Analysis
-
max time kernel
144s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 00:30
Static task
static1
Behavioral task
behavioral1
Sample
ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c.exe
Resource
win10v2004-20241007-en
General
-
Target
ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c.exe
-
Size
1.1MB
-
MD5
f64a6adf41132b401af77f1e4a08f310
-
SHA1
751b24df2f918e5b683f1cf3c40a79fd59e4a044
-
SHA256
ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c
-
SHA512
09c5cccb8130f606c11b8e450028dcef9e720ddd852fbac0e9e58c28ad170de988d9d7b30b176ef49371812840a4f9aeb37ca6663c6dcf4fe29baacfc942bc96
-
SSDEEP
24576:HyAliJVw+6fUxoAA6f/TcFPmeZKNh1KxyDUaJ8o+DQ3klbzelVK+:SVJ++sUh8KLz1JwF2VK
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0009000000023bfe-32.dat healer behavioral1/memory/3140-35-0x0000000000FC0000-0x0000000000FCA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection buTl94MZ02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" buTl94MZ02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" buTl94MZ02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" buTl94MZ02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" buTl94MZ02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" buTl94MZ02.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1448-41-0x0000000002370000-0x00000000023B6000-memory.dmp family_redline behavioral1/memory/1448-43-0x0000000004B70000-0x0000000004BB4000-memory.dmp family_redline behavioral1/memory/1448-51-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-55-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-107-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-105-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-103-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-101-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-99-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-95-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-93-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-91-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-89-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-87-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-83-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-81-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-79-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-77-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-75-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-73-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-71-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-69-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-67-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-63-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-61-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-59-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-57-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-53-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-49-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-98-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-85-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-65-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-47-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-45-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/1448-44-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 6 IoCs
pid Process 3868 plQQ61FG75.exe 3496 pluV93Da63.exe 4044 plKO50Bg66.exe 2636 ploB07Wi81.exe 3140 buTl94MZ02.exe 1448 caHq70UO30.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" buTl94MZ02.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" ploB07Wi81.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" plQQ61FG75.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" pluV93Da63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" plKO50Bg66.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plQQ61FG75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pluV93Da63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language plKO50Bg66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ploB07Wi81.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language caHq70UO30.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3140 buTl94MZ02.exe 3140 buTl94MZ02.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3140 buTl94MZ02.exe Token: SeDebugPrivilege 1448 caHq70UO30.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1640 wrote to memory of 3868 1640 ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c.exe 83 PID 1640 wrote to memory of 3868 1640 ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c.exe 83 PID 1640 wrote to memory of 3868 1640 ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c.exe 83 PID 3868 wrote to memory of 3496 3868 plQQ61FG75.exe 84 PID 3868 wrote to memory of 3496 3868 plQQ61FG75.exe 84 PID 3868 wrote to memory of 3496 3868 plQQ61FG75.exe 84 PID 3496 wrote to memory of 4044 3496 pluV93Da63.exe 86 PID 3496 wrote to memory of 4044 3496 pluV93Da63.exe 86 PID 3496 wrote to memory of 4044 3496 pluV93Da63.exe 86 PID 4044 wrote to memory of 2636 4044 plKO50Bg66.exe 87 PID 4044 wrote to memory of 2636 4044 plKO50Bg66.exe 87 PID 4044 wrote to memory of 2636 4044 plKO50Bg66.exe 87 PID 2636 wrote to memory of 3140 2636 ploB07Wi81.exe 88 PID 2636 wrote to memory of 3140 2636 ploB07Wi81.exe 88 PID 2636 wrote to memory of 1448 2636 ploB07Wi81.exe 97 PID 2636 wrote to memory of 1448 2636 ploB07Wi81.exe 97 PID 2636 wrote to memory of 1448 2636 ploB07Wi81.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c.exe"C:\Users\Admin\AppData\Local\Temp\ddd0b7a19cfd9ebd4c906d17a11a5dae3ca134d881a97db8835bb9f0de9f269c.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plQQ61FG75.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\plQQ61FG75.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pluV93Da63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pluV93Da63.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plKO50Bg66.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\plKO50Bg66.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ploB07Wi81.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\ploB07Wi81.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buTl94MZ02.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\buTl94MZ02.exe6⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3140
-
-
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caHq70UO30.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\caHq70UO30.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
994KB
MD57ec975be209dfc7590700cd184309772
SHA1f24b0dcbb6a91c269252c0446bebfa426e902b54
SHA25656e31c5fcf9676093c41b8e79b7e8c9be602dd20d511a2397bb9ceed5fd53036
SHA512e5af2f4c9b06f20b70ed2fdd32f529f9578f8a9965ce5bdd923d484d38e2b884cd1c54a42640ce4cf71bff0f9fb63192e4fea8b23b276fdf5e2061b8779db29d
-
Filesize
893KB
MD51b56077bb1ee7173f1030bc7e1c9729e
SHA130bafb0355a3a2892b6bd3ebeddfc941868a1b50
SHA2560945844abe3153e4dbd5ebaaf434fe4f5ee99977005bcabd2c0769aa36fdeeb2
SHA51205025364ba027623e7a9b7bd2e8218193c80e0f5f5565a1e5966c544bc3ec5b66ec317f2256233188264dfc38d191da64c5aab441fc82def47e7f31399e2a014
-
Filesize
666KB
MD58074436dcfb1ab247419541e06d10a60
SHA19f5ab3426e302ee171997ce958fda04e337a873d
SHA25698a3213e0bfb098de5d721d79a911a9765963c7c35ecc55b2dc496e316427f7d
SHA5123de61da40ed8ab0b0e7ac4fffd752c310f6197293b7c009ea5233a60db495cfbdd40fd672397b2f87bfb0f6dfa77b23a3915d4e6e617831234753ac8f8781244
-
Filesize
391KB
MD5da9f2ac138732f59927977b947dcf24b
SHA15857e700366295f9d96febdb4da9f0a6479d37b1
SHA256a06ecbfce594bf19c26997b61d9985d79be7cd58c455388d85055154a4482e5d
SHA512c33f1e4613417dd293efc1660268d82b23be718c4a059e73ebabfe717ccddfb706b0352d03825a84735b2c7b2796e7bcba4866ad0a629129cdcad318209fa353
-
Filesize
11KB
MD505173c78a7759b442ee18f9b5fa2cc40
SHA1bda498a8c506fc23e376abf5a7bec1386f7a9141
SHA25625e4bc2997a86a66c308f33ee13fbc9c12661be6f5a68574876d664b43c181aa
SHA512364e9b07620cb8f41078a16dcf7b3aefe139da952e484af601507d9252e9f01f986649cb13868edd0d6f8830f4850d74dddeb2f9b647ff291801b26cc415fbea
-
Filesize
304KB
MD5425a4e66387f5515e08c6258b5dc0c4d
SHA1e8a3a200c7aa39c58d6f1245abe4af5dc8d81671
SHA256f9d0ab38b7112071584629f74818f8ac3113d2db0a7bb3ef518aca5c1c08893d
SHA512c1086d7971da5530878b40e7c09665235ffaba4303a8c8fc3d7e85f392ee1195079657727857880bb603d8f9739cc124199e2688a211d75e475ea1daaa1a464e