Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:10
Static task
static1
Behavioral task
behavioral1
Sample
23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401.exe
Resource
win10v2004-20241007-en
General
-
Target
23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401.exe
-
Size
554KB
-
MD5
73f1c50e1c9a462c4fa5590fb983c00b
-
SHA1
6e8b140ffb48258128aa6357e385d58115910005
-
SHA256
23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401
-
SHA512
9756fc9f45f678fa33eae1c751fd678f949ca24a56f3a5b48f34bb288748b73af99f08500c16b146978acc328580e2c1255ffcd8cc4d03eba952a89acdf4a45f
-
SSDEEP
12288:KMrjy905zS6TXfeFafw/hHKJXKyjjJsoCHbdAwZx:tya5Safw/hH2zC7Px
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c62-13.dat healer behavioral1/memory/5064-15-0x0000000000EF0000-0x0000000000EFA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro8862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro8862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro8862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro8862.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro8862.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro8862.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/1172-22-0x00000000070B0000-0x00000000070F6000-memory.dmp family_redline behavioral1/memory/1172-24-0x0000000007740000-0x0000000007784000-memory.dmp family_redline behavioral1/memory/1172-40-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-38-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-88-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-86-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-84-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-80-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-78-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-76-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-74-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-72-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-70-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-68-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-64-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-62-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-60-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-58-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-56-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-52-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-50-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-48-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-46-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-44-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-42-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-34-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-32-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-30-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-29-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-82-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-66-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-54-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-36-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-26-0x0000000007740000-0x000000000777F000-memory.dmp family_redline behavioral1/memory/1172-25-0x0000000007740000-0x000000000777F000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 220 unio7513.exe 5064 pro8862.exe 1172 qu5204.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro8862.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio7513.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio7513.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu5204.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5064 pro8862.exe 5064 pro8862.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5064 pro8862.exe Token: SeDebugPrivilege 1172 qu5204.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2464 wrote to memory of 220 2464 23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401.exe 85 PID 2464 wrote to memory of 220 2464 23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401.exe 85 PID 2464 wrote to memory of 220 2464 23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401.exe 85 PID 220 wrote to memory of 5064 220 unio7513.exe 86 PID 220 wrote to memory of 5064 220 unio7513.exe 86 PID 220 wrote to memory of 1172 220 unio7513.exe 93 PID 220 wrote to memory of 1172 220 unio7513.exe 93 PID 220 wrote to memory of 1172 220 unio7513.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401.exe"C:\Users\Admin\AppData\Local\Temp\23ace936ff8236ce1241fe652a9e112217982f90aa950cef3461ea038de97401.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7513.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio7513.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8862.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8862.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5204.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5204.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1172
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
412KB
MD5a370430d4661047f8ffad6f29ffcc5e4
SHA16287f293deb4404fc6cbc5dfce91e2df72f789eb
SHA25613a070c9e82f25fba81ac4c2d067739b20de4f245f006f3b35271726e4a831ef
SHA51256aabfce0190a4c53aaafbfea87467bf5e380fe8b7bb8d6728aa070af7fc3bf9461cc075e6ca92b202c7bded46be7c1503d5c87164687f6e7040bcbada737b2a
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
386KB
MD5c75aac3c458d9d75e926787e9b69f5e1
SHA1f36ac6ebed8b9546a375b3785e5a2f486c2b5317
SHA256a141ef226e8ac92e02addcd502eeb53052452d3103814cea1a519aa188be3446
SHA5120dd1e8c06779cf1502f33cc7884e70909d317ef99382f3b9cb6684cd3cd8a7c64d97588604a45996e8fcc32b796c860aad7bcca375d73cffcf6079dcbc188695