Analysis
-
max time kernel
143s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:30
Static task
static1
Behavioral task
behavioral1
Sample
25ca691f8cdd2ddcab793323c1d2f218e8765d730becc1d91c810cde2f474de6.exe
Resource
win10v2004-20241007-en
General
-
Target
25ca691f8cdd2ddcab793323c1d2f218e8765d730becc1d91c810cde2f474de6.exe
-
Size
686KB
-
MD5
ab4419df81011d79884effd543f5defe
-
SHA1
7297372221244a333d73059c56527335fa3ebf71
-
SHA256
25ca691f8cdd2ddcab793323c1d2f218e8765d730becc1d91c810cde2f474de6
-
SHA512
b0698215a43d2ac1d7e82f661d7c1ae98c36a339d874302f6240c1d57711db304d26d3632203bf8b6e6ef8840bff394899796e9149326279b7ffc32cabb12453
-
SSDEEP
12288:iMrky90LNChKFgDd7H4awJVK14oN2dbFolrzP4gYIpWfk66crkc:Cyfh5aJVpoELoh4gPssdc
Malware Config
Extracted
redline
sony
193.233.20.33:4125
-
auth_value
1d93d1744381eeb4fcfd7c23ffe0f0b4
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/2860-19-0x00000000009C0000-0x00000000009DA000-memory.dmp healer behavioral1/memory/2860-21-0x00000000027A0000-0x00000000027B8000-memory.dmp healer behavioral1/memory/2860-42-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-49-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-47-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-45-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-43-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-39-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-37-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-35-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-33-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-32-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-29-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-27-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-25-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-23-0x00000000027A0000-0x00000000027B2000-memory.dmp healer behavioral1/memory/2860-22-0x00000000027A0000-0x00000000027B2000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro4642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro4642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro4642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro4642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro4642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro4642.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/1820-60-0x0000000002610000-0x0000000002656000-memory.dmp family_redline behavioral1/memory/1820-61-0x0000000002810000-0x0000000002854000-memory.dmp family_redline behavioral1/memory/1820-93-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-85-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-95-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-91-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-89-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-87-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-83-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-81-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-79-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-77-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-75-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-73-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-71-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-69-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-67-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-65-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-63-0x0000000002810000-0x000000000284E000-memory.dmp family_redline behavioral1/memory/1820-62-0x0000000002810000-0x000000000284E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3120 un232953.exe 2860 pro4642.exe 1820 qu9397.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro4642.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro4642.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 25ca691f8cdd2ddcab793323c1d2f218e8765d730becc1d91c810cde2f474de6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un232953.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25ca691f8cdd2ddcab793323c1d2f218e8765d730becc1d91c810cde2f474de6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un232953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro4642.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu9397.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2860 pro4642.exe 2860 pro4642.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2860 pro4642.exe Token: SeDebugPrivilege 1820 qu9397.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 384 wrote to memory of 3120 384 25ca691f8cdd2ddcab793323c1d2f218e8765d730becc1d91c810cde2f474de6.exe 83 PID 384 wrote to memory of 3120 384 25ca691f8cdd2ddcab793323c1d2f218e8765d730becc1d91c810cde2f474de6.exe 83 PID 384 wrote to memory of 3120 384 25ca691f8cdd2ddcab793323c1d2f218e8765d730becc1d91c810cde2f474de6.exe 83 PID 3120 wrote to memory of 2860 3120 un232953.exe 84 PID 3120 wrote to memory of 2860 3120 un232953.exe 84 PID 3120 wrote to memory of 2860 3120 un232953.exe 84 PID 3120 wrote to memory of 1820 3120 un232953.exe 92 PID 3120 wrote to memory of 1820 3120 un232953.exe 92 PID 3120 wrote to memory of 1820 3120 un232953.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\25ca691f8cdd2ddcab793323c1d2f218e8765d730becc1d91c810cde2f474de6.exe"C:\Users\Admin\AppData\Local\Temp\25ca691f8cdd2ddcab793323c1d2f218e8765d730becc1d91c810cde2f474de6.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un232953.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un232953.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4642.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4642.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9397.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9397.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD5e37bb8ae852745f79adc25a0200438b5
SHA1259d15df0dab29d9c86724d70ff08a0ea424451d
SHA2567e75f3969f59a82125a322897f167efac8d3bc3ce4501f7eff7eb69440d72575
SHA512417e59b337546020aee9fe7c1cd6ad0dcd5009d68e2c9affb0b5a7b166ab8cffbce9d4fe5cb0acccd86c3e4b214be47161f95791c79d1011774eacc76c162927
-
Filesize
300KB
MD51f0b8e195aa6d26e52c734a87f81f62c
SHA19eca4e72cda46e0e91131061119696a0437cff4d
SHA256fbf45585c51704d28946602ccd29b45ecf51c65a1233762d4cbe95c4c2df7a91
SHA5125d3f5addccdc81eafb42cb2b49043fcc91096309384fcbc7571d69c9be3760e5a625a452499fe2fc399d34c5f664eba83c54d9f2e094dad25416912519408e71
-
Filesize
359KB
MD5881eb9d04fb19f9f0681dcfcc15ab8ee
SHA1f7203c35ae83391e12a1304c58dd5a2c98be2229
SHA256837721f24bc688383949a85898ddc01ed515f7424487847e6ec3e868234b7731
SHA512f9e4c60e8d9fb1c7f6f841a98dc26dd0c4a73c36875367cb8b980459ad734a46bb42cf0bdef7d92d0fc84e93a1c287e5194f8be8cc74d1ad5f4f2bd8e623bee6