Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-11-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
c253d6ec7a4ee3dcfafaf4b170d2db8617cfc80dca68ff90095c223968ffafef.exe
Resource
win10v2004-20241007-en
General
-
Target
c253d6ec7a4ee3dcfafaf4b170d2db8617cfc80dca68ff90095c223968ffafef.exe
-
Size
547KB
-
MD5
b8b14e6e5cff16ff74ba416420ce94c2
-
SHA1
8a87dfa291f241cd13c8a0c4112b3eb506e65287
-
SHA256
c253d6ec7a4ee3dcfafaf4b170d2db8617cfc80dca68ff90095c223968ffafef
-
SHA512
914106c47449bf478fc48dc5978bb8e7563a33fbf7cf4047b7dfcb7d5d2204c31f2be8df8064f484b0944314b550775886dbbb019e5939fb47e32e635ffb2130
-
SSDEEP
12288:KMray90RlcB3xXvj8oancJ6270CGzstJwLrcz7hC4gw:0yGlkvjZX70GcrczlGw
Malware Config
Extracted
redline
down
193.233.20.31:4125
-
auth_value
12c31a90c72f5efae8c053a0bd339381
Signatures
-
Detects Healer an antivirus disabler dropper 2 IoCs
resource yara_rule behavioral1/files/0x0008000000023c8b-12.dat healer behavioral1/memory/3180-15-0x00000000002E0000-0x00000000002EA000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" pro0487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" pro0487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" pro0487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" pro0487.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection pro0487.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" pro0487.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 35 IoCs
resource yara_rule behavioral1/memory/4720-22-0x0000000002800000-0x0000000002846000-memory.dmp family_redline behavioral1/memory/4720-24-0x00000000029A0000-0x00000000029E4000-memory.dmp family_redline behavioral1/memory/4720-66-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-88-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-86-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-84-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-82-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-80-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-78-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-76-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-75-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-72-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-70-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-68-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-64-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-62-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-60-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-59-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-54-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-52-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-50-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-48-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-44-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-42-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-40-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-38-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-36-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-34-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-32-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-30-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-56-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-46-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-28-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-26-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline behavioral1/memory/4720-25-0x00000000029A0000-0x00000000029DE000-memory.dmp family_redline -
Redline family
-
Executes dropped EXE 3 IoCs
pid Process 3936 unio2621.exe 3180 pro0487.exe 4720 qu4411.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features\TamperProtection = "0" pro0487.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c253d6ec7a4ee3dcfafaf4b170d2db8617cfc80dca68ff90095c223968ffafef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" unio2621.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5028 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c253d6ec7a4ee3dcfafaf4b170d2db8617cfc80dca68ff90095c223968ffafef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language unio2621.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qu4411.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3180 pro0487.exe 3180 pro0487.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3180 pro0487.exe Token: SeDebugPrivilege 4720 qu4411.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3936 2992 c253d6ec7a4ee3dcfafaf4b170d2db8617cfc80dca68ff90095c223968ffafef.exe 83 PID 2992 wrote to memory of 3936 2992 c253d6ec7a4ee3dcfafaf4b170d2db8617cfc80dca68ff90095c223968ffafef.exe 83 PID 2992 wrote to memory of 3936 2992 c253d6ec7a4ee3dcfafaf4b170d2db8617cfc80dca68ff90095c223968ffafef.exe 83 PID 3936 wrote to memory of 3180 3936 unio2621.exe 84 PID 3936 wrote to memory of 3180 3936 unio2621.exe 84 PID 3936 wrote to memory of 4720 3936 unio2621.exe 96 PID 3936 wrote to memory of 4720 3936 unio2621.exe 96 PID 3936 wrote to memory of 4720 3936 unio2621.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\c253d6ec7a4ee3dcfafaf4b170d2db8617cfc80dca68ff90095c223968ffafef.exe"C:\Users\Admin\AppData\Local\Temp\c253d6ec7a4ee3dcfafaf4b170d2db8617cfc80dca68ff90095c223968ffafef.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2621.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\unio2621.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0487.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0487.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4411.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4411.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start wuauserv1⤵
- Launches sc.exe
PID:5028
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404KB
MD501368da812400cfb99eac4f941dbc448
SHA1dfb9fd65c531adafd9a0e4f26a54a0981eb5dd96
SHA2569e4d71da895117ac24ca9753f8eb9470a0f559ee740a94a8e9e45e975c486b7d
SHA5124e8646028c6c83b44838ba04c7aae632d346c0d4a12bfeba80cde54ce0b975e7b6b24de3197dcf3aeb39f376d10ed4aa460aadbb8f89db9cbe96eeae3145305d
-
Filesize
11KB
MD57e93bacbbc33e6652e147e7fe07572a0
SHA1421a7167da01c8da4dc4d5234ca3dd84e319e762
SHA256850cd190aaeebcf1505674d97f51756f325e650320eaf76785d954223a9bee38
SHA512250169d7b6fcebff400be89edae8340f14130ced70c340ba9da9f225f62b52b35f6645bfb510962efb866f988688cb42392561d3e6b72194bc89d310ea43aa91
-
Filesize
358KB
MD5fb9bb7b5a3d554645b545dd21c18ea2f
SHA19d97f9d63c5221cee0a2099eeb487e62f436bb4e
SHA2563ff5db2b407839b486bea367d29e00a470682f9ecdab7697f191b1dadf2f70d4
SHA512850f1f1473707f7ee45c07c1ba92ac6438a87918c9517882f7d5e4229e69ebf3c0d2675f56151aa0f6a750725cbe8b65b1ae38e797fafc3379a437378bf84595