Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/11/2024, 00:05
Static task
static1
Behavioral task
behavioral1
Sample
6d3d4ba137c086887c2064ae38c4da9da32d12802798556500758adf354b8250N.exe
Resource
win10v2004-20241007-en
General
-
Target
6d3d4ba137c086887c2064ae38c4da9da32d12802798556500758adf354b8250N.exe
-
Size
545KB
-
MD5
51c6259e141e0dbf14f2fb44cfaaeee8
-
SHA1
4152a53ce7ef3cee3d0c50db77a9417c562f9949
-
SHA256
e1986056e80281e7ad4c229c0bbf1440640b4eb0f36aae2612e27e288794a46c
-
SHA512
34ccb0646bf8a583b6e3324cc834053a6c6123ba57771c4b2d0e764e935cd16918d1e8a12fc2679419f9cf058005f7fa89acda735afbf9681b886bf750440d48
-
SSDEEP
12288:EMrEy90kdbHaZuX5EO4ESn1vONKBf/DFWemwyiK5i9dhtggmFMwJ:4y/bHIMSnkWrFWemwKUTAfMwJ
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b66-12.dat healer behavioral1/memory/2900-15-0x0000000000420000-0x000000000042A000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro7291.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro7291.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro7291.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro7291.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro7291.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro7291.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4012-22-0x0000000002620000-0x0000000002666000-memory.dmp family_redline behavioral1/memory/4012-24-0x00000000029A0000-0x00000000029E4000-memory.dmp family_redline behavioral1/memory/4012-78-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-80-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-88-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-84-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-82-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-76-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-74-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-72-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-68-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-66-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-64-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-62-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-60-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-58-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-56-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-55-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-52-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-46-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-44-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-42-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-40-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-38-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-36-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-34-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-32-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-30-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-86-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-28-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-70-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-26-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-50-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-48-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4012-25-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2516 unio8699.exe 2900 pro7291.exe 4012 qu8522.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro7291.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6d3d4ba137c086887c2064ae38c4da9da32d12802798556500758adf354b8250N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio8699.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d3d4ba137c086887c2064ae38c4da9da32d12802798556500758adf354b8250N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio8699.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu8522.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2900 pro7291.exe 2900 pro7291.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2900 pro7291.exe Token: SeDebugPrivilege 4012 qu8522.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4860 wrote to memory of 2516 4860 6d3d4ba137c086887c2064ae38c4da9da32d12802798556500758adf354b8250N.exe 83 PID 4860 wrote to memory of 2516 4860 6d3d4ba137c086887c2064ae38c4da9da32d12802798556500758adf354b8250N.exe 83 PID 4860 wrote to memory of 2516 4860 6d3d4ba137c086887c2064ae38c4da9da32d12802798556500758adf354b8250N.exe 83 PID 2516 wrote to memory of 2900 2516 unio8699.exe 84 PID 2516 wrote to memory of 2900 2516 unio8699.exe 84 PID 2516 wrote to memory of 4012 2516 unio8699.exe 98 PID 2516 wrote to memory of 4012 2516 unio8699.exe 98 PID 2516 wrote to memory of 4012 2516 unio8699.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d3d4ba137c086887c2064ae38c4da9da32d12802798556500758adf354b8250N.exe"C:\Users\Admin\AppData\Local\Temp\6d3d4ba137c086887c2064ae38c4da9da32d12802798556500758adf354b8250N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8699.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio8699.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7291.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7291.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8522.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8522.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
403KB
MD59939c27ce11fc646145d41bd5a9e64a4
SHA18e0cf620a73ba2ceec06cd7ff4999999d2cc0a41
SHA256addf2dc192ce93fec336bc605612804ea9841cc62e4923a81589a10f30e7f297
SHA51248ba35d1e57d2c43d1445b5f4ab73d8378449e851439157dbc293b8b8c94c13bb2189bdca1a15810c1ef138501e5b6653e0a415cbdea328355cf842b87a07ad1
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
351KB
MD5bfaf37915a0a1814bfd9a3421bd86599
SHA116620da1b7198ba4cb68120b539d60f4210ef886
SHA256ebebb797719f5491bd772085f72442acd2b44b80403c72db16e01fb5f7b338d2
SHA5125386e2458d4342c57b823ea6400eb67167e01ec1392215fbcfdacfa6eb4e9041e8116dc9086acc2b3bd74720e4172d27320f225bea7e88c1e99660265d07cec6