Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/11/2024, 23:36
Static task
static1
Behavioral task
behavioral1
Sample
0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93.exe
Resource
win10v2004-20241007-en
General
-
Target
0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93.exe
-
Size
1.1MB
-
MD5
a576820e07ff80e5c97fed10f147945e
-
SHA1
93eaba624efbbaad1a990fa596752b72531209b7
-
SHA256
0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93
-
SHA512
a66a2b69f2adf81ce506529768737250eee99409ff290f4be1b663e3aeef9be266ac291ad9d7f91a371e6948a07e323dbc431f979ecb525cc81b6eb19200cddb
-
SSDEEP
24576:zylkV/UyGb+HFSOwvRYRm9YD4pWO8rgkFwmr5NEBJuOfKd2:Ga52aHFSCZDKWOaVfEBJuoKd
Malware Config
Extracted
redline
rodik
193.233.20.23:4124
-
auth_value
59b6e22e7cfd9b5fa0c99d1942f7c85d
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb9-26.dat healer behavioral1/memory/3648-28-0x0000000000B00000-0x0000000000B0A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bNT46LV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bNT46LV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bNT46LV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bNT46LV.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bNT46LV.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bNT46LV.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2928-34-0x0000000004B50000-0x0000000004B96000-memory.dmp family_redline behavioral1/memory/2928-36-0x0000000004C10000-0x0000000004C54000-memory.dmp family_redline behavioral1/memory/2928-38-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-50-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-100-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-98-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-96-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-94-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-92-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-90-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-88-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-86-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-84-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-82-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-80-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-78-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-76-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-74-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-72-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-70-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-68-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-66-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-64-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-62-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-60-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-58-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-56-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-54-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-48-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-47-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-44-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-42-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-40-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-52-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline behavioral1/memory/2928-37-0x0000000004C10000-0x0000000004C4F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 3920 nAJ48pp.exe 4528 nwU58kg.exe 2492 nzT75rM.exe 3648 bNT46LV.exe 2928 bQl05Fr21.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bNT46LV.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nAJ48pp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" nwU58kg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" nzT75rM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3120 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nAJ48pp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwU58kg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nzT75rM.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bQl05Fr21.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3648 bNT46LV.exe 3648 bNT46LV.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3648 bNT46LV.exe Token: SeDebugPrivilege 2928 bQl05Fr21.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3060 wrote to memory of 3920 3060 0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93.exe 83 PID 3060 wrote to memory of 3920 3060 0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93.exe 83 PID 3060 wrote to memory of 3920 3060 0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93.exe 83 PID 3920 wrote to memory of 4528 3920 nAJ48pp.exe 84 PID 3920 wrote to memory of 4528 3920 nAJ48pp.exe 84 PID 3920 wrote to memory of 4528 3920 nAJ48pp.exe 84 PID 4528 wrote to memory of 2492 4528 nwU58kg.exe 87 PID 4528 wrote to memory of 2492 4528 nwU58kg.exe 87 PID 4528 wrote to memory of 2492 4528 nwU58kg.exe 87 PID 2492 wrote to memory of 3648 2492 nzT75rM.exe 88 PID 2492 wrote to memory of 3648 2492 nzT75rM.exe 88 PID 2492 wrote to memory of 2928 2492 nzT75rM.exe 94 PID 2492 wrote to memory of 2928 2492 nzT75rM.exe 94 PID 2492 wrote to memory of 2928 2492 nzT75rM.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93.exe"C:\Users\Admin\AppData\Local\Temp\0cbfede22d17862cb5571b5213864e2dc12f5a9e3e4e3dbba0e1495269b4dc93.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nAJ48pp.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nAJ48pp.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nwU58kg.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\nwU58kg.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nzT75rM.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\nzT75rM.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bNT46LV.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bNT46LV.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bQl05Fr21.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bQl05Fr21.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3120
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD57594217d60873490eaf083a59f0f228f
SHA1b290230b92b9d79d6b8cbf16450f27de7d12a75d
SHA256c55cedc804d81fa4bee3e6c2b768a7458747670e83d08a007f025a711ea54ad4
SHA512ca2999db317b16cf1909240811de91030940a3a591bc6a37a04969ff578651190b53d176fc74a43b4f1aa555b2c1293a3072cadb8a962cd1c5e2a3df76651bb2
-
Filesize
683KB
MD5b8a373dd8ac9e3466874db4e191b0799
SHA1404f5b3a927810c243913f1bf2d4b52e216cb12f
SHA256dab64f3a49faea9c64bc6eed2a01cb2fd4ed1b23f92753d995fc97f5b24079db
SHA5127e818ba2c0a79eb31ccb9db71f93900920d7fc90089a4a3edfbd1dba707f603802a67a2f4e7f4c227f49b0a266e8124091436dc0d2f7de234eff0c0d1bfc75cf
-
Filesize
399KB
MD5cb6ed1588b5304a5880acaf799da0273
SHA1914273ac05d7d83ca2f3948bd1fcb8a2100496bf
SHA256382ed2a895b0df1228429850f338f1e576818f0117cc0078ceba0263ac68e9d6
SHA5128f07c1b6d539a716ae47b1cac6b14d49e2762903da2f63ff946b836f0d3a7a07ed0f0c29e284bce76a3e4b31f885510879b8b8dc6e746ebc66f28dd447e6bb3c
-
Filesize
11KB
MD54c9d144dcabb867ef0774fc2c469639e
SHA1a16cf50f7e46e0cb02e75f2d065d9a4057b03177
SHA256dbbd7477e8fd935f419df33e5afd87095bccd5b317690b0e4bf58cd418689b0c
SHA512328e4a104c6b0927c01c6a5a9210e929a630b3bb8e7ce914d6585dd8d38ea6f106ce2962ba13aa3678403a8f5f4a1c3592fa87269a14f874e840bd893af77e66
-
Filesize
352KB
MD5b0b94e2c2b7fcb269bf95b62cc9b065b
SHA1538d87b1ccae12796ed59ee2b407a5e19fce17ed
SHA256b99491d4afd199d95ff54c83be16a8e91f7a25299ac3b592e0e563b7798dd578
SHA512ee8c0a033e9decaae0f9de9e67907feca5de84f3ef300e34e8de8871bf37fe1d21b4e1922c1989cece049e988aa2c1410953a1951277466daf572723e4c42b25