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pLB20xH91.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\beZ54QE30.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\beZ54QE30.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cVt48xh96.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cVt48xh96.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
959KB
MD5b0fd52af771771f946a134eaad93b280
SHA187e40923d733ab026f4241936548e4a2a0aed226
SHA256cf9f582ae07dd85e9356924ddae7f862fea2c7bf93c3de618372c695e78807cc
SHA512fe7a0c94a2144c14008c7aa72d47fa1c7feebd042e1ba14ca973740150b41bb6fab09f0f255b45eb5e101dbe2307a6e69713c413cf2b1a376454e7bd05ab8874
-
Filesize
682KB
MD56f404fd88880bb4166918920789bf743
SHA13d48f212a2f11cb7822cbaf3c036ae5e14785220
SHA25697a92589a8d88be1e068ecc3b16da1630e9186963b5d5e2d596a27a7dfae4375
SHA5127e558eff2d00d189de1cdf9e28e3980915f6838e8ded5648ea745644c08b6623c6fa2f258b9c6add7a76655c3dcbb5ee529b285099413ab964a6c15a100757ef
-
Filesize
400KB
MD5c2c3b9540fab4666e10241716e12e3d6
SHA134b2a9b32512a4817c776f3d05bee61852ea18b0
SHA25608de35d01ee665ca7af06e142d08d311dbf92e037e64ddd4299d4752ef62b83b
SHA512d57fcb30fcfe6503bf75f5e76fd1cccff1237c27c4136685afb8571c5815bbca7073fa0c004f84ae711ed95369bf81085a872810ad7098f35078e620b33b5f50
-
Filesize
11KB
MD502b15c1d5c917784ec62fc6425cadb21
SHA1c9030ad0a162972aeaa17ce1bcd8e6b072b8f9d6
SHA25615754831b61a26a12c804fb322bc80c8311502a50776d2b981da4ab3efb421cd
SHA5123af4881b2ed07f29a63a15fe9964d396c5b37424a93a0ee5b6e5a7673efe984f7b957dc6940958eae00f3e930fcfbe2c200be66d8e2f20574ecbc31b01b30e70
-
Filesize
374KB
MD5f3855c4eadab09dffd655f592be5e9fb
SHA159f051e8d1dfd6784e4a2f84b3acf535b814009d
SHA2565f6c4ea9d0babf1692ddbdd16e61b0b70c3e3776ad1673414663104d1ce536db
SHA5122f4b3f7d9959319f4fa60bb7624465afd73f9c8e0665f4563fa04e2f5704b957d58975d9758f1d1b30bb1f02c7fa8515b2a2f8f80084d9a120142dae0fc2c4a1