Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4.exe
Resource
win10v2004-20241007-en
General
-
Target
cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4.exe
-
Size
1.1MB
-
MD5
ea1e6ea4b5bd550da5b98a866056fdfb
-
SHA1
e6aea4c59a6ade593530082ad46b83faa58311b3
-
SHA256
cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4
-
SHA512
84ec84b3af5fc7faf35e3eab56a5db273bfc69508d75c1e5c68b8a04e12763f251c0a6de1377c31a8816f072c8a887c944a4190c109e5dedbcdda4586035b9d3
-
SSDEEP
24576:byCZoOfJqFg6S1ucyb91zFM4M2zMkbWg6cZQNk:OCSOfzPkbBvM2zXn6EQN
Malware Config
Extracted
redline
ramon
193.233.20.23:4123
-
auth_value
3197576965d9513f115338c233015b40
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b93-26.dat healer behavioral1/memory/4020-28-0x00000000007F0000-0x00000000007FA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection iOQ23am57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" iOQ23am57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" iOQ23am57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" iOQ23am57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" iOQ23am57.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" iOQ23am57.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2144-34-0x00000000049F0000-0x0000000004A36000-memory.dmp family_redline behavioral1/memory/2144-36-0x0000000004D70000-0x0000000004DB4000-memory.dmp family_redline behavioral1/memory/2144-54-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-66-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-100-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-98-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-96-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-94-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-90-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-88-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-86-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-84-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-82-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-78-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-76-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-74-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-72-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-70-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-64-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-62-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-60-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-58-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-56-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-52-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-50-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-48-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-46-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-44-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-92-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-80-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-68-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-42-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-40-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-38-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline behavioral1/memory/2144-37-0x0000000004D70000-0x0000000004DAE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 5 IoCs
pid Process 868 sps78Tu39.exe 3616 sjo67kQ63.exe 992 sxk96sC80.exe 4020 iOQ23am57.exe 2144 kYV44aq58.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" iOQ23am57.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" sjo67kQ63.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" sxk96sC80.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" sps78Tu39.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sps78Tu39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sjo67kQ63.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sxk96sC80.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kYV44aq58.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4020 iOQ23am57.exe 4020 iOQ23am57.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4020 iOQ23am57.exe Token: SeDebugPrivilege 2144 kYV44aq58.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2800 wrote to memory of 868 2800 cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4.exe 84 PID 2800 wrote to memory of 868 2800 cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4.exe 84 PID 2800 wrote to memory of 868 2800 cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4.exe 84 PID 868 wrote to memory of 3616 868 sps78Tu39.exe 86 PID 868 wrote to memory of 3616 868 sps78Tu39.exe 86 PID 868 wrote to memory of 3616 868 sps78Tu39.exe 86 PID 3616 wrote to memory of 992 3616 sjo67kQ63.exe 87 PID 3616 wrote to memory of 992 3616 sjo67kQ63.exe 87 PID 3616 wrote to memory of 992 3616 sjo67kQ63.exe 87 PID 992 wrote to memory of 4020 992 sxk96sC80.exe 88 PID 992 wrote to memory of 4020 992 sxk96sC80.exe 88 PID 992 wrote to memory of 2144 992 sxk96sC80.exe 96 PID 992 wrote to memory of 2144 992 sxk96sC80.exe 96 PID 992 wrote to memory of 2144 992 sxk96sC80.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4.exe"C:\Users\Admin\AppData\Local\Temp\cdd9747a3f778f44318930c37098dd019520f87ce72db430b0ee09668e7c27c4.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sps78Tu39.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\sps78Tu39.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sjo67kQ63.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sjo67kQ63.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sxk96sC80.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\sxk96sC80.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\iOQ23am57.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\iOQ23am57.exe5⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kYV44aq58.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\kYV44aq58.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2144
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
959KB
MD514d9f088dc8ad1136aca342d692d0ed3
SHA11e85a5e9cdb80543dd272b638925988756a1cde4
SHA256379a48daeb9990c4dfad6bca965b63145d8aa54b9e2f444cdb9abae6b34d7b0a
SHA51252a4ab20d5fa8ca6d65780ca31e98fa62920f7a00a27c45186c59eef50c711c8af43c613828120f689ba7b68e16592a6b3d92a819084af3e330565618caacb81
-
Filesize
682KB
MD52746ce05773bbead2279b85fbcd90baf
SHA1d995888487c9f71c266542f3d7cc6f628f115b9f
SHA256d643179b5604b2ec50c09ecba6fa5d87d076faa40c2fea8f6ac9fc7a8e2131c1
SHA5129be0b4405575c942c670284ac487a884cdda0727a9845410e02f29ae05b26c8c50c0f90d31907f9e2bb0e9b992f8bc6b76da096edc390d087da234ab117965bd
-
Filesize
399KB
MD50ba91793ef73377481c8e8065832db76
SHA1c5f7c8d9c39ee160df78c9b8ad803204081151a3
SHA256c6cc7688cbb38173f0a4832133aaf7336124f064ffee88e446fe46a0ea66bebb
SHA512f9a0de3fadb65080a602c66df2576908b67f8a8f92c6c2b5542846aee51e55937b6e589d53f955a8e9fcfefd1b4cfbdc7daebfae0d5c660f5ececfeca8b60610
-
Filesize
11KB
MD5f947408d322bbafd83eadb5bc7b5fa49
SHA17008e5ae22f395da8622f3aff5ce760a821d7873
SHA256b9988d83f42b1cc7fc8f4bd65fd0dfc438cf89b1692f27ba76adf89fcce576d5
SHA512f6e440599d90f8c0f7c03c70abc7dd88f40256c2f30df7888704e44e7f6c7dcba502a45913ad4aed6f7e5c8342982b86879df3b22702ef599d8d65d3ff13fd4e
-
Filesize
374KB
MD5ce6ca2dd2700dbacf6ba786698d5a344
SHA1d257c23286fd31ed96f02d6ed2bbc6336c9d7ccf
SHA256a063bd961d53854a4d95d2293c614f9bd9f0b50352a8f5304e56fa1f7e1824c3
SHA5121887d1b1f1c601c2d939b79732d4d2fc4d1f4f886eb619f6cb9f6cca25d70a5d7f0d1b99e715822f5aad0d17a14cabac02ec11f2e3d38e871e8c55d587759bde