Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
ceb9e93981dfbc00008733d627ded57c6dbacff96e0fe0c4e56df7f8bc614e8d.exe
Resource
win10v2004-20241007-en
General
-
Target
ceb9e93981dfbc00008733d627ded57c6dbacff96e0fe0c4e56df7f8bc614e8d.exe
-
Size
686KB
-
MD5
ac2d73d582042d05e6909bb6130c424f
-
SHA1
08fd04a7cd82b6279ff4ed13beae6b393455264b
-
SHA256
ceb9e93981dfbc00008733d627ded57c6dbacff96e0fe0c4e56df7f8bc614e8d
-
SHA512
7c44baebe482905e2fd0e043d8dd05dc93390f76b56c69e52c333caa61737f8a7a40b8866c6c92c9103accb5dd4d14b3393580909fadd8f2b329e57e46016679
-
SSDEEP
12288:pMrHy90JE3SbVcL3C3NW3zJy2fOmkBjz5mdnPJbOJbyMKb96TxuA6Vqqh1h:Kyc9327Ej9mdnByJGFkuAOqq5
Malware Config
Extracted
redline
boris
193.233.20.32:4125
-
auth_value
766b5bdf6dbefcf7ca223351952fc38f
Signatures
-
Detects Healer an antivirus disabler dropper 17 IoCs
resource yara_rule behavioral1/memory/960-18-0x0000000004900000-0x000000000491A000-memory.dmp healer behavioral1/memory/960-20-0x0000000004AF0000-0x0000000004B08000-memory.dmp healer behavioral1/memory/960-46-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-48-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-44-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-42-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-40-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-38-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-36-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-34-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-30-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-28-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-26-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-25-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-22-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-21-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer behavioral1/memory/960-32-0x0000000004AF0000-0x0000000004B02000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0023.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0023.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection pro0023.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 20 IoCs
resource yara_rule behavioral1/memory/2184-59-0x0000000004C90000-0x0000000004CD6000-memory.dmp family_redline behavioral1/memory/2184-60-0x00000000077A0000-0x00000000077E4000-memory.dmp family_redline behavioral1/memory/2184-86-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-94-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-92-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-90-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-88-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-84-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-82-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-80-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-78-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-76-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-74-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-72-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-70-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-68-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-66-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-64-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-62-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline behavioral1/memory/2184-61-0x00000000077A0000-0x00000000077DF000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3532 un708387.exe 960 pro0023.exe 2184 qu6659.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0023.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features pro0023.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ceb9e93981dfbc00008733d627ded57c6dbacff96e0fe0c4e56df7f8bc614e8d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un708387.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1532 960 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pro0023.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu6659.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceb9e93981dfbc00008733d627ded57c6dbacff96e0fe0c4e56df7f8bc614e8d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language un708387.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 960 pro0023.exe 960 pro0023.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 960 pro0023.exe Token: SeDebugPrivilege 2184 qu6659.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1624 wrote to memory of 3532 1624 ceb9e93981dfbc00008733d627ded57c6dbacff96e0fe0c4e56df7f8bc614e8d.exe 84 PID 1624 wrote to memory of 3532 1624 ceb9e93981dfbc00008733d627ded57c6dbacff96e0fe0c4e56df7f8bc614e8d.exe 84 PID 1624 wrote to memory of 3532 1624 ceb9e93981dfbc00008733d627ded57c6dbacff96e0fe0c4e56df7f8bc614e8d.exe 84 PID 3532 wrote to memory of 960 3532 un708387.exe 85 PID 3532 wrote to memory of 960 3532 un708387.exe 85 PID 3532 wrote to memory of 960 3532 un708387.exe 85 PID 3532 wrote to memory of 2184 3532 un708387.exe 95 PID 3532 wrote to memory of 2184 3532 un708387.exe 95 PID 3532 wrote to memory of 2184 3532 un708387.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceb9e93981dfbc00008733d627ded57c6dbacff96e0fe0c4e56df7f8bc614e8d.exe"C:\Users\Admin\AppData\Local\Temp\ceb9e93981dfbc00008733d627ded57c6dbacff96e0fe0c4e56df7f8bc614e8d.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un708387.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un708387.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0023.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0023.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:960 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 960 -s 10804⤵
- Program crash
PID:1532
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6659.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6659.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 960 -ip 9601⤵PID:3916
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
544KB
MD500b1d52a6a4b3d53e7633803302334d0
SHA11cee68eee04591656bb39a1080da42d02cb4e39b
SHA256bfcd8cb5d1e698f97995ba4928ae36bbc76318b5c13b5fd8e1ca2f05e0e6b122
SHA512ed7a0d29f1a2c2c8a2f2d8e4e62370cf67a46a3640a901cc11340aaf08b9fe40d86b691bb141809e35fb2294cd42c7e9b51471fd844d5e1babe92cab85bcb54c
-
Filesize
326KB
MD568dcf7f6f440c499f54f1e1d6d7c366d
SHA152eed408be2231670e4dfbd081525f4d315e88fd
SHA256a2cffd049027e0ea76565309a2b42d002f03b03a55e6bc4f62cb61f989067ad4
SHA512061b537fc49a8374716f1e46c58bf2e25b9b3ce852705890f61853b504d8362aa1280dbaff4db14c84e6d95e4d8e8114f6a90dcc84c6360889a364780cfa5cb7
-
Filesize
384KB
MD5f3a3aaf2030aa4c204f30421c6319541
SHA13908a357586f0719705d0b93d626cdc4b34eb96b
SHA25606a8161c27d0ae1a306d2a7d6c6936ecd312583b2665038088da3ed6a4061768
SHA512645e8fd869391f49bfe84894e5927c355249dec6bfd3ba95acbdf886aa1ad22ec5f85e3320abd431936c59be4275e37a778481877fad1998d87e86fdfb5482d0