Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 14:00
Static task
static1
Behavioral task
behavioral1
Sample
b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2.exe
Resource
win10v2004-20241007-en
General
-
Target
b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2.exe
-
Size
1.0MB
-
MD5
5550a7309abbb88245dafd1290c61ed2
-
SHA1
eaab013704d5c7c963cccc645284cdda103847c1
-
SHA256
b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2
-
SHA512
dde83af235b5d3e515bb20fcca59bf8c1c551a5df567c402f812db8a7eadbb693331f22a580204b1685205f20fd350923f6befd5e22709ea076d7854850a9d48
-
SSDEEP
24576:/yMkL60tqhYfSb7cFGQ9RkI74wWPNFg0kMM/cySPK:KZ60s6KPcF9/b7wng0k9/ct
Malware Config
Extracted
redline
ramon
193.233.20.23:4123
-
auth_value
3197576965d9513f115338c233015b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b7e-27.dat healer behavioral1/memory/4424-28-0x0000000000130000-0x000000000013A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ikn67Wl47.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection ikn67Wl47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ikn67Wl47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ikn67Wl47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ikn67Wl47.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ikn67Wl47.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4144-34-0x0000000002290000-0x00000000022D6000-memory.dmp family_redline behavioral1/memory/4144-36-0x00000000029A0000-0x00000000029E4000-memory.dmp family_redline behavioral1/memory/4144-44-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-100-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-98-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-94-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-90-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-88-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-86-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-84-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-82-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-78-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-76-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-74-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-72-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-70-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-68-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-66-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-64-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-62-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-60-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-58-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-56-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-54-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-52-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-50-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-48-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-46-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-96-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-92-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-42-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-81-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-40-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-38-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4144-37-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 3452 sLE20qt88.exe 4848 sly79bK52.exe 1160 sTC30Ht18.exe 4424 ikn67Wl47.exe 4144 kXY44wj96.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" ikn67Wl47.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sLE20qt88.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sly79bK52.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" sTC30Ht18.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2416 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sLE20qt88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sly79bK52.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sTC30Ht18.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kXY44wj96.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4424 ikn67Wl47.exe 4424 ikn67Wl47.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4424 ikn67Wl47.exe Token: SeDebugPrivilege 4144 kXY44wj96.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1508 wrote to memory of 3452 1508 b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2.exe 85 PID 1508 wrote to memory of 3452 1508 b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2.exe 85 PID 1508 wrote to memory of 3452 1508 b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2.exe 85 PID 3452 wrote to memory of 4848 3452 sLE20qt88.exe 86 PID 3452 wrote to memory of 4848 3452 sLE20qt88.exe 86 PID 3452 wrote to memory of 4848 3452 sLE20qt88.exe 86 PID 4848 wrote to memory of 1160 4848 sly79bK52.exe 87 PID 4848 wrote to memory of 1160 4848 sly79bK52.exe 87 PID 4848 wrote to memory of 1160 4848 sly79bK52.exe 87 PID 1160 wrote to memory of 4424 1160 sTC30Ht18.exe 88 PID 1160 wrote to memory of 4424 1160 sTC30Ht18.exe 88 PID 1160 wrote to memory of 4144 1160 sTC30Ht18.exe 97 PID 1160 wrote to memory of 4144 1160 sTC30Ht18.exe 97 PID 1160 wrote to memory of 4144 1160 sTC30Ht18.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2.exe"C:\Users\Admin\AppData\Local\Temp\b53b4df569bc4960d4f2bf534d920df44daab0e4a015f85f36db486bbf2bc7c2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sLE20qt88.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sLE20qt88.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sly79bK52.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sly79bK52.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sTC30Ht18.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sTC30Ht18.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ikn67Wl47.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ikn67Wl47.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kXY44wj96.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kXY44wj96.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:2416
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
887KB
MD57b69ced84c7a17c42028c6b35783f822
SHA1a400faebc4cca36370d911b00ef2d675de01094e
SHA2563afeb1af5cd6301663d25cb9a27d3bc9217b485ef3e0cb7714703b8239839705
SHA512ca517a884385d9548ca9e03f6f9c5e041de2bef839f4b365cc6a30de2fe91cd4627204a9c3721b05585c931edeb9f4fd6ec7e0c0b0f50a50bc17d36c166de743
-
Filesize
663KB
MD5a705c5bef8eb11a495cd9ac444c2e5c3
SHA1d874933a095ced64213dfd2ba43777fd9f4b9ebe
SHA25659680b477dc3972d0dabb35efa5f5b98de5a7765f77f8c90bfe442fa0463a7e8
SHA512dd4726d41a5c9457686da2873254e9b1d05183c039aa10d1e67681c571281b8eb5c3575a9f2ade4888db2fd7dce730d7eb9af207f59c14dd4f79f14a327327c8
-
Filesize
389KB
MD59a0baf1e5cbf3b8ea40660e69544e85c
SHA14aabe086d05aeafb73dd955b30876b07284f1071
SHA25666fe7a1bff698794541d4123bfb204b76f716f51ce6d9a25927384aedcc48fe4
SHA512874b3f89b98b5dbb18fab1bd2c89d6be7a4f4c2e0f784f50420a4be768578da0e1abeea999cc4d30805ea913bba897869a18e8a12adf3e604b8b03b1331010af
-
Filesize
11KB
MD5828300f560feecb4cdbb1c53e220b99f
SHA170ceed854594307ab357352ee2ef6fbbd78203c7
SHA2567a323fd196a22a4dc019537701e2621889456e707ea805606449b285a6ccd993
SHA5121655f113637c0458af6984dbcba500e78890c4ab3ece61a7c2554498233b230ce312acb4d902bb6e68593c04c21ee6ac2b38950db572823cb42b9d363d2b4c49
-
Filesize
308KB
MD5268eb6c29660b671081e908c7edff532
SHA1e43f244273c197c44bb8bc7ad1ae2583545724bf
SHA25644dcf8fd0be32702a4246205f7ac38abfed0f072fa42bbe79044476c5f2903d0
SHA512a141e4bdedfcd313468ac3a967ed9a866efc5db3d060edeaa409f1fb278f02595921480192b0b43d02cc18fd2872ac045af2f01c86660d40b6b2f527074a3689