Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:17
Static task
static1
Behavioral task
behavioral1
Sample
a82cc22c4eb49abe9114a8cfa9da95e446d88c9ba3c689bb1db6efa91240e8c9.exe
Resource
win10v2004-20241007-en
General
-
Target
a82cc22c4eb49abe9114a8cfa9da95e446d88c9ba3c689bb1db6efa91240e8c9.exe
-
Size
528KB
-
MD5
7806bef0977be0d690722b723c3e900e
-
SHA1
86ef8a980bb1d78cf66b63b063d894d166227162
-
SHA256
a82cc22c4eb49abe9114a8cfa9da95e446d88c9ba3c689bb1db6efa91240e8c9
-
SHA512
afbab11b13bf6c5342e33c6578739acdae385997d30315258f7a6bed2e304aac27847ab9136a2f5e3a8185012ec119efa40bc5429923eaeb47849da6ba8d1204
-
SSDEEP
12288:rMrXy90TqzGfuQ9Ou0YedyxVKNgZylj1qcW2OtJ:4yg5fuQ4btdyq1qC+J
Malware Config
Extracted
redline
ronam
193.233.20.17:4139
-
auth_value
125421d19d14dd7fd211bc7f6d4aea6c
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c99-12.dat healer behavioral1/memory/3300-15-0x00000000009C0000-0x00000000009CA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dqq33SL.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection dqq33SL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dqq33SL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dqq33SL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dqq33SL.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dqq33SL.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/2668-22-0x00000000024C0000-0x0000000002506000-memory.dmp family_redline behavioral1/memory/2668-24-0x0000000004B70000-0x0000000004BB4000-memory.dmp family_redline behavioral1/memory/2668-44-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-46-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-88-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-84-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-82-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-80-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-78-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-76-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-74-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-72-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-70-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-68-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-66-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-62-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-60-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-58-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-56-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-54-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-52-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-50-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-48-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-42-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-40-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-39-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-36-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-34-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-32-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-86-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-64-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-30-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-28-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-26-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline behavioral1/memory/2668-25-0x0000000004B70000-0x0000000004BAE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 4628 nTp81kh78.exe 3300 dqq33SL.exe 2668 eew25iC.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" dqq33SL.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a82cc22c4eb49abe9114a8cfa9da95e446d88c9ba3c689bb1db6efa91240e8c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" nTp81kh78.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3684 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a82cc22c4eb49abe9114a8cfa9da95e446d88c9ba3c689bb1db6efa91240e8c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nTp81kh78.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eew25iC.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3300 dqq33SL.exe 3300 dqq33SL.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3300 dqq33SL.exe Token: SeDebugPrivilege 2668 eew25iC.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2376 wrote to memory of 4628 2376 a82cc22c4eb49abe9114a8cfa9da95e446d88c9ba3c689bb1db6efa91240e8c9.exe 85 PID 2376 wrote to memory of 4628 2376 a82cc22c4eb49abe9114a8cfa9da95e446d88c9ba3c689bb1db6efa91240e8c9.exe 85 PID 2376 wrote to memory of 4628 2376 a82cc22c4eb49abe9114a8cfa9da95e446d88c9ba3c689bb1db6efa91240e8c9.exe 85 PID 4628 wrote to memory of 3300 4628 nTp81kh78.exe 86 PID 4628 wrote to memory of 3300 4628 nTp81kh78.exe 86 PID 4628 wrote to memory of 2668 4628 nTp81kh78.exe 98 PID 4628 wrote to memory of 2668 4628 nTp81kh78.exe 98 PID 4628 wrote to memory of 2668 4628 nTp81kh78.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\a82cc22c4eb49abe9114a8cfa9da95e446d88c9ba3c689bb1db6efa91240e8c9.exe"C:\Users\Admin\AppData\Local\Temp\a82cc22c4eb49abe9114a8cfa9da95e446d88c9ba3c689bb1db6efa91240e8c9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nTp81kh78.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\nTp81kh78.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dqq33SL.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\dqq33SL.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eew25iC.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\eew25iC.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:3684
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
383KB
MD59b0556ce6268fabff69f6c11b04ac885
SHA18305b3b8012f06155c094d8bf1c3b88fcbc885a3
SHA256286d90f29709d46390e0560e7de82189d4feb1f29ab352ee0e79bf00bb388e9c
SHA5121a06b67af5e57e986a64bef92611a543800f9f57f8ba0794eccd23271331d08942eb55558337bf6f41dad2dc562d15fed25e0c55fcf62a2bbabdbb73984e182b
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
278KB
MD59818b7b1a6d5a01c926d775fa0bc237d
SHA1111edbc4e0a0a6a3071c63a5d97fa8908b9bb269
SHA256c2400ff0db9c8705af0225ae397a3c7048717a7857d7a929cc8d80e4668ebe25
SHA5122d9f2adf4b10838a27f32f70506cbe64c56ee2d229bb7d38636267d251a08528edd50568b8e4c883dc8883602480ad1f08033cf08b2fcddea2e4a0040cbb7a15