Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 13:24
Static task
static1
Behavioral task
behavioral1
Sample
4202c7e993080871972cb559793872eba71c6d52fb86f9f95066330c0427e93e.exe
Resource
win10v2004-20241007-en
General
-
Target
4202c7e993080871972cb559793872eba71c6d52fb86f9f95066330c0427e93e.exe
-
Size
539KB
-
MD5
626a2f81cc53613f2bb37adf84fd7c8f
-
SHA1
bf8b037b875f427c8015b7c9854960c0dc000c22
-
SHA256
4202c7e993080871972cb559793872eba71c6d52fb86f9f95066330c0427e93e
-
SHA512
58d73af39fec127775a99838bfd39abd6d0911b9880f17006fa05e7c67bcb3009f4f3e96e177491f716764c5da7a5c74a4a185f0f3da9f3897d8bb3c528bbe05
-
SSDEEP
12288:xMrFy90V43M16o0msgXGMkw3TayGHE3n9hKbc:kyPM16o0mXw89oo
Malware Config
Extracted
redline
ruma
193.233.20.13:4136
-
auth_value
647d00dfaba082a4a30f383bca5d1a2a
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c9d-12.dat healer behavioral1/memory/4528-15-0x00000000006F0000-0x00000000006FA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection dLc60ym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dLc60ym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dLc60ym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dLc60ym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dLc60ym.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dLc60ym.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3416-22-0x0000000002580000-0x00000000025C6000-memory.dmp family_redline behavioral1/memory/3416-24-0x0000000002670000-0x00000000026B4000-memory.dmp family_redline behavioral1/memory/3416-64-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-66-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-88-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-86-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-84-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-82-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-81-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-78-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-77-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-74-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-72-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-70-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-68-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-62-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-60-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-58-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-54-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-52-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-50-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-48-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-46-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-45-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-42-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-40-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-39-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-36-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-34-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-32-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-56-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-30-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-28-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-26-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline behavioral1/memory/3416-25-0x0000000002670000-0x00000000026AE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3988 nND73hi95.exe 4528 dLc60ym.exe 3416 eXx15dF.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" dLc60ym.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4202c7e993080871972cb559793872eba71c6d52fb86f9f95066330c0427e93e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nND73hi95.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eXx15dF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4202c7e993080871972cb559793872eba71c6d52fb86f9f95066330c0427e93e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nND73hi95.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4528 dLc60ym.exe 4528 dLc60ym.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4528 dLc60ym.exe Token: SeDebugPrivilege 3416 eXx15dF.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1636 wrote to memory of 3988 1636 4202c7e993080871972cb559793872eba71c6d52fb86f9f95066330c0427e93e.exe 85 PID 1636 wrote to memory of 3988 1636 4202c7e993080871972cb559793872eba71c6d52fb86f9f95066330c0427e93e.exe 85 PID 1636 wrote to memory of 3988 1636 4202c7e993080871972cb559793872eba71c6d52fb86f9f95066330c0427e93e.exe 85 PID 3988 wrote to memory of 4528 3988 nND73hi95.exe 86 PID 3988 wrote to memory of 4528 3988 nND73hi95.exe 86 PID 3988 wrote to memory of 3416 3988 nND73hi95.exe 94 PID 3988 wrote to memory of 3416 3988 nND73hi95.exe 94 PID 3988 wrote to memory of 3416 3988 nND73hi95.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\4202c7e993080871972cb559793872eba71c6d52fb86f9f95066330c0427e93e.exe"C:\Users\Admin\AppData\Local\Temp\4202c7e993080871972cb559793872eba71c6d52fb86f9f95066330c0427e93e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nND73hi95.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nND73hi95.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dLc60ym.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dLc60ym.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eXx15dF.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eXx15dF.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3416
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD54ba92767dbfa6d953306d364eba15441
SHA1395222258420716d67be50bde0004d2fd78025a9
SHA25630a85c7f451a6a4ec0bc3c5d66d25b80af2005e5a55936da796b534f1d27387d
SHA51295142c9cfb7849165ced8a06304c023bd88dbc2c48ea848fac1110c3430c21e6f22465b2415d0ac878bffbd9db185b95507e27b7ff86f4d187d8a0370ffd5dec
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
316KB
MD50504fd8249febabd4ac60ffebf01dfc3
SHA1e060f994e98a1d39e66559ca51306ee22abe8418
SHA25613660451a83de8d2fd5b88ad2fe2b4587371dd6f8b3a18c384674bd981373399
SHA512511d2735c2b4bc27ced5d665ac3076bd2a69b66240ff416d90f3306ce5a4f8447342f6413ca5f4207393c4efc9f330d0a8cb9802325e4a4c17d72dea223de00e