Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:41
Static task
static1
Behavioral task
behavioral1
Sample
86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182.exe
Resource
win10v2004-20241007-en
General
-
Target
86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182.exe
-
Size
663KB
-
MD5
f64931b0d1bf85fc55d60247a4461fed
-
SHA1
312afe989275e223455bddc29f69a5fd3b2d6c7e
-
SHA256
86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182
-
SHA512
2badc01f42975618f497e0602845bc6ec708db606623122ce847f6f4eb714b3c097cc3bc57fa1053030071dae8b804669f46e5af95eba36188a485a0cb4934e2
-
SSDEEP
12288:EMrmy90HxnumGsApiHfIQtlrL1+k6c/rOo4jKUISOwdvmkyi8Blo+Q:yyIjAp2p4k6AkLvmkyi8Po+Q
Malware Config
Extracted
redline
ramon
193.233.20.23:4123
-
auth_value
3197576965d9513f115338c233015b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023cb2-12.dat healer behavioral1/memory/4388-15-0x0000000000840000-0x000000000084A000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection izF90xr98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" izF90xr98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" izF90xr98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" izF90xr98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" izF90xr98.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" izF90xr98.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1220-22-0x00000000026C0000-0x0000000002706000-memory.dmp family_redline behavioral1/memory/1220-24-0x00000000052C0000-0x0000000005304000-memory.dmp family_redline behavioral1/memory/1220-28-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-26-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-25-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-36-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-88-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-86-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-84-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-80-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-78-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-76-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-74-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-72-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-70-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-66-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-64-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-62-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-60-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-58-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-54-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-52-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-50-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-48-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-46-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-44-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-42-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-40-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-38-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-34-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-32-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-30-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-82-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-68-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline behavioral1/memory/1220-56-0x00000000052C0000-0x00000000052FE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2036 sgy69EP03.exe 4388 izF90xr98.exe 1220 klD70Vo47.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" izF90xr98.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sgy69EP03.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sgy69EP03.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language klD70Vo47.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4388 izF90xr98.exe 4388 izF90xr98.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4388 izF90xr98.exe Token: SeDebugPrivilege 1220 klD70Vo47.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4760 wrote to memory of 2036 4760 86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182.exe 84 PID 4760 wrote to memory of 2036 4760 86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182.exe 84 PID 4760 wrote to memory of 2036 4760 86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182.exe 84 PID 2036 wrote to memory of 4388 2036 sgy69EP03.exe 85 PID 2036 wrote to memory of 4388 2036 sgy69EP03.exe 85 PID 2036 wrote to memory of 1220 2036 sgy69EP03.exe 97 PID 2036 wrote to memory of 1220 2036 sgy69EP03.exe 97 PID 2036 wrote to memory of 1220 2036 sgy69EP03.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182.exe"C:\Users\Admin\AppData\Local\Temp\86f7200fc0ee3676054ae40575cae632bb1e9eea4b3e0b0b0e40045090253182.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sgy69EP03.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sgy69EP03.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izF90xr98.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\izF90xr98.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\klD70Vo47.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\klD70Vo47.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1220
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
389KB
MD54c007182b6eff70196e6fe420ce878e1
SHA10b623ffbe7923bb4bcf352e7be6a1012d017b36d
SHA25647599015881cf76cec31df84d27e67efe92a0f6b8d28b3165d9a3cbe9ff899c4
SHA512aa282a324a1c5fb3456e2dc577088df383aee9dac4fb0a99215808d3fc46cfa3da3f888cac954a552c81f01505fc73009cf9d0bc28ae59f54385690c88b621cd
-
Filesize
11KB
MD5b975d3458649d99f72a20025f14c1a0b
SHA18f8f73e48c8551367ea9f963d46c95478ec344fa
SHA256405ee0e68d1e7888c944ea842e2b6bfda9a6f1ce20e6936969bdc5c28e152c50
SHA51245fa5bc5d9eb93744e47f65cacb93042b16448a56ac5930a1b69bdf05297bc9e2e4c82c172f14a832c3d69e144b9304de05c517d87edcd3555c31a9501ccb7d8
-
Filesize
308KB
MD5268eb6c29660b671081e908c7edff532
SHA1e43f244273c197c44bb8bc7ad1ae2583545724bf
SHA25644dcf8fd0be32702a4246205f7ac38abfed0f072fa42bbe79044476c5f2903d0
SHA512a141e4bdedfcd313468ac3a967ed9a866efc5db3d060edeaa409f1fb278f02595921480192b0b43d02cc18fd2872ac045af2f01c86660d40b6b2f527074a3689