Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:43
Static task
static1
Behavioral task
behavioral1
Sample
376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c.exe
Resource
win10v2004-20241007-en
General
-
Target
376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c.exe
-
Size
1.1MB
-
MD5
8eccd2643432ff758fafadbcad46f662
-
SHA1
12f7c9ad8aaaf272e7acbbbdc980d258b44b53f4
-
SHA256
376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c
-
SHA512
234058892091d3725e4aa4665fbc80af34e55f62d9752a7f78005de97d99f883772eca5b5925ea30e09c1186704957f54d88fa80126d63908e3309d45360e573
-
SSDEEP
12288:hMr05y90LTyzvOyfyfppMI4UWPPk6ind29aB/ga9Rll0SFxXOElaPLnQGBVB3CCq:/5yWslipkUTYEIHS7O42bVhTFs
Malware Config
Extracted
redline
ramon
193.233.20.23:4123
-
auth_value
3197576965d9513f115338c233015b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023ca0-26.dat healer behavioral1/memory/4696-28-0x0000000000340000-0x000000000034A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bnq78oF71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bnq78oF71.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection bnq78oF71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bnq78oF71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bnq78oF71.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bnq78oF71.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4988-34-0x0000000004AA0000-0x0000000004AE6000-memory.dmp family_redline behavioral1/memory/4988-36-0x0000000004D50000-0x0000000004D94000-memory.dmp family_redline behavioral1/memory/4988-46-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-52-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-100-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-98-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-96-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-94-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-92-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-90-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-88-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-84-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-82-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-80-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-79-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-74-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-72-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-68-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-66-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-64-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-62-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-60-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-58-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-56-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-54-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-50-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-48-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-44-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-40-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-86-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-76-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-70-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-42-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-38-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline behavioral1/memory/4988-37-0x0000000004D50000-0x0000000004D8E000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 3648 pIO12ee55.exe 2852 pFX04eV54.exe 4484 pJA10as58.exe 4696 bnq78oF71.exe 4988 cEw09TZ34.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" bnq78oF71.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" pIO12ee55.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pFX04eV54.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" pJA10as58.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5856 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pIO12ee55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pFX04eV54.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pJA10as58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cEw09TZ34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4696 bnq78oF71.exe 4696 bnq78oF71.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4696 bnq78oF71.exe Token: SeDebugPrivilege 4988 cEw09TZ34.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4648 wrote to memory of 3648 4648 376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c.exe 83 PID 4648 wrote to memory of 3648 4648 376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c.exe 83 PID 4648 wrote to memory of 3648 4648 376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c.exe 83 PID 3648 wrote to memory of 2852 3648 pIO12ee55.exe 85 PID 3648 wrote to memory of 2852 3648 pIO12ee55.exe 85 PID 3648 wrote to memory of 2852 3648 pIO12ee55.exe 85 PID 2852 wrote to memory of 4484 2852 pFX04eV54.exe 86 PID 2852 wrote to memory of 4484 2852 pFX04eV54.exe 86 PID 2852 wrote to memory of 4484 2852 pFX04eV54.exe 86 PID 4484 wrote to memory of 4696 4484 pJA10as58.exe 88 PID 4484 wrote to memory of 4696 4484 pJA10as58.exe 88 PID 4484 wrote to memory of 4988 4484 pJA10as58.exe 98 PID 4484 wrote to memory of 4988 4484 pJA10as58.exe 98 PID 4484 wrote to memory of 4988 4484 pJA10as58.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c.exe"C:\Users\Admin\AppData\Local\Temp\376d29a0b6f36c9797845f86344e7569921bf5875c8ec9c950d6566d9487cf1c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pIO12ee55.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\pIO12ee55.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pFX04eV54.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pFX04eV54.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pJA10as58.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\pJA10as58.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bnq78oF71.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\bnq78oF71.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4696
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cEw09TZ34.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\cEw09TZ34.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4988
-
-
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5856
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
957KB
MD561e1653475d90a11a6db7951d2483f87
SHA1061e606a0030b39291d768e75d5aa4ac398256ee
SHA25641c7aa56fe62736d7f22c31244a870e1044e0b51f39204da512e57ddf7c0cc27
SHA51268882d6d1a3ddfdd03de02256eb2758f052708e4189f20001d3ecd17bd41a7a64226e4079b0c6e04b6b6b12e11a0c60d5623496387c124c16df2b63cccd3284e
-
Filesize
681KB
MD598d61c46c7ef7a61af406d1ded38f68e
SHA1bbb70d454db1aac42a551048a6b514d67757fb7c
SHA256e4159eb11ceb6284e194ca97e335daf7ed900765f007bdf82ca0e9b32c1eec95
SHA51216d6a25a373052cb667a610a32201ac262287b11b207e6a590b1109521ba051f4b6e41ab8293f574d367f7362256ca8c499034d6831322586bcbc51b13941b5e
-
Filesize
399KB
MD5c8ceac960622ff0f1b305aa3fc7a9ec7
SHA151e2c3ea5d15c43cb84aa70712b246ff3b20e0ab
SHA2561a7c29ee6bbf2f54993cb98593d272d9d88dcc7f4ecfdb22b6b1e85069b799e1
SHA512bc212e172522ff92c0b8a7a64ca37d03102d453330e5b7f2f5bef9f7836b384d83882ee4ad7f4eaf2f5b0a55fc8a78b88583bf88e8044faaac6838af85dd3f72
-
Filesize
11KB
MD54e81ffb8388298777d8b3459ff879610
SHA1055691abfad2a9601b90ec9ceb4e3ea56f9d449d
SHA2560c467a9950711072049ced5ce718ced10ea926175cdb9639a8636c186c36d274
SHA5120af0b7e6ad7d1471869cdafa9ed9f73c21d11463542d1908c8124e4f49fbcfc27ac84375578ba419cd809d871cfb3de101b6c29621fa065bbbf3df4fbdacfb1c
-
Filesize
374KB
MD5237276904e462be1323376ae14ecc39e
SHA1c7d26f1cf051c8419619c88458e047a7b2a03cdb
SHA256c7511de528d95e0802ed1114aaacc1d29baf0f1ca9efb6336b88d5d24d1f5880
SHA5122a25115d5ee9fde35333656a8d529b11c15f279bad825a5dd58ca6d090ad9c94de76da45638f545b82f8d6b24dc461febc3956d3e4048fdb5a6818a467bec8a7