Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 01:58
Static task
static1
Behavioral task
behavioral1
Sample
0b6cceab1e8f27ef944b92f2cac25f86c875000e2bb6a7a05198693fb49eceba.exe
Resource
win10v2004-20241007-en
General
-
Target
0b6cceab1e8f27ef944b92f2cac25f86c875000e2bb6a7a05198693fb49eceba.exe
-
Size
536KB
-
MD5
a866e7f72e051fe18a9813bb682ce85b
-
SHA1
a315324a0c220a2ee0d41cb34752e6b976432bd1
-
SHA256
0b6cceab1e8f27ef944b92f2cac25f86c875000e2bb6a7a05198693fb49eceba
-
SHA512
92e86fe27685e3cd4f1befb1e1cfe21191e5063aed52f3c990ce274912e85ddfb92c51beabb603f0e0404853627badb6bb1d80ed37651089e72ee648da0f9ee7
-
SSDEEP
12288:aMrJy90Apt16ZG25Mimp0/0O8tPYn307qdFHMuE53Ht:/ybb16g2Rmpu0O8xYnvdNMuoHt
Malware Config
Extracted
redline
rouch
193.56.146.11:4162
-
auth_value
1b1735bcfc122c708eae27ca352568de
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x000b000000023b65-12.dat healer behavioral1/memory/1644-15-0x0000000000BA0000-0x0000000000BAA000-memory.dmp healer -
Healer family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection sw08rI10uZ05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" sw08rI10uZ05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" sw08rI10uZ05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" sw08rI10uZ05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" sw08rI10uZ05.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" sw08rI10uZ05.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/3228-22-0x0000000002420000-0x0000000002466000-memory.dmp family_redline behavioral1/memory/3228-24-0x0000000002890000-0x00000000028D4000-memory.dmp family_redline behavioral1/memory/3228-37-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-44-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-88-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-86-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-84-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-82-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-78-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-76-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-74-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-72-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-70-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-68-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-66-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-64-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-62-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-60-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-58-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-54-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-52-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-50-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-48-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-46-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-42-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-40-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-38-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-34-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-32-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-81-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-57-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-30-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-28-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-26-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline behavioral1/memory/3228-25-0x0000000002890000-0x00000000028CE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 2696 vqg4931VC.exe 1644 sw08rI10uZ05.exe 3228 tzJ20Cc02.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" sw08rI10uZ05.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0b6cceab1e8f27ef944b92f2cac25f86c875000e2bb6a7a05198693fb49eceba.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" vqg4931VC.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b6cceab1e8f27ef944b92f2cac25f86c875000e2bb6a7a05198693fb49eceba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vqg4931VC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tzJ20Cc02.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1644 sw08rI10uZ05.exe 1644 sw08rI10uZ05.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1644 sw08rI10uZ05.exe Token: SeDebugPrivilege 3228 tzJ20Cc02.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4540 wrote to memory of 2696 4540 0b6cceab1e8f27ef944b92f2cac25f86c875000e2bb6a7a05198693fb49eceba.exe 83 PID 4540 wrote to memory of 2696 4540 0b6cceab1e8f27ef944b92f2cac25f86c875000e2bb6a7a05198693fb49eceba.exe 83 PID 4540 wrote to memory of 2696 4540 0b6cceab1e8f27ef944b92f2cac25f86c875000e2bb6a7a05198693fb49eceba.exe 83 PID 2696 wrote to memory of 1644 2696 vqg4931VC.exe 84 PID 2696 wrote to memory of 1644 2696 vqg4931VC.exe 84 PID 2696 wrote to memory of 3228 2696 vqg4931VC.exe 96 PID 2696 wrote to memory of 3228 2696 vqg4931VC.exe 96 PID 2696 wrote to memory of 3228 2696 vqg4931VC.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b6cceab1e8f27ef944b92f2cac25f86c875000e2bb6a7a05198693fb49eceba.exe"C:\Users\Admin\AppData\Local\Temp\0b6cceab1e8f27ef944b92f2cac25f86c875000e2bb6a7a05198693fb49eceba.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vqg4931VC.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vqg4931VC.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw08rI10uZ05.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\sw08rI10uZ05.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzJ20Cc02.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tzJ20Cc02.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
391KB
MD532ce03ff915c24d09819e8f7d7b5c5d6
SHA10fa105269a2d27d4a6cf140e4e744c80b9277859
SHA256e37d42d670cdb9d8aa1589029146163bcda45ed1bbc15b98ace1eddc65a2fda9
SHA5125d5f960ca977315bc99e93b512e70250abcc0d722ae97010cc151ad2e0b2fa67feb4ef189186e2e48b0cddaafb7d90e37f8070792838e8092573a42a23c24e70
-
Filesize
11KB
MD5ea640d24b39ac16baf18e6ede52f0b04
SHA17eb7877e7f67d88921dfe90b0c8d01a798b15351
SHA2568307360f88263280eedc76e1b1b05dbb8e3ef2ab2bab34b8fd5288ad02e42d09
SHA5125668a57c324e2539d948737f058a7f84d36fe10e7c5f3ee3e9b081f7888f58ab589a287177876e8fa6480cae7d55de481d78fb5fe7bc7e6e79d114b679f28419
-
Filesize
304KB
MD5fc9d1d13726797f824009a1594b5a9c3
SHA1447b53284c76edef32a942621ad7fdfd0f3ce704
SHA256872ecd8396e50afecfef2ee302850acfcf722f27323f6a10417061c8045c6276
SHA512e152fe5fd78221773fb50203a7d48216dac92a5d1df3bbd65d6150d681f4e1ef4a0ab78ddc038bf3c6cbe85d57ccedab901911b4b5fa9489ed4e9435d5021729